Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 08:26

General

  • Target

    RuneWild-Installer.msi

  • Size

    32.7MB

  • MD5

    c2ea3214cb10165a7a37d94b15a90429

  • SHA1

    2dbbca93ef39f89372c48ea3db97ed37f20c505b

  • SHA256

    c0d925f0837aff64e6b91f5dfb73a25b41d8196580d70a103a1fe38eb2cd3bf8

  • SHA512

    fe2c8bb01518ad104dc5e6d39a0540fe1532ba081f86d963567f0d6cb41f8b114b453543a056178eaf38ea0bb0f251eb2f914c30ec2d6ca9d85b4a56a4c2ff31

  • SSDEEP

    786432:g9XcaQHHRxjmK2HTDsYpdih3I8Xe208Zj0QQKWYG:atyrt2ohYMj03Z3

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\RuneWild-Installer.msi
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3012
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads