Analysis

  • max time kernel
    33s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2023 04:20

General

  • Target

    MSI_Afterburner_Setup_v465_Beta4.msi

  • Size

    22.6MB

  • MD5

    4f6bfe42289418be3a9b011bed326070

  • SHA1

    9c9eafe64f70b10c948ae46acf8bd5a39708fa83

  • SHA256

    c2c9bf3712889c8ed2215cdf56a2d6de0ade6b12624924ba697de5c99ba263a8

  • SHA512

    f4d4489c8e1a3d28aa271ee9ffe404296f13bf5bab79fbf04022f9e52be0975dd1341c30feff70bcb435e24670870a19a1ca85d3d41066a4c36ab1dca6092bc0

  • SSDEEP

    393216:woW7n04ph6pVrsGJB1Mv42sgoYlC9nclm5wX11Q6xLbDUtAcDHqCyox1+:woWLc5sm1g4f7YlsnclVQ6xLbjayox1

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\MSI_Afterburner_Setup_v465_Beta4.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4072
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A5B227D48BC10563AEB6628B97878DF6 C
      2⤵
      • Loads dropped DLL
      PID:4520

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI6612.tmp
    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI6612.tmp
    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI6893.tmp
    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI6893.tmp
    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI68F2.tmp
    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI68F2.tmp
    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI6931.tmp
    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI6931.tmp
    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI6981.tmp
    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI6981.tmp
    Filesize

    377KB

    MD5

    af61221c6f4e9ab3ac2440b25d751868

    SHA1

    094f68ff354ac4c8dbdfe4689cb821f8d25880b8

    SHA256

    1e587d8593152b2538da7bdcb13880c45d256e84baa7e94c00ec4de08ab018d8

    SHA512

    c695d101c761812c1805d8ee54b8fed73869d3680372368ec3de90dc25ab1c27aa08f771dc274854ba051e0afeb17827c01b17e2bed33cb87ff0bdc884f6b791

  • C:\Users\Admin\AppData\Local\Temp\MSI6A4D.tmp
    Filesize

    837KB

    MD5

    e76f80f8c9a51813813c351e35bf0755

    SHA1

    ec69253f3fd681d2829d60f3a14a48c779fabbb4

    SHA256

    87388281ef2eb907b4ad843c8bc0e3ec13dae903edfe53b29f78557588eb5161

    SHA512

    134a7be4012dc52763e5ac28eed7ce8e423a913f17449a672ce9f1192e69e5e00c62bce1f0374f76443832345eded1668f28fb9fbe7d287fc51dfdc199911dc5

  • C:\Users\Admin\AppData\Local\Temp\MSI6A4D.tmp
    Filesize

    837KB

    MD5

    e76f80f8c9a51813813c351e35bf0755

    SHA1

    ec69253f3fd681d2829d60f3a14a48c779fabbb4

    SHA256

    87388281ef2eb907b4ad843c8bc0e3ec13dae903edfe53b29f78557588eb5161

    SHA512

    134a7be4012dc52763e5ac28eed7ce8e423a913f17449a672ce9f1192e69e5e00c62bce1f0374f76443832345eded1668f28fb9fbe7d287fc51dfdc199911dc5

  • memory/4520-132-0x0000000000000000-mapping.dmp