Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2023, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
z1n_f_e_Fa_tu_r4_03.msi
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
z1n_f_e_Fa_tu_r4_03.msi
Resource
win10v2004-20230220-en
General
-
Target
z1n_f_e_Fa_tu_r4_03.msi
-
Size
7.2MB
-
MD5
f81fff8318875d7255ea9256c835f983
-
SHA1
8c49e3ede186164e284b0c160a4a12fb6b2b8c9b
-
SHA256
59191d65a9f7bbaec1c8488c644704c4e3a9cbf11c3e390190522ad5e638e80e
-
SHA512
e72c6cc6a7524e0936042c4c6e08d2645afa72eb7a631fe7c2a061e34a5d9d061feddb514a7e5f622f853a80f29a63e29378c0bf2787dbf7b7a3b080cbd2cc06
-
SSDEEP
98304:MFvaeXJkecEqpxPNH7LLrf5l2/RwxhM/ixi97trcXhnSvcFtjdbG92tHf:ESS38V6Zmy3Ft4XhSgtRbGAH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3092 OlAddinª.exe -
Loads dropped DLL 6 IoCs
pid Process 2924 MsiExec.exe 2924 MsiExec.exe 2924 MsiExec.exe 2924 MsiExec.exe 2924 MsiExec.exe 3092 OlAddinª.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OlAddinª.exe = "C:\\Users\\Admin\\AppData\\Roaming\\OlAddinª.exe" OlAddinª.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3092 OlAddinª.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI863E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI86CC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8798.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\e567def.msi msiexec.exe File opened for modification C:\Windows\Installer\e567def.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI8292.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI895E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8572.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{BE4E5DAE-81A1-42AA-ABDA-416942F532FB} msiexec.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\http:\15.228.77.178\ytr\serv.php OlAddinª.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 msiexec.exe 3012 msiexec.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe 3092 OlAddinª.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 4028 msiexec.exe Token: SeIncreaseQuotaPrivilege 4028 msiexec.exe Token: SeSecurityPrivilege 3012 msiexec.exe Token: SeCreateTokenPrivilege 4028 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4028 msiexec.exe Token: SeLockMemoryPrivilege 4028 msiexec.exe Token: SeIncreaseQuotaPrivilege 4028 msiexec.exe Token: SeMachineAccountPrivilege 4028 msiexec.exe Token: SeTcbPrivilege 4028 msiexec.exe Token: SeSecurityPrivilege 4028 msiexec.exe Token: SeTakeOwnershipPrivilege 4028 msiexec.exe Token: SeLoadDriverPrivilege 4028 msiexec.exe Token: SeSystemProfilePrivilege 4028 msiexec.exe Token: SeSystemtimePrivilege 4028 msiexec.exe Token: SeProfSingleProcessPrivilege 4028 msiexec.exe Token: SeIncBasePriorityPrivilege 4028 msiexec.exe Token: SeCreatePagefilePrivilege 4028 msiexec.exe Token: SeCreatePermanentPrivilege 4028 msiexec.exe Token: SeBackupPrivilege 4028 msiexec.exe Token: SeRestorePrivilege 4028 msiexec.exe Token: SeShutdownPrivilege 4028 msiexec.exe Token: SeDebugPrivilege 4028 msiexec.exe Token: SeAuditPrivilege 4028 msiexec.exe Token: SeSystemEnvironmentPrivilege 4028 msiexec.exe Token: SeChangeNotifyPrivilege 4028 msiexec.exe Token: SeRemoteShutdownPrivilege 4028 msiexec.exe Token: SeUndockPrivilege 4028 msiexec.exe Token: SeSyncAgentPrivilege 4028 msiexec.exe Token: SeEnableDelegationPrivilege 4028 msiexec.exe Token: SeManageVolumePrivilege 4028 msiexec.exe Token: SeImpersonatePrivilege 4028 msiexec.exe Token: SeCreateGlobalPrivilege 4028 msiexec.exe Token: SeRestorePrivilege 3012 msiexec.exe Token: SeTakeOwnershipPrivilege 3012 msiexec.exe Token: SeRestorePrivilege 3012 msiexec.exe Token: SeTakeOwnershipPrivilege 3012 msiexec.exe Token: SeRestorePrivilege 3012 msiexec.exe Token: SeTakeOwnershipPrivilege 3012 msiexec.exe Token: SeRestorePrivilege 3012 msiexec.exe Token: SeTakeOwnershipPrivilege 3012 msiexec.exe Token: SeRestorePrivilege 3012 msiexec.exe Token: SeTakeOwnershipPrivilege 3012 msiexec.exe Token: SeRestorePrivilege 3012 msiexec.exe Token: SeTakeOwnershipPrivilege 3012 msiexec.exe Token: SeRestorePrivilege 3012 msiexec.exe Token: SeTakeOwnershipPrivilege 3012 msiexec.exe Token: SeRestorePrivilege 3012 msiexec.exe Token: SeTakeOwnershipPrivilege 3012 msiexec.exe Token: SeRestorePrivilege 3012 msiexec.exe Token: SeTakeOwnershipPrivilege 3012 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4028 msiexec.exe 4028 msiexec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3092 OlAddinª.exe 3092 OlAddinª.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2924 3012 msiexec.exe 88 PID 3012 wrote to memory of 2924 3012 msiexec.exe 88 PID 3012 wrote to memory of 2924 3012 msiexec.exe 88 PID 3012 wrote to memory of 3092 3012 msiexec.exe 89 PID 3012 wrote to memory of 3092 3012 msiexec.exe 89 PID 3012 wrote to memory of 3092 3012 msiexec.exe 89
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\z1n_f_e_Fa_tu_r4_03.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4028
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 34356212E620771D20B77C92233A10922⤵
- Loads dropped DLL
PID:2924
-
-
C:\Users\Admin\AppData\Roaming\OlAddinª.exe"C:\Users\Admin\AppData\Roaming\OlAddinª.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3092
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510168ce71ce4fbfdf2085f11d873dd7a
SHA10f0099ed4b32564e2712b08275ad5613d1a59d48
SHA25663568e185fd274600be36611eebb68c533e51c502c984b470a2db272c02c2a90
SHA512f24cd0623f0557033a2df3f06b66a3f5598b8a5e19199021d81490db8a28732c61af9452fb16bc1d5bd3c7227290635a99160c56addf90a387292a057f8372dc
-
Filesize
20KB
MD5b2f9653e1276395d5a375d061f6aa195
SHA1b469f90761b54bb02a3fcf9aabb4d8c0ab771b92
SHA25666e86d2b1a8c9c6328030b92304d2837c5f40b63a56171bf51ea17797cc642d8
SHA512f76d9b836e3f67475167b37b21c525bddf4b2544b5f536569357a38dd02f6f99f7489b7e914c5b863eb2f7c5e9baea0f26ebca026e730887b9578b92d237995c
-
Filesize
52KB
MD5a5e848073b1d7a345b60f3cce446457a
SHA1cafd292c949058eed0460930973b7e26d3b16e3b
SHA256bfe07dc258e6f4be488d57691a8268da0b052940cc6d80aa829adf41f64668c7
SHA512dced1597c4ef44d4d28f6114020bf44d2912f1f300e5e3cfc5499e44aa0a9218422894b8ff3931cdf731d2381b9add04163e370c89864a3c95c516a289a94a76
-
Filesize
52KB
MD5a5e848073b1d7a345b60f3cce446457a
SHA1cafd292c949058eed0460930973b7e26d3b16e3b
SHA256bfe07dc258e6f4be488d57691a8268da0b052940cc6d80aa829adf41f64668c7
SHA512dced1597c4ef44d4d28f6114020bf44d2912f1f300e5e3cfc5499e44aa0a9218422894b8ff3931cdf731d2381b9add04163e370c89864a3c95c516a289a94a76
-
Filesize
6.8MB
MD5d4257a85611eb9b8fc7da98ad7cd3b4c
SHA110a8821bd70d4afa52388ca04480085b98ac9227
SHA256a7d13b0ae56c9d7759c0c20a5ea515760dffa8ea4fa366f9092e901b4579499b
SHA512396355dcb832bbd42bc6cf59e674cd984d1f025b857b35cd707f46657171b6163bc92a2eb55f652d250c13429960369a5f080d44b854148c98018e0dbd561a15
-
Filesize
6.8MB
MD5d4257a85611eb9b8fc7da98ad7cd3b4c
SHA110a8821bd70d4afa52388ca04480085b98ac9227
SHA256a7d13b0ae56c9d7759c0c20a5ea515760dffa8ea4fa366f9092e901b4579499b
SHA512396355dcb832bbd42bc6cf59e674cd984d1f025b857b35cd707f46657171b6163bc92a2eb55f652d250c13429960369a5f080d44b854148c98018e0dbd561a15
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c