Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 03:37

General

  • Target

    pipWebSetup.msi

  • Size

    4.6MB

  • MD5

    146dca7a4a96d792a0cf477442f4385f

  • SHA1

    63479a3db81ad7e7b1857370d67aeebfa57b3d06

  • SHA256

    a1bbb44f993df2d457d37e3dffb97128223b1c0adedc05a7aa7dfc0daa16c37e

  • SHA512

    da659268601163e60a4555dfc61e7c9d877aa82cf5becdf0b7d86c7c15c671d9887dbf136410b331ea29b1c617d35eb3daf6844c1ca39f170d97533a05e7c384

  • SSDEEP

    98304:gwQ4S3Mm7PNBuPkl25ag8Y78cyWxGCO8Bounzsm:gj4S3Mm7fluag778c7xGC1gm

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\pipWebSetup.msi
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2892
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads