Analysis

  • max time kernel
    121s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2023, 03:03

General

  • Target

    nvim-win64.msi

  • Size

    39.8MB

  • MD5

    f256936ddc4d9127861e6205498a384c

  • SHA1

    e8231e931847b092a10622487757bce540e1dadc

  • SHA256

    07a9f278635b91478ced01be1f2818b924b436f1d2e2867c687b7a92b6e702e0

  • SHA512

    6317475164c45eec2a8e6bc99716128ddef168b04087887d0b859617ea5911d5b686f63227f4ef4f7d21e353f40f0585f3e93589fbeccd7a14cfdf2c9e120e5f

  • SSDEEP

    786432:IRm76RfBO0BGNfwkB4r3h79A4PwPh543RC0S0/JkitDUksLWG7M4LN:4TfB4NfwkB4N75Ef+RD6ixILWG7M4LN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\nvim-win64.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4612
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads