Analysis

  • max time kernel
    1670s
  • max time network
    1165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2023, 20:20

General

  • Target

    MacroGamer_v275_Setup.msi

  • Size

    667KB

  • MD5

    f7a9d1bf05f8f0e2a1cc6cafd0985070

  • SHA1

    a9f931e9f7c8a7964d19af9b5f938c2dbfcb44e4

  • SHA256

    d82a1cffc6e982b07c0aef61b96b4c36ebd921949c9d4c45a31781539ae443e8

  • SHA512

    c30df08a315c7f161646269254645a2825de1108af85d48cfad8a1e88a6f70c7259235a8eaf235f548d0647760e535dfeb3b43d719398e2f9acb75274b865e6c

  • SSDEEP

    12288:mjDGPXXktIro8FAPUxv9gvIp2z92NFttMDWEzpS6P:mjDGPnkqc8FAM32z92TtwFS6P

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\MacroGamer_v275_Setup.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3288
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3976

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads