Analysis

  • max time kernel
    122s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 01:11

General

  • Target

    Setup123.msi

  • Size

    1.8MB

  • MD5

    b23de5f6a3f2c269c8d828fc0dcaa6cf

  • SHA1

    ebed5f4eaac2437bc47e2502c41082ac1c3e9460

  • SHA256

    74e6ff5a3e188edecc8620e3a88cf7b0ba24424a42e2ab66ab7522849621e0e3

  • SHA512

    dfc077484bad5e9a79c24e6e998d5b05277fb865078a7dcfe0a99e6cee5ab08fc2918462992cffa6f7b7c8e8897dc7d0df751178f4688282232071fd0d667027

  • SSDEEP

    24576:3vAJxFNBGa6G6kth0lhSMXlN0Y53rNI1H4ZeJ5MiIf9oNYe9pUdtTWbQ:3o7ckEv53rGl4O5JIf9ofXyS

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Setup123.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1924
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 7DF185B6A4293147A12029965900D474 C
      2⤵
      • Loads dropped DLL
      PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI75EB.tmp

    Filesize

    719KB

    MD5

    89f70b588a48793450dd603b6cd4096f

    SHA1

    9b6509c031856c715d62853c4e93efbdf48d5aeb

    SHA256

    066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

    SHA512

    fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

  • C:\Users\Admin\AppData\Local\Temp\MSI781E.tmp

    Filesize

    719KB

    MD5

    89f70b588a48793450dd603b6cd4096f

    SHA1

    9b6509c031856c715d62853c4e93efbdf48d5aeb

    SHA256

    066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

    SHA512

    fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

  • C:\Users\Admin\AppData\Local\Temp\MSI7909.tmp

    Filesize

    719KB

    MD5

    89f70b588a48793450dd603b6cd4096f

    SHA1

    9b6509c031856c715d62853c4e93efbdf48d5aeb

    SHA256

    066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

    SHA512

    fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

  • C:\Users\Admin\AppData\Local\Temp\MSI7909.tmp

    Filesize

    719KB

    MD5

    89f70b588a48793450dd603b6cd4096f

    SHA1

    9b6509c031856c715d62853c4e93efbdf48d5aeb

    SHA256

    066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

    SHA512

    fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

  • C:\Users\Admin\AppData\Local\Temp\MSI7A70.tmp

    Filesize

    719KB

    MD5

    89f70b588a48793450dd603b6cd4096f

    SHA1

    9b6509c031856c715d62853c4e93efbdf48d5aeb

    SHA256

    066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

    SHA512

    fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

  • \Users\Admin\AppData\Local\Temp\MSI75EB.tmp

    Filesize

    719KB

    MD5

    89f70b588a48793450dd603b6cd4096f

    SHA1

    9b6509c031856c715d62853c4e93efbdf48d5aeb

    SHA256

    066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

    SHA512

    fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

  • \Users\Admin\AppData\Local\Temp\MSI781E.tmp

    Filesize

    719KB

    MD5

    89f70b588a48793450dd603b6cd4096f

    SHA1

    9b6509c031856c715d62853c4e93efbdf48d5aeb

    SHA256

    066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

    SHA512

    fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

  • \Users\Admin\AppData\Local\Temp\MSI7909.tmp

    Filesize

    719KB

    MD5

    89f70b588a48793450dd603b6cd4096f

    SHA1

    9b6509c031856c715d62853c4e93efbdf48d5aeb

    SHA256

    066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

    SHA512

    fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

  • \Users\Admin\AppData\Local\Temp\MSI7A70.tmp

    Filesize

    719KB

    MD5

    89f70b588a48793450dd603b6cd4096f

    SHA1

    9b6509c031856c715d62853c4e93efbdf48d5aeb

    SHA256

    066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

    SHA512

    fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a