Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 01:02

General

  • Target

    Android ADB Fastboot 1.7.msi

  • Size

    3.7MB

  • MD5

    0a1e784597bc17f9b420796a7b931eeb

  • SHA1

    f2f9d0e17278a3eb9a6428b4cd6a1ca4094f7009

  • SHA256

    367521fd6b5f361df98a7c5b3809f030b64c431609d7ae4ba2690850ccf11b76

  • SHA512

    31bde1cd229f178b045429fcfc3b0d0f6f0d9c99e5cc7ec257e638ed3c713852e55f58bbf5bb2bdad2018038f0a69ea3aae066c6c24ea288f83c4ea5023670bb

  • SSDEEP

    98304:5YwADYeHcczaFB8i99RDGgYQB1mdMgWqO:jASIi9f97B1m6gA

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Android ADB Fastboot 1.7.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2180
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 241BA317910FA5BADF38B7A4F827DC33 C
      2⤵
      • Loads dropped DLL
      PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI6A57.tmp

    Filesize

    209KB

    MD5

    26bb078a67c7eedd5e55756e49e08150

    SHA1

    17475069b69ea63f637694ecfaad694499e2a09e

    SHA256

    4f4ad63074a619bf5505aab6e81db5be0c2368e2c3aa48f5874607a00c89f81e

    SHA512

    b929ba0960fa103fd9cbbb824fe41f1f49b3072c7ea715b46fd583e002638c81909c6194bfea7f480ff79ce3a1e411591a9b3d9b3213dbda2eea3df3b08b019f

  • C:\Users\Admin\AppData\Local\Temp\MSI6C7A.tmp

    Filesize

    209KB

    MD5

    26bb078a67c7eedd5e55756e49e08150

    SHA1

    17475069b69ea63f637694ecfaad694499e2a09e

    SHA256

    4f4ad63074a619bf5505aab6e81db5be0c2368e2c3aa48f5874607a00c89f81e

    SHA512

    b929ba0960fa103fd9cbbb824fe41f1f49b3072c7ea715b46fd583e002638c81909c6194bfea7f480ff79ce3a1e411591a9b3d9b3213dbda2eea3df3b08b019f

  • C:\Users\Admin\AppData\Local\Temp\MSI6CB9.tmp

    Filesize

    209KB

    MD5

    26bb078a67c7eedd5e55756e49e08150

    SHA1

    17475069b69ea63f637694ecfaad694499e2a09e

    SHA256

    4f4ad63074a619bf5505aab6e81db5be0c2368e2c3aa48f5874607a00c89f81e

    SHA512

    b929ba0960fa103fd9cbbb824fe41f1f49b3072c7ea715b46fd583e002638c81909c6194bfea7f480ff79ce3a1e411591a9b3d9b3213dbda2eea3df3b08b019f

  • C:\Users\Admin\AppData\Local\Temp\MSI6CB9.tmp

    Filesize

    209KB

    MD5

    26bb078a67c7eedd5e55756e49e08150

    SHA1

    17475069b69ea63f637694ecfaad694499e2a09e

    SHA256

    4f4ad63074a619bf5505aab6e81db5be0c2368e2c3aa48f5874607a00c89f81e

    SHA512

    b929ba0960fa103fd9cbbb824fe41f1f49b3072c7ea715b46fd583e002638c81909c6194bfea7f480ff79ce3a1e411591a9b3d9b3213dbda2eea3df3b08b019f

  • C:\Users\Admin\AppData\Local\Temp\MSI6D37.tmp

    Filesize

    209KB

    MD5

    26bb078a67c7eedd5e55756e49e08150

    SHA1

    17475069b69ea63f637694ecfaad694499e2a09e

    SHA256

    4f4ad63074a619bf5505aab6e81db5be0c2368e2c3aa48f5874607a00c89f81e

    SHA512

    b929ba0960fa103fd9cbbb824fe41f1f49b3072c7ea715b46fd583e002638c81909c6194bfea7f480ff79ce3a1e411591a9b3d9b3213dbda2eea3df3b08b019f

  • \Users\Admin\AppData\Local\Temp\MSI6A57.tmp

    Filesize

    209KB

    MD5

    26bb078a67c7eedd5e55756e49e08150

    SHA1

    17475069b69ea63f637694ecfaad694499e2a09e

    SHA256

    4f4ad63074a619bf5505aab6e81db5be0c2368e2c3aa48f5874607a00c89f81e

    SHA512

    b929ba0960fa103fd9cbbb824fe41f1f49b3072c7ea715b46fd583e002638c81909c6194bfea7f480ff79ce3a1e411591a9b3d9b3213dbda2eea3df3b08b019f

  • \Users\Admin\AppData\Local\Temp\MSI6C7A.tmp

    Filesize

    209KB

    MD5

    26bb078a67c7eedd5e55756e49e08150

    SHA1

    17475069b69ea63f637694ecfaad694499e2a09e

    SHA256

    4f4ad63074a619bf5505aab6e81db5be0c2368e2c3aa48f5874607a00c89f81e

    SHA512

    b929ba0960fa103fd9cbbb824fe41f1f49b3072c7ea715b46fd583e002638c81909c6194bfea7f480ff79ce3a1e411591a9b3d9b3213dbda2eea3df3b08b019f

  • \Users\Admin\AppData\Local\Temp\MSI6CB9.tmp

    Filesize

    209KB

    MD5

    26bb078a67c7eedd5e55756e49e08150

    SHA1

    17475069b69ea63f637694ecfaad694499e2a09e

    SHA256

    4f4ad63074a619bf5505aab6e81db5be0c2368e2c3aa48f5874607a00c89f81e

    SHA512

    b929ba0960fa103fd9cbbb824fe41f1f49b3072c7ea715b46fd583e002638c81909c6194bfea7f480ff79ce3a1e411591a9b3d9b3213dbda2eea3df3b08b019f

  • \Users\Admin\AppData\Local\Temp\MSI6D37.tmp

    Filesize

    209KB

    MD5

    26bb078a67c7eedd5e55756e49e08150

    SHA1

    17475069b69ea63f637694ecfaad694499e2a09e

    SHA256

    4f4ad63074a619bf5505aab6e81db5be0c2368e2c3aa48f5874607a00c89f81e

    SHA512

    b929ba0960fa103fd9cbbb824fe41f1f49b3072c7ea715b46fd583e002638c81909c6194bfea7f480ff79ce3a1e411591a9b3d9b3213dbda2eea3df3b08b019f