Analysis

  • max time kernel
    134s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2023, 01:50

General

  • Target

    Resanance.msi

  • Size

    93.4MB

  • MD5

    e39eaf13bf286d05580abc22071a2cab

  • SHA1

    575e3441a2c0d841400107a49fbdc867831db6f3

  • SHA256

    d1d2167fb741c96ba88b843647bd95ff36d28c5c5e15e3a5390f5583f742d9f2

  • SHA512

    b54462340c6508912b5ee46f4cff39adf6066d2a0332a256f0f6497643f60cf3b052e56b2f083a31f9b93d6c68cc9db946daa5687aeed1183d4a0a8156ebd776

  • SSDEEP

    1572864:BQbYdb6tvbSp0PORauFdIPuV6kRjHsW1pXg4OTEx/AORJb1d501oQiD8cpSH1Kqj:KbYN6tvbS22QuFRV6LWHQxQx/LRzj01T

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Resanance.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1728
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads