Analysis
-
max time kernel
131s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
556b51b8c2e2516235372629d158d6a10e11e4fcbb8e4fa67a3f5a5a54846f08_JC.msi
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
556b51b8c2e2516235372629d158d6a10e11e4fcbb8e4fa67a3f5a5a54846f08_JC.msi
Resource
win10v2004-20230915-en
General
-
Target
556b51b8c2e2516235372629d158d6a10e11e4fcbb8e4fa67a3f5a5a54846f08_JC.msi
-
Size
1.5MB
-
MD5
daba6863275095fb07eece679c8bf098
-
SHA1
a5506ef0b0998abcb935633c8b1ebeddbc324769
-
SHA256
556b51b8c2e2516235372629d158d6a10e11e4fcbb8e4fa67a3f5a5a54846f08
-
SHA512
254e4f2c26893c9b8a97a29126c975c374380f4738605c8cebd8bb537a18a0f85ba871e650a33c54564154584a5ca1f18e708a9f7a9f6dd13c663990b136ff57
-
SSDEEP
24576:QJcLlYOINVUuD6yS1wGbXpsHzCsalfLK/hVfAmDX8qrJrKPyVqmY1:vLlYO+UuD6ySaGbX+H9a9+hVfA4X84po
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4804 MsiExec.exe 4804 MsiExec.exe 4804 MsiExec.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 24 1088 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIF2D9.tmp msiexec.exe File created C:\Windows\Installer\e5830a0.msi msiexec.exe File opened for modification C:\Windows\Installer\e5830a0.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI3E3D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDF7F.tmp msiexec.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 1088 msiexec.exe Token: SeIncreaseQuotaPrivilege 1088 msiexec.exe Token: SeSecurityPrivilege 2112 msiexec.exe Token: SeCreateTokenPrivilege 1088 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1088 msiexec.exe Token: SeLockMemoryPrivilege 1088 msiexec.exe Token: SeIncreaseQuotaPrivilege 1088 msiexec.exe Token: SeMachineAccountPrivilege 1088 msiexec.exe Token: SeTcbPrivilege 1088 msiexec.exe Token: SeSecurityPrivilege 1088 msiexec.exe Token: SeTakeOwnershipPrivilege 1088 msiexec.exe Token: SeLoadDriverPrivilege 1088 msiexec.exe Token: SeSystemProfilePrivilege 1088 msiexec.exe Token: SeSystemtimePrivilege 1088 msiexec.exe Token: SeProfSingleProcessPrivilege 1088 msiexec.exe Token: SeIncBasePriorityPrivilege 1088 msiexec.exe Token: SeCreatePagefilePrivilege 1088 msiexec.exe Token: SeCreatePermanentPrivilege 1088 msiexec.exe Token: SeBackupPrivilege 1088 msiexec.exe Token: SeRestorePrivilege 1088 msiexec.exe Token: SeShutdownPrivilege 1088 msiexec.exe Token: SeDebugPrivilege 1088 msiexec.exe Token: SeAuditPrivilege 1088 msiexec.exe Token: SeSystemEnvironmentPrivilege 1088 msiexec.exe Token: SeChangeNotifyPrivilege 1088 msiexec.exe Token: SeRemoteShutdownPrivilege 1088 msiexec.exe Token: SeUndockPrivilege 1088 msiexec.exe Token: SeSyncAgentPrivilege 1088 msiexec.exe Token: SeEnableDelegationPrivilege 1088 msiexec.exe Token: SeManageVolumePrivilege 1088 msiexec.exe Token: SeImpersonatePrivilege 1088 msiexec.exe Token: SeCreateGlobalPrivilege 1088 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1088 msiexec.exe 1088 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 4804 2112 msiexec.exe 90 PID 2112 wrote to memory of 4804 2112 msiexec.exe 90 PID 2112 wrote to memory of 4804 2112 msiexec.exe 90
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\556b51b8c2e2516235372629d158d6a10e11e4fcbb8e4fa67a3f5a5a54846f08_JC.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1088
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1EF79364D31A42EBF58785AC16F989B32⤵
- Loads dropped DLL
PID:4804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5d23c9b725dc88a729250a65229e35b39
SHA1112a859b1c905e6514e0f18a8a41ec6455ca617f
SHA256284e1b5af1e6a57f776cd82093be19820ab3c90ca1c4639c4b11f7a00a3e6877
SHA512e049af99a7d4a265eb8cd9a2e31c4d387b8a42683d4a80fe935ead8a95b1f456407129dad241aa956fc6ebc2b3b52886a5668499d7f256232c3c372c70a8f465
-
Filesize
384KB
MD5d23c9b725dc88a729250a65229e35b39
SHA1112a859b1c905e6514e0f18a8a41ec6455ca617f
SHA256284e1b5af1e6a57f776cd82093be19820ab3c90ca1c4639c4b11f7a00a3e6877
SHA512e049af99a7d4a265eb8cd9a2e31c4d387b8a42683d4a80fe935ead8a95b1f456407129dad241aa956fc6ebc2b3b52886a5668499d7f256232c3c372c70a8f465
-
Filesize
384KB
MD5d23c9b725dc88a729250a65229e35b39
SHA1112a859b1c905e6514e0f18a8a41ec6455ca617f
SHA256284e1b5af1e6a57f776cd82093be19820ab3c90ca1c4639c4b11f7a00a3e6877
SHA512e049af99a7d4a265eb8cd9a2e31c4d387b8a42683d4a80fe935ead8a95b1f456407129dad241aa956fc6ebc2b3b52886a5668499d7f256232c3c372c70a8f465
-
Filesize
384KB
MD5d23c9b725dc88a729250a65229e35b39
SHA1112a859b1c905e6514e0f18a8a41ec6455ca617f
SHA256284e1b5af1e6a57f776cd82093be19820ab3c90ca1c4639c4b11f7a00a3e6877
SHA512e049af99a7d4a265eb8cd9a2e31c4d387b8a42683d4a80fe935ead8a95b1f456407129dad241aa956fc6ebc2b3b52886a5668499d7f256232c3c372c70a8f465
-
Filesize
384KB
MD5d23c9b725dc88a729250a65229e35b39
SHA1112a859b1c905e6514e0f18a8a41ec6455ca617f
SHA256284e1b5af1e6a57f776cd82093be19820ab3c90ca1c4639c4b11f7a00a3e6877
SHA512e049af99a7d4a265eb8cd9a2e31c4d387b8a42683d4a80fe935ead8a95b1f456407129dad241aa956fc6ebc2b3b52886a5668499d7f256232c3c372c70a8f465
-
Filesize
384KB
MD5d23c9b725dc88a729250a65229e35b39
SHA1112a859b1c905e6514e0f18a8a41ec6455ca617f
SHA256284e1b5af1e6a57f776cd82093be19820ab3c90ca1c4639c4b11f7a00a3e6877
SHA512e049af99a7d4a265eb8cd9a2e31c4d387b8a42683d4a80fe935ead8a95b1f456407129dad241aa956fc6ebc2b3b52886a5668499d7f256232c3c372c70a8f465
-
Filesize
384KB
MD5d23c9b725dc88a729250a65229e35b39
SHA1112a859b1c905e6514e0f18a8a41ec6455ca617f
SHA256284e1b5af1e6a57f776cd82093be19820ab3c90ca1c4639c4b11f7a00a3e6877
SHA512e049af99a7d4a265eb8cd9a2e31c4d387b8a42683d4a80fe935ead8a95b1f456407129dad241aa956fc6ebc2b3b52886a5668499d7f256232c3c372c70a8f465