Analysis
-
max time kernel
144s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
tg-zh_x64_JC.msi
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tg-zh_x64_JC.msi
Resource
win10v2004-20230915-en
General
-
Target
tg-zh_x64_JC.msi
-
Size
86.2MB
-
MD5
30836fe3710940e6378f9e1d502054f6
-
SHA1
03abea575d12aac3cab27f77794ba4a83a466864
-
SHA256
47109bb6d48646bbac4e3fa388c1887e02a700c16c878eda092a8dfafe32b3ba
-
SHA512
12a9f3b30d4260769424beb2daa03abb8c859244e5d45778771387359a4f81840f884dc9357702f2f38b76cce0ad795b2908e5d61269d46a0f53954230397b5a
-
SSDEEP
1572864:F2pttD7y0/3rc+QuHXQ6rhXOKa2zpnkA4tzvCRU9vQwFnw7n3Xjo+X+Db:MDe0/3rWuHgonrkaRevNFnenxcb
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2552 MsiExec.exe 2552 MsiExec.exe 2552 MsiExec.exe 2552 MsiExec.exe 2552 MsiExec.exe 2552 MsiExec.exe 2552 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2652 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2652 msiexec.exe Token: SeIncreaseQuotaPrivilege 2652 msiexec.exe Token: SeRestorePrivilege 2708 msiexec.exe Token: SeTakeOwnershipPrivilege 2708 msiexec.exe Token: SeSecurityPrivilege 2708 msiexec.exe Token: SeCreateTokenPrivilege 2652 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2652 msiexec.exe Token: SeLockMemoryPrivilege 2652 msiexec.exe Token: SeIncreaseQuotaPrivilege 2652 msiexec.exe Token: SeMachineAccountPrivilege 2652 msiexec.exe Token: SeTcbPrivilege 2652 msiexec.exe Token: SeSecurityPrivilege 2652 msiexec.exe Token: SeTakeOwnershipPrivilege 2652 msiexec.exe Token: SeLoadDriverPrivilege 2652 msiexec.exe Token: SeSystemProfilePrivilege 2652 msiexec.exe Token: SeSystemtimePrivilege 2652 msiexec.exe Token: SeProfSingleProcessPrivilege 2652 msiexec.exe Token: SeIncBasePriorityPrivilege 2652 msiexec.exe Token: SeCreatePagefilePrivilege 2652 msiexec.exe Token: SeCreatePermanentPrivilege 2652 msiexec.exe Token: SeBackupPrivilege 2652 msiexec.exe Token: SeRestorePrivilege 2652 msiexec.exe Token: SeShutdownPrivilege 2652 msiexec.exe Token: SeDebugPrivilege 2652 msiexec.exe Token: SeAuditPrivilege 2652 msiexec.exe Token: SeSystemEnvironmentPrivilege 2652 msiexec.exe Token: SeChangeNotifyPrivilege 2652 msiexec.exe Token: SeRemoteShutdownPrivilege 2652 msiexec.exe Token: SeUndockPrivilege 2652 msiexec.exe Token: SeSyncAgentPrivilege 2652 msiexec.exe Token: SeEnableDelegationPrivilege 2652 msiexec.exe Token: SeManageVolumePrivilege 2652 msiexec.exe Token: SeImpersonatePrivilege 2652 msiexec.exe Token: SeCreateGlobalPrivilege 2652 msiexec.exe Token: SeCreateTokenPrivilege 2652 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2652 msiexec.exe Token: SeLockMemoryPrivilege 2652 msiexec.exe Token: SeIncreaseQuotaPrivilege 2652 msiexec.exe Token: SeMachineAccountPrivilege 2652 msiexec.exe Token: SeTcbPrivilege 2652 msiexec.exe Token: SeSecurityPrivilege 2652 msiexec.exe Token: SeTakeOwnershipPrivilege 2652 msiexec.exe Token: SeLoadDriverPrivilege 2652 msiexec.exe Token: SeSystemProfilePrivilege 2652 msiexec.exe Token: SeSystemtimePrivilege 2652 msiexec.exe Token: SeProfSingleProcessPrivilege 2652 msiexec.exe Token: SeIncBasePriorityPrivilege 2652 msiexec.exe Token: SeCreatePagefilePrivilege 2652 msiexec.exe Token: SeCreatePermanentPrivilege 2652 msiexec.exe Token: SeBackupPrivilege 2652 msiexec.exe Token: SeRestorePrivilege 2652 msiexec.exe Token: SeShutdownPrivilege 2652 msiexec.exe Token: SeDebugPrivilege 2652 msiexec.exe Token: SeAuditPrivilege 2652 msiexec.exe Token: SeSystemEnvironmentPrivilege 2652 msiexec.exe Token: SeChangeNotifyPrivilege 2652 msiexec.exe Token: SeRemoteShutdownPrivilege 2652 msiexec.exe Token: SeUndockPrivilege 2652 msiexec.exe Token: SeSyncAgentPrivilege 2652 msiexec.exe Token: SeEnableDelegationPrivilege 2652 msiexec.exe Token: SeManageVolumePrivilege 2652 msiexec.exe Token: SeImpersonatePrivilege 2652 msiexec.exe Token: SeCreateGlobalPrivilege 2652 msiexec.exe Token: SeCreateTokenPrivilege 2652 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2552 2708 msiexec.exe 31 PID 2708 wrote to memory of 2552 2708 msiexec.exe 31 PID 2708 wrote to memory of 2552 2708 msiexec.exe 31 PID 2708 wrote to memory of 2552 2708 msiexec.exe 31 PID 2708 wrote to memory of 2552 2708 msiexec.exe 31 PID 2708 wrote to memory of 2552 2708 msiexec.exe 31 PID 2708 wrote to memory of 2552 2708 msiexec.exe 31
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\tg-zh_x64_JC.msi1⤵
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2652
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B6B7F3A4D01B224E8C85BB4603DCDF71 C2⤵
- Loads dropped DLL
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
703KB
MD559f4b7e8b960987b68b311660c99957a
SHA13ba452e27d4bf53e72bf28cde68240290e72e46f
SHA2563b43d469e1f3656f948eabbd9e1ed99570a7962118fcfc9ccaa309eb657502bf
SHA51264bd1ddbc90dfae6a7b34b67eaa32a0fd03e5ccff7e25f997dfb488f56b7ab2c7fab867915d05ba40f215216f87942d035e740edd64db7cb6df049a589dde27b
-
Filesize
1.0MB
MD55566149fc623f29d55ca72018369c780
SHA18ae947ab0ae9182f1c09bd266ff360c0e8b88326
SHA256a8c8ff2a0e754059b1f44ef69df492ef3cd582f3750f8c374037c9621069c608
SHA512f9f49c930c3ead40f208482ab6f70a21a8495fd1c50b56a3f689eb53e8e7b8ca9a642bae2199fc80b6099bd3fdd3c4cfcd0d3a8cada47ebf23c7fcef87064cb5
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
703KB
MD559f4b7e8b960987b68b311660c99957a
SHA13ba452e27d4bf53e72bf28cde68240290e72e46f
SHA2563b43d469e1f3656f948eabbd9e1ed99570a7962118fcfc9ccaa309eb657502bf
SHA51264bd1ddbc90dfae6a7b34b67eaa32a0fd03e5ccff7e25f997dfb488f56b7ab2c7fab867915d05ba40f215216f87942d035e740edd64db7cb6df049a589dde27b
-
Filesize
1.0MB
MD55566149fc623f29d55ca72018369c780
SHA18ae947ab0ae9182f1c09bd266ff360c0e8b88326
SHA256a8c8ff2a0e754059b1f44ef69df492ef3cd582f3750f8c374037c9621069c608
SHA512f9f49c930c3ead40f208482ab6f70a21a8495fd1c50b56a3f689eb53e8e7b8ca9a642bae2199fc80b6099bd3fdd3c4cfcd0d3a8cada47ebf23c7fcef87064cb5
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39
-
Filesize
557KB
MD5e1423fc5ddaedc0152a09f4796243e31
SHA1c92cec1fb6093d6922fe64719e583048fca12153
SHA2563042d947f0e3accd3307d4d983aba352c4b01f6ca10aa45dbe660ca0a0a107de
SHA512fc21fadb5b86dc0c4fc8fea5d166b9b8a500df2b662c201626a8bcf6d3f7bd590b8ec3bae31f2f558b74ccb49ca74f51ee48b19bd047a27ef0c794b21cc84b39