Analysis

  • max time kernel
    153s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 01:20

General

  • Target

    node-v14.15.4-x64.msi

  • Size

    28.9MB

  • MD5

    e34c5147dda4d4c4960e7f3471281093

  • SHA1

    3d448390f2179b332f35dd13ffcee7541f496cbf

  • SHA256

    346a053dcd7508f1e5fbb2da0e34cbb3da206ab2439c4bab5a219c3b75e62475

  • SHA512

    5d6e9c0dea877c23e054bee2461cf5286ec304ae449d0c4c2fbb7d6fcd2e37da6bd3ea886e6aedde985d077dcfa1f3a65ff0d322d97724cd844fd03c983763f7

  • SSDEEP

    786432:ZpTBIQk8nk9jDdozbJuYwNZnbnxfv18X:ZpTNk8ktdoztwNZna

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\node-v14.15.4-x64.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3416
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 9F3F55CFBA2732384901C242E9129C09 C
      2⤵
      • Loads dropped DLL
      PID:3160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIF443.tmp

    Filesize

    120KB

    MD5

    a32e4b24b124903f092b62171fce4cc1

    SHA1

    ff6f4c3fa9418f0c209ef273fd2a7a9906f4bf84

    SHA256

    4d85ae0972ce01d4d975030ad0eb489c9f118f1067f077c16b59402fc65adf20

    SHA512

    366ee6097d7c4d197b92adbc8feb2e5c59cebaa63fd4559f30458f8c55ad400c0a5fcf43bab42a2baee8b2dbf0e4e8687996f09f10349da9f2babd243698bee7

  • C:\Users\Admin\AppData\Local\Temp\MSIF443.tmp

    Filesize

    120KB

    MD5

    a32e4b24b124903f092b62171fce4cc1

    SHA1

    ff6f4c3fa9418f0c209ef273fd2a7a9906f4bf84

    SHA256

    4d85ae0972ce01d4d975030ad0eb489c9f118f1067f077c16b59402fc65adf20

    SHA512

    366ee6097d7c4d197b92adbc8feb2e5c59cebaa63fd4559f30458f8c55ad400c0a5fcf43bab42a2baee8b2dbf0e4e8687996f09f10349da9f2babd243698bee7