Analysis
-
max time kernel
230s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 07:43
Static task
static1
Behavioral task
behavioral1
Sample
afef2f9f5c5e3ac4a946cea031ef20e6.msi
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
afef2f9f5c5e3ac4a946cea031ef20e6.msi
Resource
win10v2004-20221111-en
General
-
Target
afef2f9f5c5e3ac4a946cea031ef20e6.msi
-
Size
5.7MB
-
MD5
afef2f9f5c5e3ac4a946cea031ef20e6
-
SHA1
9cc6eb3707a9f58e6d5c024b1d0d53c4724c87ad
-
SHA256
03fcd10e0a552222e3d0ab3308af694af5536e8980e50c98ecfe48d32b267c59
-
SHA512
41e17bb4ad708c705830364d10d2617b5e098597fc630e0251c72da37158388626c926810ffa78f9a4d2da52529d8fd595e7e0cd4c22bc716f41609d9b0b4267
-
SSDEEP
49152:XpUPdFdYxt2SENs02k7OxHA32D9K1O5k0a5MLXrzL6yq5/Hdrbz5jLcwE/7z3V49:XpgKxPDM6+OLGThGWn126
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 392 msiexec.exe Token: SeIncreaseQuotaPrivilege 392 msiexec.exe Token: SeSecurityPrivilege 4688 msiexec.exe Token: SeCreateTokenPrivilege 392 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 392 msiexec.exe Token: SeLockMemoryPrivilege 392 msiexec.exe Token: SeIncreaseQuotaPrivilege 392 msiexec.exe Token: SeMachineAccountPrivilege 392 msiexec.exe Token: SeTcbPrivilege 392 msiexec.exe Token: SeSecurityPrivilege 392 msiexec.exe Token: SeTakeOwnershipPrivilege 392 msiexec.exe Token: SeLoadDriverPrivilege 392 msiexec.exe Token: SeSystemProfilePrivilege 392 msiexec.exe Token: SeSystemtimePrivilege 392 msiexec.exe Token: SeProfSingleProcessPrivilege 392 msiexec.exe Token: SeIncBasePriorityPrivilege 392 msiexec.exe Token: SeCreatePagefilePrivilege 392 msiexec.exe Token: SeCreatePermanentPrivilege 392 msiexec.exe Token: SeBackupPrivilege 392 msiexec.exe Token: SeRestorePrivilege 392 msiexec.exe Token: SeShutdownPrivilege 392 msiexec.exe Token: SeDebugPrivilege 392 msiexec.exe Token: SeAuditPrivilege 392 msiexec.exe Token: SeSystemEnvironmentPrivilege 392 msiexec.exe Token: SeChangeNotifyPrivilege 392 msiexec.exe Token: SeRemoteShutdownPrivilege 392 msiexec.exe Token: SeUndockPrivilege 392 msiexec.exe Token: SeSyncAgentPrivilege 392 msiexec.exe Token: SeEnableDelegationPrivilege 392 msiexec.exe Token: SeManageVolumePrivilege 392 msiexec.exe Token: SeImpersonatePrivilege 392 msiexec.exe Token: SeCreateGlobalPrivilege 392 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 392 msiexec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\afef2f9f5c5e3ac4a946cea031ef20e6.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:392
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4688