Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2023, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
Ads Manager setup.msi
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Ads Manager setup.msi
Resource
win10v2004-20230220-en
General
-
Target
Ads Manager setup.msi
-
Size
13.9MB
-
MD5
d7b8cb7c9d8b93aac72871cd636305cb
-
SHA1
51001e47138cab5914958ac07200962cc758fd95
-
SHA256
1419c86c4a066b56aa8da55939c7f5bad0870f2b7ddc561dfda318b4e59dc99f
-
SHA512
e3a24cc3af85baad3fad2b234d2224284d7d62352ce83e6a5ec41ad7be189b656768fc0709e20c2137fc535a50339db31567c684cfcd49859396416b6dd0cbb7
-
SSDEEP
393216:a0sfZ/w3BZlQIEU30XHwzAPm2LSi5lZ0acv:PsJ2a40XHZm2Lt0Hv
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1944 MsiExec.exe 1944 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1724 msiexec.exe Token: SeIncreaseQuotaPrivilege 1724 msiexec.exe Token: SeSecurityPrivilege 2424 msiexec.exe Token: SeCreateTokenPrivilege 1724 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1724 msiexec.exe Token: SeLockMemoryPrivilege 1724 msiexec.exe Token: SeIncreaseQuotaPrivilege 1724 msiexec.exe Token: SeMachineAccountPrivilege 1724 msiexec.exe Token: SeTcbPrivilege 1724 msiexec.exe Token: SeSecurityPrivilege 1724 msiexec.exe Token: SeTakeOwnershipPrivilege 1724 msiexec.exe Token: SeLoadDriverPrivilege 1724 msiexec.exe Token: SeSystemProfilePrivilege 1724 msiexec.exe Token: SeSystemtimePrivilege 1724 msiexec.exe Token: SeProfSingleProcessPrivilege 1724 msiexec.exe Token: SeIncBasePriorityPrivilege 1724 msiexec.exe Token: SeCreatePagefilePrivilege 1724 msiexec.exe Token: SeCreatePermanentPrivilege 1724 msiexec.exe Token: SeBackupPrivilege 1724 msiexec.exe Token: SeRestorePrivilege 1724 msiexec.exe Token: SeShutdownPrivilege 1724 msiexec.exe Token: SeDebugPrivilege 1724 msiexec.exe Token: SeAuditPrivilege 1724 msiexec.exe Token: SeSystemEnvironmentPrivilege 1724 msiexec.exe Token: SeChangeNotifyPrivilege 1724 msiexec.exe Token: SeRemoteShutdownPrivilege 1724 msiexec.exe Token: SeUndockPrivilege 1724 msiexec.exe Token: SeSyncAgentPrivilege 1724 msiexec.exe Token: SeEnableDelegationPrivilege 1724 msiexec.exe Token: SeManageVolumePrivilege 1724 msiexec.exe Token: SeImpersonatePrivilege 1724 msiexec.exe Token: SeCreateGlobalPrivilege 1724 msiexec.exe Token: SeCreateTokenPrivilege 1724 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1724 msiexec.exe Token: SeLockMemoryPrivilege 1724 msiexec.exe Token: SeIncreaseQuotaPrivilege 1724 msiexec.exe Token: SeMachineAccountPrivilege 1724 msiexec.exe Token: SeTcbPrivilege 1724 msiexec.exe Token: SeSecurityPrivilege 1724 msiexec.exe Token: SeTakeOwnershipPrivilege 1724 msiexec.exe Token: SeLoadDriverPrivilege 1724 msiexec.exe Token: SeSystemProfilePrivilege 1724 msiexec.exe Token: SeSystemtimePrivilege 1724 msiexec.exe Token: SeProfSingleProcessPrivilege 1724 msiexec.exe Token: SeIncBasePriorityPrivilege 1724 msiexec.exe Token: SeCreatePagefilePrivilege 1724 msiexec.exe Token: SeCreatePermanentPrivilege 1724 msiexec.exe Token: SeBackupPrivilege 1724 msiexec.exe Token: SeRestorePrivilege 1724 msiexec.exe Token: SeShutdownPrivilege 1724 msiexec.exe Token: SeDebugPrivilege 1724 msiexec.exe Token: SeAuditPrivilege 1724 msiexec.exe Token: SeSystemEnvironmentPrivilege 1724 msiexec.exe Token: SeChangeNotifyPrivilege 1724 msiexec.exe Token: SeRemoteShutdownPrivilege 1724 msiexec.exe Token: SeUndockPrivilege 1724 msiexec.exe Token: SeSyncAgentPrivilege 1724 msiexec.exe Token: SeEnableDelegationPrivilege 1724 msiexec.exe Token: SeManageVolumePrivilege 1724 msiexec.exe Token: SeImpersonatePrivilege 1724 msiexec.exe Token: SeCreateGlobalPrivilege 1724 msiexec.exe Token: SeCreateTokenPrivilege 1724 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1724 msiexec.exe Token: SeLockMemoryPrivilege 1724 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1944 2424 msiexec.exe 85 PID 2424 wrote to memory of 1944 2424 msiexec.exe 85 PID 2424 wrote to memory of 1944 2424 msiexec.exe 85
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Ads Manager setup.msi"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1724
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 51DA268294752237AD035321F5D5A698 C2⤵
- Loads dropped DLL
PID:1944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5b77a2a2768b9cc78a71bbffb9812b978
SHA1b70e27eb446fe1c3bc8ea03dabbee2739a782e04
SHA256f74c97b1a53541b059d3bfafe41a79005ce5065f8210d7de9f1b600dc4e28aa0
SHA512a8b16bc60f8559c78c64ca9e85cd7fd704bba1f55b362465b7accef1bb853d1c9616995a35f972256c57fbe877ce880398ba1fbceaa658604883aa12dcbc4f57
-
Filesize
285KB
MD5b77a2a2768b9cc78a71bbffb9812b978
SHA1b70e27eb446fe1c3bc8ea03dabbee2739a782e04
SHA256f74c97b1a53541b059d3bfafe41a79005ce5065f8210d7de9f1b600dc4e28aa0
SHA512a8b16bc60f8559c78c64ca9e85cd7fd704bba1f55b362465b7accef1bb853d1c9616995a35f972256c57fbe877ce880398ba1fbceaa658604883aa12dcbc4f57
-
Filesize
285KB
MD5b77a2a2768b9cc78a71bbffb9812b978
SHA1b70e27eb446fe1c3bc8ea03dabbee2739a782e04
SHA256f74c97b1a53541b059d3bfafe41a79005ce5065f8210d7de9f1b600dc4e28aa0
SHA512a8b16bc60f8559c78c64ca9e85cd7fd704bba1f55b362465b7accef1bb853d1c9616995a35f972256c57fbe877ce880398ba1fbceaa658604883aa12dcbc4f57
-
Filesize
285KB
MD5b77a2a2768b9cc78a71bbffb9812b978
SHA1b70e27eb446fe1c3bc8ea03dabbee2739a782e04
SHA256f74c97b1a53541b059d3bfafe41a79005ce5065f8210d7de9f1b600dc4e28aa0
SHA512a8b16bc60f8559c78c64ca9e85cd7fd704bba1f55b362465b7accef1bb853d1c9616995a35f972256c57fbe877ce880398ba1fbceaa658604883aa12dcbc4f57