Analysis

  • max time kernel
    127s
  • max time network
    133s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-10-2023 04:03

General

  • Target

    TGSetup.msi

  • Size

    37.3MB

  • MD5

    a2bf86357fa871600abe9e011ba94008

  • SHA1

    ba0c977df82ea3b008106e15cfbac9ad2bab2dcd

  • SHA256

    0efb729f2661f2e187d9819210a44b8b29906a902ec6b8c31b0f553e6d206bce

  • SHA512

    d831446866c6027d028325665ea56e97c1c01daf670ba2f797997f540941cd5d4babe8373c3165d5ac56fdbe7bf5643f926ad155e5be0f81f915a04f48e6f338

  • SSDEEP

    786432:kvkRSdH4qrxuszvcNEyvDizwAfHXlv6nC2nBl0pZm0PeJ/pyPO:pRQH4qrxJzvEE3wAfVCBlmZ8M

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\TGSetup.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4068
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads