Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 10:59
Behavioral task
behavioral1
Sample
i.msi
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
i.msi
Resource
win10v2004-20220812-en
General
-
Target
i.msi
-
Size
996KB
-
MD5
b0b7cb36503c46755882751191c9a711
-
SHA1
c0d058bacb81f36dfd1b1d99a386ff0a7bb0ec7a
-
SHA256
77ed1502e9c8bfd2e91f04e3dce2d5649f68201061fb24c4ab4fa5e9b7fdec50
-
SHA512
4f00e5743fa56f553ce64d1ebc35a71cd5cb5200d7434f94a46a30fe6efbcbd64d105d440bd1ce45c2b66f9e91b622e6cfc8a7de08bf08727fc75df1cec32b4d
-
SSDEEP
24576:G+aBqnGIQ5M6DLrVVdWG859GCHrSoUzLyaVtFUl:G+8lrXVVdWX59GUrSLzeaVtFU
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
MsiExec.exepid process 2024 MsiExec.exe 2024 MsiExec.exe 2024 MsiExec.exe 2024 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
Drops file in Windows directory 9 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\MSIFB62.tmp msiexec.exe File created C:\Windows\Installer\6bf74d.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI256.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF91F.tmp msiexec.exe File opened for modification C:\Windows\Installer\6bf74b.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIFAE4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFBEF.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\6bf74b.msi msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msiexec.exepid process 948 msiexec.exe 948 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 1504 msiexec.exe Token: SeIncreaseQuotaPrivilege 1504 msiexec.exe Token: SeRestorePrivilege 948 msiexec.exe Token: SeTakeOwnershipPrivilege 948 msiexec.exe Token: SeSecurityPrivilege 948 msiexec.exe Token: SeCreateTokenPrivilege 1504 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1504 msiexec.exe Token: SeLockMemoryPrivilege 1504 msiexec.exe Token: SeIncreaseQuotaPrivilege 1504 msiexec.exe Token: SeMachineAccountPrivilege 1504 msiexec.exe Token: SeTcbPrivilege 1504 msiexec.exe Token: SeSecurityPrivilege 1504 msiexec.exe Token: SeTakeOwnershipPrivilege 1504 msiexec.exe Token: SeLoadDriverPrivilege 1504 msiexec.exe Token: SeSystemProfilePrivilege 1504 msiexec.exe Token: SeSystemtimePrivilege 1504 msiexec.exe Token: SeProfSingleProcessPrivilege 1504 msiexec.exe Token: SeIncBasePriorityPrivilege 1504 msiexec.exe Token: SeCreatePagefilePrivilege 1504 msiexec.exe Token: SeCreatePermanentPrivilege 1504 msiexec.exe Token: SeBackupPrivilege 1504 msiexec.exe Token: SeRestorePrivilege 1504 msiexec.exe Token: SeShutdownPrivilege 1504 msiexec.exe Token: SeDebugPrivilege 1504 msiexec.exe Token: SeAuditPrivilege 1504 msiexec.exe Token: SeSystemEnvironmentPrivilege 1504 msiexec.exe Token: SeChangeNotifyPrivilege 1504 msiexec.exe Token: SeRemoteShutdownPrivilege 1504 msiexec.exe Token: SeUndockPrivilege 1504 msiexec.exe Token: SeSyncAgentPrivilege 1504 msiexec.exe Token: SeEnableDelegationPrivilege 1504 msiexec.exe Token: SeManageVolumePrivilege 1504 msiexec.exe Token: SeImpersonatePrivilege 1504 msiexec.exe Token: SeCreateGlobalPrivilege 1504 msiexec.exe Token: SeRestorePrivilege 948 msiexec.exe Token: SeTakeOwnershipPrivilege 948 msiexec.exe Token: SeRestorePrivilege 948 msiexec.exe Token: SeTakeOwnershipPrivilege 948 msiexec.exe Token: SeRestorePrivilege 948 msiexec.exe Token: SeTakeOwnershipPrivilege 948 msiexec.exe Token: SeRestorePrivilege 948 msiexec.exe Token: SeTakeOwnershipPrivilege 948 msiexec.exe Token: SeRestorePrivilege 948 msiexec.exe Token: SeTakeOwnershipPrivilege 948 msiexec.exe Token: SeRestorePrivilege 948 msiexec.exe Token: SeTakeOwnershipPrivilege 948 msiexec.exe Token: SeRestorePrivilege 948 msiexec.exe Token: SeTakeOwnershipPrivilege 948 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 1504 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
msiexec.exedescription pid process target process PID 948 wrote to memory of 2024 948 msiexec.exe MsiExec.exe PID 948 wrote to memory of 2024 948 msiexec.exe MsiExec.exe PID 948 wrote to memory of 2024 948 msiexec.exe MsiExec.exe PID 948 wrote to memory of 2024 948 msiexec.exe MsiExec.exe PID 948 wrote to memory of 2024 948 msiexec.exe MsiExec.exe PID 948 wrote to memory of 2024 948 msiexec.exe MsiExec.exe PID 948 wrote to memory of 2024 948 msiexec.exe MsiExec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\i.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4653D0F4D95ECE56C0DC5FC0F13803322⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Installer\MSIF91F.tmpFilesize
379KB
MD5305a50c391a94b42a68958f3f89906fb
SHA14110d68d71f3594f5d3bdfca91a1c759ab0105d4
SHA256f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f
SHA512fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7
-
C:\Windows\Installer\MSIFAE4.tmpFilesize
379KB
MD5305a50c391a94b42a68958f3f89906fb
SHA14110d68d71f3594f5d3bdfca91a1c759ab0105d4
SHA256f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f
SHA512fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7
-
C:\Windows\Installer\MSIFB62.tmpFilesize
537KB
MD5d7ec04b009302b83da506b9c63ca775c
SHA16fa9ea09b71531754b4cd05814a91032229834c0
SHA25600c0e19c05f6df1a34cc3593680a6ab43874d6cd62a8046a7add91997cfabcd4
SHA512171c465fe6f89b9e60da97896990d0b68ef595c3f70ee89b44fcf411352da22a457c41f7b853157f1faa500513419e504696775eefabe520f835ce9be5f4081c
-
C:\Windows\Installer\MSIFBEF.tmpFilesize
379KB
MD5305a50c391a94b42a68958f3f89906fb
SHA14110d68d71f3594f5d3bdfca91a1c759ab0105d4
SHA256f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f
SHA512fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7
-
\Windows\Installer\MSIF91F.tmpFilesize
379KB
MD5305a50c391a94b42a68958f3f89906fb
SHA14110d68d71f3594f5d3bdfca91a1c759ab0105d4
SHA256f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f
SHA512fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7
-
\Windows\Installer\MSIFAE4.tmpFilesize
379KB
MD5305a50c391a94b42a68958f3f89906fb
SHA14110d68d71f3594f5d3bdfca91a1c759ab0105d4
SHA256f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f
SHA512fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7
-
\Windows\Installer\MSIFB62.tmpFilesize
537KB
MD5d7ec04b009302b83da506b9c63ca775c
SHA16fa9ea09b71531754b4cd05814a91032229834c0
SHA25600c0e19c05f6df1a34cc3593680a6ab43874d6cd62a8046a7add91997cfabcd4
SHA512171c465fe6f89b9e60da97896990d0b68ef595c3f70ee89b44fcf411352da22a457c41f7b853157f1faa500513419e504696775eefabe520f835ce9be5f4081c
-
\Windows\Installer\MSIFBEF.tmpFilesize
379KB
MD5305a50c391a94b42a68958f3f89906fb
SHA14110d68d71f3594f5d3bdfca91a1c759ab0105d4
SHA256f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f
SHA512fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7
-
memory/1504-54-0x000007FEFBCE1000-0x000007FEFBCE3000-memory.dmpFilesize
8KB
-
memory/2024-56-0x0000000000000000-mapping.dmp
-
memory/2024-57-0x0000000075FB1000-0x0000000075FB3000-memory.dmpFilesize
8KB