Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2023, 11:58

General

  • Target

    PrintTemplateActiveXInstaller.msi

  • Size

    267KB

  • MD5

    fa290140794d96887a1f4bd663f8329e

  • SHA1

    379e4ab677f2369e54971e22ca09f6618cc8ef9a

  • SHA256

    f2662f0e68c4484ba6d606620d2eca1a91ef6907e38cecb3cd5b07b41eeb418a

  • SHA512

    918d0314c3d740470c6017a8a5191d9c8f990d483db98ec3bbee58dfb4a840198d18955e7e5a8b625a9e7ab04631f4a3ae6d514d37dea197fda88f6d115e2443

  • SSDEEP

    6144:Wedq1vsu8opHBJbyuPlopG+kd/4Usqv/CFjQYa1R3yRUdA8LVIUfEd:roZ3BJbF+3UXv/gjC3uoVIU

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\PrintTemplateActiveXInstaller.msi
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2012
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads