Analysis

  • max time kernel
    140s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 08:22

General

  • Target

    PPPOKER_PC_V40-3.6.106.msi

  • Size

    147.0MB

  • MD5

    b07a73cf5e35195852e0aaafe6e86ecf

  • SHA1

    e9e7715dec92c190d131b8cc3ddabaca249c3ddc

  • SHA256

    1c1d551ce2fa68c20a23b5765e812d67c36a45c966dc5a5f3311e052d4da5534

  • SHA512

    24bb6f7a7e291cbaad4577b6986b8d05db9527e261416dc52336763de092412815480dda11693964df46bcfacbbc992065b03deec9ebfa0ed5959be3c1bb80ad

  • SSDEEP

    3145728:tR2mk8LlSebz1BaB5i0FQPj8gRv/U033VS9ig4n0ETR/VvqSSs3B:t3lryi0VgRR3VJg4bhVvvSe

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\PPPOKER_PC_V40-3.6.106.msi
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2796
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads