Analysis

  • max time kernel
    196s
  • max time network
    353s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 13:16

General

  • Target

    first_time_teacher_city_metro_cut_clitoris_hidden_camera.msi

  • Size

    490.4MB

  • MD5

    17fdcaae63a66dc1a6a6371acb7c3bea

  • SHA1

    bc60293770e882474ac780a0724b99b5d7681971

  • SHA256

    80dfed9ad4d2b26807081fa8fc0a1260255bdb818cf03fa6144f3c3c3b2608df

  • SHA512

    6a97b56ce023461781eb081a465474f85f342e9b6e95bbcc34e5fde52c9ccbfe7b7ba2b46b832ac269692f11e98083ea7f090b7093576ce9befb8004abc52514

  • SSDEEP

    24576:zxgmrlIejaY+f995uHtvSOtseOaooW7TWA+7GWmzoInjcpKI7dNbD7+eoYBsQ0ks:1TrlIyksjOaotTWA+DufGTPzB29FQY

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\first_time_teacher_city_metro_cut_clitoris_hidden_camera.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4152
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4188

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads