Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2023, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
Nota-LG-emitida-13488mhqt.msi
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Nota-LG-emitida-13488mhqt.msi
Resource
win10v2004-20230221-en
General
-
Target
Nota-LG-emitida-13488mhqt.msi
-
Size
9.0MB
-
MD5
1a451514d9b14181632c245331206894
-
SHA1
9a0d7e3bbe5d4730af5fde8db005a6c86956f6cf
-
SHA256
271c7dc9cd5156fcd76a9fd705b4bf3120ea64c05e8d771549b3d445b044348b
-
SHA512
cd8c3ce8ecbe706c7485e0aeae96ca2ca195582c3a62979ebcfe1ee76720eb64b15366de6288b1f0f1abc1cb87b40a3e788f3c659c4820fe1e79fba9bc905966
-
SSDEEP
196608:l0ZlBE1BdPeMytDLOvoeneHR3EltRKOi/kVyuNGIwRbxn2eKCXd3/:lofsBFZ+SFeHNmgV/kAuNGIwRF2gd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4612 abd1ª.exe 4584 abd1ª.exe -
Loads dropped DLL 7 IoCs
pid Process 4804 MsiExec.exe 4804 MsiExec.exe 4804 MsiExec.exe 4804 MsiExec.exe 4804 MsiExec.exe 4612 abd1ª.exe 4584 abd1ª.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\abd1ª.exe = "C:\\Users\\Admin\\AppData\\Roaming\\abd1ª.exe" abd1ª.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Q: msiexec.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI848B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI80D0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI81DB.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI7CE5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7F48.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8023.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{E3B49BF1-3F55-45B0-A9AF-4F4035A3EBB5} msiexec.exe File created C:\Windows\Installer\e567c39.msi msiexec.exe File opened for modification C:\Windows\Installer\e567c39.msi msiexec.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\http:\15.228.77.178\ytr\serv.php abd1ª.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5060 msiexec.exe 5060 msiexec.exe 4584 abd1ª.exe 4584 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 4836 msiexec.exe Token: SeIncreaseQuotaPrivilege 4836 msiexec.exe Token: SeSecurityPrivilege 5060 msiexec.exe Token: SeCreateTokenPrivilege 4836 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4836 msiexec.exe Token: SeLockMemoryPrivilege 4836 msiexec.exe Token: SeIncreaseQuotaPrivilege 4836 msiexec.exe Token: SeMachineAccountPrivilege 4836 msiexec.exe Token: SeTcbPrivilege 4836 msiexec.exe Token: SeSecurityPrivilege 4836 msiexec.exe Token: SeTakeOwnershipPrivilege 4836 msiexec.exe Token: SeLoadDriverPrivilege 4836 msiexec.exe Token: SeSystemProfilePrivilege 4836 msiexec.exe Token: SeSystemtimePrivilege 4836 msiexec.exe Token: SeProfSingleProcessPrivilege 4836 msiexec.exe Token: SeIncBasePriorityPrivilege 4836 msiexec.exe Token: SeCreatePagefilePrivilege 4836 msiexec.exe Token: SeCreatePermanentPrivilege 4836 msiexec.exe Token: SeBackupPrivilege 4836 msiexec.exe Token: SeRestorePrivilege 4836 msiexec.exe Token: SeShutdownPrivilege 4836 msiexec.exe Token: SeDebugPrivilege 4836 msiexec.exe Token: SeAuditPrivilege 4836 msiexec.exe Token: SeSystemEnvironmentPrivilege 4836 msiexec.exe Token: SeChangeNotifyPrivilege 4836 msiexec.exe Token: SeRemoteShutdownPrivilege 4836 msiexec.exe Token: SeUndockPrivilege 4836 msiexec.exe Token: SeSyncAgentPrivilege 4836 msiexec.exe Token: SeEnableDelegationPrivilege 4836 msiexec.exe Token: SeManageVolumePrivilege 4836 msiexec.exe Token: SeImpersonatePrivilege 4836 msiexec.exe Token: SeCreateGlobalPrivilege 4836 msiexec.exe Token: SeRestorePrivilege 5060 msiexec.exe Token: SeTakeOwnershipPrivilege 5060 msiexec.exe Token: SeRestorePrivilege 5060 msiexec.exe Token: SeTakeOwnershipPrivilege 5060 msiexec.exe Token: SeRestorePrivilege 5060 msiexec.exe Token: SeTakeOwnershipPrivilege 5060 msiexec.exe Token: SeRestorePrivilege 5060 msiexec.exe Token: SeTakeOwnershipPrivilege 5060 msiexec.exe Token: SeRestorePrivilege 5060 msiexec.exe Token: SeTakeOwnershipPrivilege 5060 msiexec.exe Token: SeRestorePrivilege 5060 msiexec.exe Token: SeTakeOwnershipPrivilege 5060 msiexec.exe Token: SeRestorePrivilege 5060 msiexec.exe Token: SeTakeOwnershipPrivilege 5060 msiexec.exe Token: SeRestorePrivilege 5060 msiexec.exe Token: SeTakeOwnershipPrivilege 5060 msiexec.exe Token: SeRestorePrivilege 5060 msiexec.exe Token: SeTakeOwnershipPrivilege 5060 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4836 msiexec.exe 4836 msiexec.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4584 abd1ª.exe 4612 abd1ª.exe 4584 abd1ª.exe 4584 abd1ª.exe 4612 abd1ª.exe 4612 abd1ª.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4804 5060 msiexec.exe 87 PID 5060 wrote to memory of 4804 5060 msiexec.exe 87 PID 5060 wrote to memory of 4804 5060 msiexec.exe 87 PID 5060 wrote to memory of 4612 5060 msiexec.exe 89 PID 5060 wrote to memory of 4612 5060 msiexec.exe 89 PID 5060 wrote to memory of 4612 5060 msiexec.exe 89 PID 5060 wrote to memory of 4584 5060 msiexec.exe 88 PID 5060 wrote to memory of 4584 5060 msiexec.exe 88 PID 5060 wrote to memory of 4584 5060 msiexec.exe 88
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Nota-LG-emitida-13488mhqt.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4836
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3F169414939C0395E19ABAD280A1CA632⤵
- Loads dropped DLL
PID:4804
-
-
C:\Users\Admin\AppData\Roaming\abd1ª.exe"C:\Users\Admin\AppData\Roaming\abd1ª.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4584
-
-
C:\Users\Admin\AppData\Roaming\abd1ª.exe"C:\Users\Admin\AppData\Roaming\abd1ª.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4612
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a06563b4c83485482e8858c71df84be3
SHA1f19bce63bd2442d5a1a90ec1827cdbd8aff0bfc2
SHA25693f5d5b4c85827ee3766b7c8b313a4b2cdace141ab9b7def55adb31681f873f9
SHA512b3452162faacadb28b360e514f5f481c640073f323488297962d289767bf0a97a58f097a1e76f821d5a067a11d24e34195e791045d7798b4691085fc218c1a5a
-
Filesize
20KB
MD51d19463226e2e06a9e2513ca1604c96d
SHA1abc19753b468f1bdf08e6debe11f8c9ee017b831
SHA256ab29c633bfb85a284dac3b4a41d52b2fa2a72e4975ae729766691f1c45d89ec5
SHA5127621f6878c1131b667ec45e53106aa39843474ec522f237f52e8fea0e1244361ac602ff35639c3117ea3462621d1ccce6519ecec720cad307b9dc7c9a2f0321b
-
Filesize
7.1MB
MD5415c575c70b7adafd6aac19a61b3b0b8
SHA117381a4ac3f19a7c5bf60f33e377e134b95e6948
SHA25622f6b6629649c16daf79e61ba167a03039d8045765f3207352b82a7f252aa3aa
SHA5129afd33668b101da84dae35824ffd2f59448066e780217d6fb1d461c06872e09ad74b31ebdadb8984a92f3932b1cba0aa76fd13adad90d39fa660c3e27c8352dc
-
Filesize
7.1MB
MD5415c575c70b7adafd6aac19a61b3b0b8
SHA117381a4ac3f19a7c5bf60f33e377e134b95e6948
SHA25622f6b6629649c16daf79e61ba167a03039d8045765f3207352b82a7f252aa3aa
SHA5129afd33668b101da84dae35824ffd2f59448066e780217d6fb1d461c06872e09ad74b31ebdadb8984a92f3932b1cba0aa76fd13adad90d39fa660c3e27c8352dc
-
Filesize
7.1MB
MD5415c575c70b7adafd6aac19a61b3b0b8
SHA117381a4ac3f19a7c5bf60f33e377e134b95e6948
SHA25622f6b6629649c16daf79e61ba167a03039d8045765f3207352b82a7f252aa3aa
SHA5129afd33668b101da84dae35824ffd2f59448066e780217d6fb1d461c06872e09ad74b31ebdadb8984a92f3932b1cba0aa76fd13adad90d39fa660c3e27c8352dc
-
Filesize
1.8MB
MD5fefc27dc49a252727e5cdf333c5643b4
SHA1260e9797baec142f764bcf35af7a0917805f0b98
SHA256633d363baa5dd8b6353676843204ab91f899ab55b6e159cad39d24a459ff527b
SHA512b37ac4fce06ea1bbd6400f46fa1af5c7d3e0c7da92242dd790d36d015ebc8121cdbbae739f52672bd8e5c5481ceb15f546fb48a2ca326f113cd34042fb56c5a3
-
Filesize
1.8MB
MD5fefc27dc49a252727e5cdf333c5643b4
SHA1260e9797baec142f764bcf35af7a0917805f0b98
SHA256633d363baa5dd8b6353676843204ab91f899ab55b6e159cad39d24a459ff527b
SHA512b37ac4fce06ea1bbd6400f46fa1af5c7d3e0c7da92242dd790d36d015ebc8121cdbbae739f52672bd8e5c5481ceb15f546fb48a2ca326f113cd34042fb56c5a3
-
Filesize
1.8MB
MD5fefc27dc49a252727e5cdf333c5643b4
SHA1260e9797baec142f764bcf35af7a0917805f0b98
SHA256633d363baa5dd8b6353676843204ab91f899ab55b6e159cad39d24a459ff527b
SHA512b37ac4fce06ea1bbd6400f46fa1af5c7d3e0c7da92242dd790d36d015ebc8121cdbbae739f52672bd8e5c5481ceb15f546fb48a2ca326f113cd34042fb56c5a3
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c