Analysis

  • max time kernel
    230s
  • max time network
    299s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 07:43

General

  • Target

    afef2f9f5c5e3ac4a946cea031ef20e6.msi

  • Size

    5.7MB

  • MD5

    afef2f9f5c5e3ac4a946cea031ef20e6

  • SHA1

    9cc6eb3707a9f58e6d5c024b1d0d53c4724c87ad

  • SHA256

    03fcd10e0a552222e3d0ab3308af694af5536e8980e50c98ecfe48d32b267c59

  • SHA512

    41e17bb4ad708c705830364d10d2617b5e098597fc630e0251c72da37158388626c926810ffa78f9a4d2da52529d8fd595e7e0cd4c22bc716f41609d9b0b4267

  • SSDEEP

    49152:XpUPdFdYxt2SENs02k7OxHA32D9K1O5k0a5MLXrzL6yq5/Hdrbz5jLcwE/7z3V49:XpgKxPDM6+OLGThGWn126

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\afef2f9f5c5e3ac4a946cea031ef20e6.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:392
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads