Analysis

  • max time kernel
    152s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 12:07

General

  • Target

    Report-103.msi

  • Size

    480KB

  • MD5

    41df43e56e01f43933de04bb60fc1a92

  • SHA1

    dadf7147af3422f00d7877ee3ccd51d0fffa4f8d

  • SHA256

    1adf8384033acd54b0cb29d623812c492cf5e60dd8d8caea368fd426f3105f23

  • SHA512

    a21220edf9bb74f64bf4fa55da289764ddaa8500a17258b9c5a2d56a359297f49d35fe8ab05c2a7bddaca360be7ff7b9bdfe3e13b16180744a37a12127e7d2a0

  • SSDEEP

    12288:StvRQ+gjpjegGpo8gAQHmCVAaIxUh6osx:StncpVGb9wqUM

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Report-103.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:772
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:64
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1252

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads