Analysis

  • max time kernel
    80s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 17:09

General

  • Target

    c2128876a519384e58bc4c7689c750506a322a9af8cb51dae874e13310f7a657.msi

  • Size

    582KB

  • MD5

    7cf1cfbf90daf97f68e6353f3069958b

  • SHA1

    099234e01840a5b31f7a07c67ef4ba5936663a66

  • SHA256

    c2128876a519384e58bc4c7689c750506a322a9af8cb51dae874e13310f7a657

  • SHA512

    2de405169dd450ff6fd0deb6279a2a0e994910f99d2cbda89fab757a5f4407c85951186350d5aa8d43653a8a4d24aeffd6b3dee656d502a3ddcec4819f8ae251

  • SSDEEP

    12288:73RaFvRR7tSDjHuvxa+DotYTkG4w07dJZ8j8EhQ5e3Awu/y:734FvRR7tGa5altYTkGB0Rrq8GQc3Awy

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\c2128876a519384e58bc4c7689c750506a322a9af8cb51dae874e13310f7a657.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3340
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C3CA64E40C54C4F79286938737E6E993 C
      2⤵
      • Loads dropped DLL
      PID:2860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSID3CF.tmp

    Filesize

    48KB

    MD5

    061b504c1a3a41ecdd9cf7b1d33259e4

    SHA1

    2394bb353951e524a67249f14b0a6fd15ea65123

    SHA256

    02ca99212b699c7efb1f0c3a62d873911212777132366c894fd094fe226cb5bc

    SHA512

    0697c0732d71db35db7380fbe78a09d8d32f92cfd38ca8f98b079938122e96e9c859039015f334471c0fb5d8b8077e975b5c92fe3170b0a639a7f39d2cc61c63

  • C:\Users\Admin\AppData\Local\Temp\MSID3CF.tmp

    Filesize

    48KB

    MD5

    061b504c1a3a41ecdd9cf7b1d33259e4

    SHA1

    2394bb353951e524a67249f14b0a6fd15ea65123

    SHA256

    02ca99212b699c7efb1f0c3a62d873911212777132366c894fd094fe226cb5bc

    SHA512

    0697c0732d71db35db7380fbe78a09d8d32f92cfd38ca8f98b079938122e96e9c859039015f334471c0fb5d8b8077e975b5c92fe3170b0a639a7f39d2cc61c63

  • C:\Users\Admin\AppData\Local\Temp\MSID76A.tmp

    Filesize

    48KB

    MD5

    061b504c1a3a41ecdd9cf7b1d33259e4

    SHA1

    2394bb353951e524a67249f14b0a6fd15ea65123

    SHA256

    02ca99212b699c7efb1f0c3a62d873911212777132366c894fd094fe226cb5bc

    SHA512

    0697c0732d71db35db7380fbe78a09d8d32f92cfd38ca8f98b079938122e96e9c859039015f334471c0fb5d8b8077e975b5c92fe3170b0a639a7f39d2cc61c63

  • C:\Users\Admin\AppData\Local\Temp\MSID76A.tmp

    Filesize

    48KB

    MD5

    061b504c1a3a41ecdd9cf7b1d33259e4

    SHA1

    2394bb353951e524a67249f14b0a6fd15ea65123

    SHA256

    02ca99212b699c7efb1f0c3a62d873911212777132366c894fd094fe226cb5bc

    SHA512

    0697c0732d71db35db7380fbe78a09d8d32f92cfd38ca8f98b079938122e96e9c859039015f334471c0fb5d8b8077e975b5c92fe3170b0a639a7f39d2cc61c63