Resubmissions

19-07-2024 15:23

240719-ssp3ka1dng 10

09-10-2023 22:48

231009-2rhrjagh71 10

29-01-2023 17:46

230129-wchv4afh63 10

14-07-2022 07:49

220714-jn2fcsdbgr 10

Analysis

  • max time kernel
    153s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-07-2022 07:49

General

  • Target

    Statement.pdf.msi

  • Size

    1.1MB

  • MD5

    a362de111d5dff6bcdeaf4717af268b6

  • SHA1

    2e5104db35871c5bc7da2035d8b91398bb5d5e0e

  • SHA256

    0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca

  • SHA512

    b48a18158a0dff9a9012952c467fcf69b8bfc53ceeacaf32a90fc4b7f3afd34465e676b282fa87f3c5c85b4780baf96cc754dcdeef77ba5330fa8c4fd1d20b72

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Statement.pdf.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1768
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1904
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1768-54-0x000007FEFBD81000-0x000007FEFBD83000-memory.dmp

    Filesize

    8KB