Analysis

  • max time kernel
    12s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2023 04:20

General

  • Target

    MSI_Afterburner_Setup_v465_Beta4.msi

  • Size

    22.6MB

  • MD5

    4f6bfe42289418be3a9b011bed326070

  • SHA1

    9c9eafe64f70b10c948ae46acf8bd5a39708fa83

  • SHA256

    c2c9bf3712889c8ed2215cdf56a2d6de0ade6b12624924ba697de5c99ba263a8

  • SHA512

    f4d4489c8e1a3d28aa271ee9ffe404296f13bf5bab79fbf04022f9e52be0975dd1341c30feff70bcb435e24670870a19a1ca85d3d41066a4c36ab1dca6092bc0

  • SSDEEP

    393216:woW7n04ph6pVrsGJB1Mv42sgoYlC9nclm5wX11Q6xLbDUtAcDHqCyox1+:woWLc5sm1g4f7YlsnclVQ6xLbjayox1

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\MSI_Afterburner_Setup_v465_Beta4.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1144
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:992
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 46B2719F34F118565F7611C4D0814E8E C
      2⤵
      • Loads dropped DLL
      PID:1468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI3AD0.tmp

    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI3DDD.tmp

    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI3E2C.tmp

    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI4168.tmp

    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI43AA.tmp

    Filesize

    837KB

    MD5

    e76f80f8c9a51813813c351e35bf0755

    SHA1

    ec69253f3fd681d2829d60f3a14a48c779fabbb4

    SHA256

    87388281ef2eb907b4ad843c8bc0e3ec13dae903edfe53b29f78557588eb5161

    SHA512

    134a7be4012dc52763e5ac28eed7ce8e423a913f17449a672ce9f1192e69e5e00c62bce1f0374f76443832345eded1668f28fb9fbe7d287fc51dfdc199911dc5

  • \Users\Admin\AppData\Local\Temp\MSI3AD0.tmp

    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • \Users\Admin\AppData\Local\Temp\MSI3DDD.tmp

    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • \Users\Admin\AppData\Local\Temp\MSI3E2C.tmp

    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • \Users\Admin\AppData\Local\Temp\MSI4168.tmp

    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • \Users\Admin\AppData\Local\Temp\MSI43AA.tmp

    Filesize

    837KB

    MD5

    e76f80f8c9a51813813c351e35bf0755

    SHA1

    ec69253f3fd681d2829d60f3a14a48c779fabbb4

    SHA256

    87388281ef2eb907b4ad843c8bc0e3ec13dae903edfe53b29f78557588eb5161

    SHA512

    134a7be4012dc52763e5ac28eed7ce8e423a913f17449a672ce9f1192e69e5e00c62bce1f0374f76443832345eded1668f28fb9fbe7d287fc51dfdc199911dc5

  • memory/1144-54-0x000007FEFC001000-0x000007FEFC003000-memory.dmp

    Filesize

    8KB

  • memory/1468-57-0x0000000075AD1000-0x0000000075AD3000-memory.dmp

    Filesize

    8KB

  • memory/1468-56-0x0000000000000000-mapping.dmp