Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-es -
resource tags
arch:x64arch:x86image:win10v2004-20230703-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
18-08-2023 20:34
Static task
static1
Behavioral task
behavioral1
Sample
ReF_SaT589.msi
Resource
win7-20230712-es
Behavioral task
behavioral2
Sample
ReF_SaT589.msi
Resource
win10v2004-20230703-es
General
-
Target
ReF_SaT589.msi
-
Size
12.3MB
-
MD5
9b61bbdf8d85729e4ebe0785fe6436c9
-
SHA1
ec07c46d7a3903cc7bd9b868efec4aba81548332
-
SHA256
e7d27ef86adb6f7d75a19675742a12f7390bfafb60bfeb17a16d80ec211761db
-
SHA512
592104b2208347953c96431b9cbb36813d62d068a380e1956cd0bbbda85da2d2073f916307f9e742d2ba44ae6523ed02645e43fbd3f926fa7305ffd9f8a78d9f
-
SSDEEP
98304:07mwfue/kPH85N5a91u83vTezizUZ8e5PWPz4SX5zXX9qYAe7z9KCdHgTTMrZUxT:07mQeLecNPz4yRXcaz5dHSIrZVWPEi
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 17 3912 MsiExec.exe -
Executes dropped EXE 1 IoCs
pid Process 932 BlueBirdInit.exe -
Loads dropped DLL 10 IoCs
pid Process 3912 MsiExec.exe 3912 MsiExec.exe 3912 MsiExec.exe 3912 MsiExec.exe 3912 MsiExec.exe 3912 MsiExec.exe 3912 MsiExec.exe 932 BlueBirdInit.exe 932 BlueBirdInit.exe 5104 explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NVIDIA_GeForce_Experience_KHQJMFWR = "\"C:\\fcvx\\BlueBirdInit.exe\"" explorer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIB366.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{8FFD806E-A3BB-4ECE-B003-58BB807853D9} msiexec.exe File opened for modification C:\Windows\Installer\e57ad86.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIAE80.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB20B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB326.tmp msiexec.exe File created C:\Windows\Installer\e57ad86.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIB2B8.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIB607.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB617.tmp msiexec.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\(Padrão) 2 = "BlueBirdInit" BlueBirdInit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\(Padrão) 3 = "C:\\fcvx\\" BlueBirdInit.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1288 msiexec.exe 1288 msiexec.exe 1288 msiexec.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe 5104 explorer.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 4184 msiexec.exe Token: SeIncreaseQuotaPrivilege 4184 msiexec.exe Token: SeSecurityPrivilege 1288 msiexec.exe Token: SeCreateTokenPrivilege 4184 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4184 msiexec.exe Token: SeLockMemoryPrivilege 4184 msiexec.exe Token: SeIncreaseQuotaPrivilege 4184 msiexec.exe Token: SeMachineAccountPrivilege 4184 msiexec.exe Token: SeTcbPrivilege 4184 msiexec.exe Token: SeSecurityPrivilege 4184 msiexec.exe Token: SeTakeOwnershipPrivilege 4184 msiexec.exe Token: SeLoadDriverPrivilege 4184 msiexec.exe Token: SeSystemProfilePrivilege 4184 msiexec.exe Token: SeSystemtimePrivilege 4184 msiexec.exe Token: SeProfSingleProcessPrivilege 4184 msiexec.exe Token: SeIncBasePriorityPrivilege 4184 msiexec.exe Token: SeCreatePagefilePrivilege 4184 msiexec.exe Token: SeCreatePermanentPrivilege 4184 msiexec.exe Token: SeBackupPrivilege 4184 msiexec.exe Token: SeRestorePrivilege 4184 msiexec.exe Token: SeShutdownPrivilege 4184 msiexec.exe Token: SeDebugPrivilege 4184 msiexec.exe Token: SeAuditPrivilege 4184 msiexec.exe Token: SeSystemEnvironmentPrivilege 4184 msiexec.exe Token: SeChangeNotifyPrivilege 4184 msiexec.exe Token: SeRemoteShutdownPrivilege 4184 msiexec.exe Token: SeUndockPrivilege 4184 msiexec.exe Token: SeSyncAgentPrivilege 4184 msiexec.exe Token: SeEnableDelegationPrivilege 4184 msiexec.exe Token: SeManageVolumePrivilege 4184 msiexec.exe Token: SeImpersonatePrivilege 4184 msiexec.exe Token: SeCreateGlobalPrivilege 4184 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeSecurityPrivilege 932 BlueBirdInit.exe Token: SeDebugPrivilege 932 BlueBirdInit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4184 msiexec.exe 4184 msiexec.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1288 wrote to memory of 3912 1288 msiexec.exe 84 PID 1288 wrote to memory of 3912 1288 msiexec.exe 84 PID 1288 wrote to memory of 3912 1288 msiexec.exe 84 PID 3912 wrote to memory of 932 3912 MsiExec.exe 93 PID 3912 wrote to memory of 932 3912 MsiExec.exe 93 PID 3912 wrote to memory of 932 3912 MsiExec.exe 93 PID 932 wrote to memory of 5104 932 BlueBirdInit.exe 94 PID 932 wrote to memory of 5104 932 BlueBirdInit.exe 94 PID 932 wrote to memory of 5104 932 BlueBirdInit.exe 94 PID 932 wrote to memory of 5104 932 BlueBirdInit.exe 94
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ReF_SaT589.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4184
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1763A1BE0EAD711688F3A8A4B0A490042⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\fcvx\BlueBirdInit.exeC:\fcvx\BlueBirdInit.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"4⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
1.0MB
MD55566149fc623f29d55ca72018369c780
SHA18ae947ab0ae9182f1c09bd266ff360c0e8b88326
SHA256a8c8ff2a0e754059b1f44ef69df492ef3cd582f3750f8c374037c9621069c608
SHA512f9f49c930c3ead40f208482ab6f70a21a8495fd1c50b56a3f689eb53e8e7b8ca9a642bae2199fc80b6099bd3fdd3c4cfcd0d3a8cada47ebf23c7fcef87064cb5
-
Filesize
1.0MB
MD55566149fc623f29d55ca72018369c780
SHA18ae947ab0ae9182f1c09bd266ff360c0e8b88326
SHA256a8c8ff2a0e754059b1f44ef69df492ef3cd582f3750f8c374037c9621069c608
SHA512f9f49c930c3ead40f208482ab6f70a21a8495fd1c50b56a3f689eb53e8e7b8ca9a642bae2199fc80b6099bd3fdd3c4cfcd0d3a8cada47ebf23c7fcef87064cb5
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
9.6MB
MD594988aa1e2a8eaa357f4ddbe2c2ecc56
SHA184cec5a8ac354d1b5f168d920e41f8feb39732c2
SHA2566b7d993fc6be7abb1accc93fb46e6ea020879da9a3ed19b43f340fb0dc9563f5
SHA5129bc54ed7d9a8d38a7fe21ccc84f4ba47e17bfb8a798b6ccc46098c4f1b493055f1ddcd4d46934346fa2408c53b51de0fc59a98160d41c0c7bee0158c93667d32
-
Filesize
9.6MB
MD594988aa1e2a8eaa357f4ddbe2c2ecc56
SHA184cec5a8ac354d1b5f168d920e41f8feb39732c2
SHA2566b7d993fc6be7abb1accc93fb46e6ea020879da9a3ed19b43f340fb0dc9563f5
SHA5129bc54ed7d9a8d38a7fe21ccc84f4ba47e17bfb8a798b6ccc46098c4f1b493055f1ddcd4d46934346fa2408c53b51de0fc59a98160d41c0c7bee0158c93667d32
-
Filesize
9.6MB
MD594988aa1e2a8eaa357f4ddbe2c2ecc56
SHA184cec5a8ac354d1b5f168d920e41f8feb39732c2
SHA2566b7d993fc6be7abb1accc93fb46e6ea020879da9a3ed19b43f340fb0dc9563f5
SHA5129bc54ed7d9a8d38a7fe21ccc84f4ba47e17bfb8a798b6ccc46098c4f1b493055f1ddcd4d46934346fa2408c53b51de0fc59a98160d41c0c7bee0158c93667d32
-
Filesize
3.2MB
MD54896e3838be5a54eaffb99992467c4f5
SHA1cb1f6d8f36219816572df76885da9e6898e1c5a9
SHA2561f0ec73a9817b77ce6f6c2deca5a2241a2457849ce6b76720ef165aa1f0ee142
SHA5122358f420e29d756d71452efeb37d86712e746a3ccea727bf890f1cb3a61e897c46703fa6148fd0927e29b4b86c009070160c6cd741abd17bef46a2a210a8ef86
-
Filesize
3.8MB
MD5e3d7c3b1829dc59e5ff05c7a5991da11
SHA19b69512c90792a7e6302915440f130b813bd3b6e
SHA256a799413e470966b8abd51e369658676304b5885dd7a041170b24ffc3f64292e4
SHA5121615d937163d93044469be8d54333f6f43fd4f7faba1a9067ae763df4940ff9707e89b4ae5ff5b8d9173c42c26fa9002be47fe6d9d8563568d72510c94c1e02e
-
Filesize
30.2MB
MD5091404caefce6c561065f3c7b7757389
SHA1830527d7ab47a1d024c8c56513c02d453cac1f3b
SHA2567ab8faeee9e3689fb5b6b4716c01ac7857cd641a3f9b0e267c6775f4b33cbdb0
SHA512c7a226e89ad3bc53057d1f33829ddfb2f562ce7a4e0de2b356c9fc2e53eec0516cef6d79a23525998b68ca7ac0a4bbe1622f7d3ddad366c0fe5f69e66d16d25b
-
Filesize
30.2MB
MD5091404caefce6c561065f3c7b7757389
SHA1830527d7ab47a1d024c8c56513c02d453cac1f3b
SHA2567ab8faeee9e3689fb5b6b4716c01ac7857cd641a3f9b0e267c6775f4b33cbdb0
SHA512c7a226e89ad3bc53057d1f33829ddfb2f562ce7a4e0de2b356c9fc2e53eec0516cef6d79a23525998b68ca7ac0a4bbe1622f7d3ddad366c0fe5f69e66d16d25b
-
Filesize
30.2MB
MD5091404caefce6c561065f3c7b7757389
SHA1830527d7ab47a1d024c8c56513c02d453cac1f3b
SHA2567ab8faeee9e3689fb5b6b4716c01ac7857cd641a3f9b0e267c6775f4b33cbdb0
SHA512c7a226e89ad3bc53057d1f33829ddfb2f562ce7a4e0de2b356c9fc2e53eec0516cef6d79a23525998b68ca7ac0a4bbe1622f7d3ddad366c0fe5f69e66d16d25b
-
Filesize
30.2MB
MD5091404caefce6c561065f3c7b7757389
SHA1830527d7ab47a1d024c8c56513c02d453cac1f3b
SHA2567ab8faeee9e3689fb5b6b4716c01ac7857cd641a3f9b0e267c6775f4b33cbdb0
SHA512c7a226e89ad3bc53057d1f33829ddfb2f562ce7a4e0de2b356c9fc2e53eec0516cef6d79a23525998b68ca7ac0a4bbe1622f7d3ddad366c0fe5f69e66d16d25b