Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
ba0465cc24a52557b503a1156d89cad90d98211884533fd5d9b6cfdbad21c197_JC.msi
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ba0465cc24a52557b503a1156d89cad90d98211884533fd5d9b6cfdbad21c197_JC.msi
Resource
win10v2004-20230703-en
General
-
Target
ba0465cc24a52557b503a1156d89cad90d98211884533fd5d9b6cfdbad21c197_JC.msi
-
Size
9.7MB
-
MD5
e36089dbbcea75175f75a1f202c6ac61
-
SHA1
85e645a412acd8fece59bcdf4d9d42c62b01e62a
-
SHA256
ba0465cc24a52557b503a1156d89cad90d98211884533fd5d9b6cfdbad21c197
-
SHA512
90fc728e0214e7cd7fb5b502d2991e6e434d92d39665e1a5e184ad7b7889526ddf20c337b094f1ae91ffdcea73bb5f64e6198204c8cc6b3d410c5663a793e5ed
-
SSDEEP
49152:J9f6RZMCZNlQ+EsEf7JWG5T+xFSUbwhx/2QE4ftat3/KsnWsm9cVIrU8+c73cIU5:SMCZN9d44WsOmucBqI/0
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 4068 MsiExec.exe 4068 MsiExec.exe 4068 MsiExec.exe 4068 MsiExec.exe 3276 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: msiexec.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\Installer\e57638c.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI6448.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6832.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI68B0.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{I9J3X8YC-ORNX-D3CS-Y2RY-WL0ET607SELM} msiexec.exe File opened for modification C:\Windows\Installer\MSI6C5B.tmp msiexec.exe File opened for modification C:\Windows\Installer\e57638c.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI6746.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6BCE.tmp msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4676 msiexec.exe 4676 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 4340 msiexec.exe Token: SeIncreaseQuotaPrivilege 4340 msiexec.exe Token: SeSecurityPrivilege 4676 msiexec.exe Token: SeCreateTokenPrivilege 4340 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4340 msiexec.exe Token: SeLockMemoryPrivilege 4340 msiexec.exe Token: SeIncreaseQuotaPrivilege 4340 msiexec.exe Token: SeMachineAccountPrivilege 4340 msiexec.exe Token: SeTcbPrivilege 4340 msiexec.exe Token: SeSecurityPrivilege 4340 msiexec.exe Token: SeTakeOwnershipPrivilege 4340 msiexec.exe Token: SeLoadDriverPrivilege 4340 msiexec.exe Token: SeSystemProfilePrivilege 4340 msiexec.exe Token: SeSystemtimePrivilege 4340 msiexec.exe Token: SeProfSingleProcessPrivilege 4340 msiexec.exe Token: SeIncBasePriorityPrivilege 4340 msiexec.exe Token: SeCreatePagefilePrivilege 4340 msiexec.exe Token: SeCreatePermanentPrivilege 4340 msiexec.exe Token: SeBackupPrivilege 4340 msiexec.exe Token: SeRestorePrivilege 4340 msiexec.exe Token: SeShutdownPrivilege 4340 msiexec.exe Token: SeDebugPrivilege 4340 msiexec.exe Token: SeAuditPrivilege 4340 msiexec.exe Token: SeSystemEnvironmentPrivilege 4340 msiexec.exe Token: SeChangeNotifyPrivilege 4340 msiexec.exe Token: SeRemoteShutdownPrivilege 4340 msiexec.exe Token: SeUndockPrivilege 4340 msiexec.exe Token: SeSyncAgentPrivilege 4340 msiexec.exe Token: SeEnableDelegationPrivilege 4340 msiexec.exe Token: SeManageVolumePrivilege 4340 msiexec.exe Token: SeImpersonatePrivilege 4340 msiexec.exe Token: SeCreateGlobalPrivilege 4340 msiexec.exe Token: SeRestorePrivilege 4676 msiexec.exe Token: SeTakeOwnershipPrivilege 4676 msiexec.exe Token: SeRestorePrivilege 4676 msiexec.exe Token: SeTakeOwnershipPrivilege 4676 msiexec.exe Token: SeRestorePrivilege 4676 msiexec.exe Token: SeTakeOwnershipPrivilege 4676 msiexec.exe Token: SeRestorePrivilege 4676 msiexec.exe Token: SeTakeOwnershipPrivilege 4676 msiexec.exe Token: SeRestorePrivilege 4676 msiexec.exe Token: SeTakeOwnershipPrivilege 4676 msiexec.exe Token: SeRestorePrivilege 4676 msiexec.exe Token: SeTakeOwnershipPrivilege 4676 msiexec.exe Token: SeRestorePrivilege 4676 msiexec.exe Token: SeTakeOwnershipPrivilege 4676 msiexec.exe Token: SeRestorePrivilege 4676 msiexec.exe Token: SeTakeOwnershipPrivilege 4676 msiexec.exe Token: SeRestorePrivilege 4676 msiexec.exe Token: SeTakeOwnershipPrivilege 4676 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4340 msiexec.exe 4340 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4676 wrote to memory of 4068 4676 msiexec.exe 83 PID 4676 wrote to memory of 4068 4676 msiexec.exe 83 PID 4676 wrote to memory of 4068 4676 msiexec.exe 83 PID 4676 wrote to memory of 3276 4676 msiexec.exe 84 PID 4676 wrote to memory of 3276 4676 msiexec.exe 84
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ba0465cc24a52557b503a1156d89cad90d98211884533fd5d9b6cfdbad21c197_JC.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4340
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 829D00416193D8EFF9868135797C916D2⤵
- Loads dropped DLL
PID:4068
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding DBD5563A3ECB8C7D998E0B2E620858812⤵
- Loads dropped DLL
PID:3276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
625B
MD51176d17bb9dd92674589bc674e81b7a5
SHA133960a74dc44b40e36b5161e2ebbaeed848ec6df
SHA2564fa607e43815fb3a89adb87275058f1f77801d472ff8758410bac50de997a2c8
SHA512de5c9822271174ce5c3ad797cf9dedc99cfe2853a2e6e560743bb111d0e8326353c87b6501f0df4be9b72b43fea91f78bacf15e821059156d2ecd96115a3806a
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
8.6MB
MD5d0a57dab812c26be2bd967cc576735d5
SHA14b9df083c29aa9591ed8047543badbf5ef711f4d
SHA256ba9e0924b21ed68fb699fb4211aabbb5441a87bdd465e9151c0b9093adb10fb5
SHA512ba73d5471c0a90c1b57fce138e97a62d80e68ff57181f496e9a51ce90144f7c50c846df99d2b3d0b7ae88cb657aa0bda06385c00891afbbe77d8462f88794cd4
-
Filesize
8.6MB
MD5d0a57dab812c26be2bd967cc576735d5
SHA14b9df083c29aa9591ed8047543badbf5ef711f4d
SHA256ba9e0924b21ed68fb699fb4211aabbb5441a87bdd465e9151c0b9093adb10fb5
SHA512ba73d5471c0a90c1b57fce138e97a62d80e68ff57181f496e9a51ce90144f7c50c846df99d2b3d0b7ae88cb657aa0bda06385c00891afbbe77d8462f88794cd4