Analysis

  • max time kernel
    77s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2023, 06:09

General

  • Target

    MBSASetup-x64-EN.msi

  • Size

    1.7MB

  • MD5

    4d1ca365cfa721dec991a79f6bb8f308

  • SHA1

    de4a9df45ac40dd901c956edfe2f766d2bfddc92

  • SHA256

    ccbfccdec5d33a479c15ba2bea31f0967d7eb1e9435855111e016105b1b59138

  • SHA512

    dd8e2fe6007648b2a71e2b423d8ea6dcfeee37df9b5bb400a6b49ccf95e50ea2cb2de7bd048704b14c7b71c647d62be9d6df7389192d96edfd969b36d01d52fc

  • SSDEEP

    24576:vCR/g/J/AgxxmdJJfLjCjz/7ITXLtfBKm/SF2EdPRl96vGdp90/ACJxDN9dVr:vCGidJ9K/7ITX5RSFXR3bjrm

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\MBSASetup-x64-EN.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4728
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3420
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B382229B5507D13AA21C9D31C5529EEA C
      2⤵
        PID:4364
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 54F49160FB48CEF3772648A71E85818B C
        2⤵
        • Loads dropped DLL
        PID:4452

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MSIB71B.tmp

      Filesize

      93KB

      MD5

      07603ffada795011e04289447bd47e75

      SHA1

      8fbabd836ec028e89144c55028c1ba2c60b4ae93

      SHA256

      fa5f544b5550a8dc66f67d631c2ae31166c03a0521c15eb5949e2c53664c0e83

      SHA512

      768408527fd3a8b0f65481ced21a09d67b924710d7e571b8be842caefa7c3369636812be3958e75b1b7b9a93fe19632cdebef40590dd1e4a99b341a87c7ece97

    • C:\Users\Admin\AppData\Local\Temp\MSIB71B.tmp

      Filesize

      93KB

      MD5

      07603ffada795011e04289447bd47e75

      SHA1

      8fbabd836ec028e89144c55028c1ba2c60b4ae93

      SHA256

      fa5f544b5550a8dc66f67d631c2ae31166c03a0521c15eb5949e2c53664c0e83

      SHA512

      768408527fd3a8b0f65481ced21a09d67b924710d7e571b8be842caefa7c3369636812be3958e75b1b7b9a93fe19632cdebef40590dd1e4a99b341a87c7ece97

    • C:\Users\Admin\AppData\Local\Temp\MSIB789.tmp

      Filesize

      93KB

      MD5

      07603ffada795011e04289447bd47e75

      SHA1

      8fbabd836ec028e89144c55028c1ba2c60b4ae93

      SHA256

      fa5f544b5550a8dc66f67d631c2ae31166c03a0521c15eb5949e2c53664c0e83

      SHA512

      768408527fd3a8b0f65481ced21a09d67b924710d7e571b8be842caefa7c3369636812be3958e75b1b7b9a93fe19632cdebef40590dd1e4a99b341a87c7ece97

    • C:\Users\Admin\AppData\Local\Temp\MSIB789.tmp

      Filesize

      93KB

      MD5

      07603ffada795011e04289447bd47e75

      SHA1

      8fbabd836ec028e89144c55028c1ba2c60b4ae93

      SHA256

      fa5f544b5550a8dc66f67d631c2ae31166c03a0521c15eb5949e2c53664c0e83

      SHA512

      768408527fd3a8b0f65481ced21a09d67b924710d7e571b8be842caefa7c3369636812be3958e75b1b7b9a93fe19632cdebef40590dd1e4a99b341a87c7ece97

    • C:\Users\Admin\AppData\Local\Temp\MSIB7A9.tmp

      Filesize

      93KB

      MD5

      07603ffada795011e04289447bd47e75

      SHA1

      8fbabd836ec028e89144c55028c1ba2c60b4ae93

      SHA256

      fa5f544b5550a8dc66f67d631c2ae31166c03a0521c15eb5949e2c53664c0e83

      SHA512

      768408527fd3a8b0f65481ced21a09d67b924710d7e571b8be842caefa7c3369636812be3958e75b1b7b9a93fe19632cdebef40590dd1e4a99b341a87c7ece97

    • C:\Users\Admin\AppData\Local\Temp\MSIB7A9.tmp

      Filesize

      93KB

      MD5

      07603ffada795011e04289447bd47e75

      SHA1

      8fbabd836ec028e89144c55028c1ba2c60b4ae93

      SHA256

      fa5f544b5550a8dc66f67d631c2ae31166c03a0521c15eb5949e2c53664c0e83

      SHA512

      768408527fd3a8b0f65481ced21a09d67b924710d7e571b8be842caefa7c3369636812be3958e75b1b7b9a93fe19632cdebef40590dd1e4a99b341a87c7ece97

    • C:\Users\Admin\AppData\Local\Temp\MSIB7A9.tmp

      Filesize

      93KB

      MD5

      07603ffada795011e04289447bd47e75

      SHA1

      8fbabd836ec028e89144c55028c1ba2c60b4ae93

      SHA256

      fa5f544b5550a8dc66f67d631c2ae31166c03a0521c15eb5949e2c53664c0e83

      SHA512

      768408527fd3a8b0f65481ced21a09d67b924710d7e571b8be842caefa7c3369636812be3958e75b1b7b9a93fe19632cdebef40590dd1e4a99b341a87c7ece97

    • C:\Users\Admin\AppData\Local\Temp\MSIB818.tmp

      Filesize

      93KB

      MD5

      07603ffada795011e04289447bd47e75

      SHA1

      8fbabd836ec028e89144c55028c1ba2c60b4ae93

      SHA256

      fa5f544b5550a8dc66f67d631c2ae31166c03a0521c15eb5949e2c53664c0e83

      SHA512

      768408527fd3a8b0f65481ced21a09d67b924710d7e571b8be842caefa7c3369636812be3958e75b1b7b9a93fe19632cdebef40590dd1e4a99b341a87c7ece97

    • C:\Users\Admin\AppData\Local\Temp\MSIB818.tmp

      Filesize

      93KB

      MD5

      07603ffada795011e04289447bd47e75

      SHA1

      8fbabd836ec028e89144c55028c1ba2c60b4ae93

      SHA256

      fa5f544b5550a8dc66f67d631c2ae31166c03a0521c15eb5949e2c53664c0e83

      SHA512

      768408527fd3a8b0f65481ced21a09d67b924710d7e571b8be842caefa7c3369636812be3958e75b1b7b9a93fe19632cdebef40590dd1e4a99b341a87c7ece97