Analysis
-
max time kernel
90s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2023 10:00
Static task
static1
Behavioral task
behavioral1
Sample
7z2201-x64.msi
Resource
win7-20220812-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
7z2201-x64.msi
Resource
win10v2004-20221111-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
7z2201-x64.msi
-
Size
1.8MB
-
MD5
50515f156ae516461e28dd453230d448
-
SHA1
3209574e09ec235b2613570e6d7d8d5058a64971
-
SHA256
f4afba646166999d6090b5beddde546450262dc595dddeb62132da70f70d14ca
-
SHA512
14593ca96d416a2fbb6bbbf8adec51978e6c0fb513882d5442ab5876e28dd79be14ca9dd77acff2d3d329cb7733f7e969e784c57e1f414d00f3c7b9d581638e5
-
SSDEEP
49152:ynV9R5GSuwYgV4mN4eOYq4Z0APsx/Eho:ynV9Ro/mTlbqC04s/
Score
6/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe -
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\nl.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\7z.dll msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt msiexec.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm msiexec.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\descript.ion msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt msiexec.exe File opened for modification C:\Program Files\7-Zip\7zG.exe msiexec.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt msiexec.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 3440 msiexec.exe Token: SeIncreaseQuotaPrivilege 3440 msiexec.exe Token: SeSecurityPrivilege 2216 msiexec.exe Token: SeCreateTokenPrivilege 3440 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3440 msiexec.exe Token: SeLockMemoryPrivilege 3440 msiexec.exe Token: SeIncreaseQuotaPrivilege 3440 msiexec.exe Token: SeMachineAccountPrivilege 3440 msiexec.exe Token: SeTcbPrivilege 3440 msiexec.exe Token: SeSecurityPrivilege 3440 msiexec.exe Token: SeTakeOwnershipPrivilege 3440 msiexec.exe Token: SeLoadDriverPrivilege 3440 msiexec.exe Token: SeSystemProfilePrivilege 3440 msiexec.exe Token: SeSystemtimePrivilege 3440 msiexec.exe Token: SeProfSingleProcessPrivilege 3440 msiexec.exe Token: SeIncBasePriorityPrivilege 3440 msiexec.exe Token: SeCreatePagefilePrivilege 3440 msiexec.exe Token: SeCreatePermanentPrivilege 3440 msiexec.exe Token: SeBackupPrivilege 3440 msiexec.exe Token: SeRestorePrivilege 3440 msiexec.exe Token: SeShutdownPrivilege 3440 msiexec.exe Token: SeDebugPrivilege 3440 msiexec.exe Token: SeAuditPrivilege 3440 msiexec.exe Token: SeSystemEnvironmentPrivilege 3440 msiexec.exe Token: SeChangeNotifyPrivilege 3440 msiexec.exe Token: SeRemoteShutdownPrivilege 3440 msiexec.exe Token: SeUndockPrivilege 3440 msiexec.exe Token: SeSyncAgentPrivilege 3440 msiexec.exe Token: SeEnableDelegationPrivilege 3440 msiexec.exe Token: SeManageVolumePrivilege 3440 msiexec.exe Token: SeImpersonatePrivilege 3440 msiexec.exe Token: SeCreateGlobalPrivilege 3440 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 3440 msiexec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\7z2201-x64.msi1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken