Resubmissions
30/10/2023, 09:09
231030-k4sc3aca7s 7Analysis
-
max time kernel
135s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2023, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
swift3d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
swift3d.exe
Resource
win10v2004-20231023-en
General
-
Target
swift3d.exe
-
Size
50.4MB
-
MD5
5077a48c2f143009932c784e153070e2
-
SHA1
808d4fa10d7f63f42f87c881d606572989b50438
-
SHA256
919067f6aca04e29f30f570a157ff2e3cc5d5a5a31822d5eb39ad48737079827
-
SHA512
02aca890ed7d071a105166bd62ecca136e1dd7965db13a0e55d54a758f91c4373e19d76079f3a1e543e4cf5b20e4d81a9055401b5ef6d0a1abcdb51c5b309257
-
SSDEEP
1572864:cMgg7/Ep7QmdAQfP4LkGQeWvHF6uhOOJnAdNgGhnrn1:coMpsmlfQLkGQeqHouhOOJAdNgGhj1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1368 IDriver.exe -
Loads dropped DLL 16 IoCs
pid Process 4336 MsiExec.exe 4336 MsiExec.exe 4336 MsiExec.exe 1368 IDriver.exe 1368 IDriver.exe 1368 IDriver.exe 1368 IDriver.exe 1368 IDriver.exe 1368 IDriver.exe 1368 IDriver.exe 1368 IDriver.exe 1368 IDriver.exe 1368 IDriver.exe 1368 IDriver.exe 4336 MsiExec.exe 4336 MsiExec.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 35 3480 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: MSIEXEC.EXE File opened (read-only) \??\Q: MSIEXEC.EXE File opened (read-only) \??\V: MSIEXEC.EXE File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: MSIEXEC.EXE File opened (read-only) \??\E: MSIEXEC.EXE File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\L: MSIEXEC.EXE File opened (read-only) \??\T: MSIEXEC.EXE File opened (read-only) \??\Y: MSIEXEC.EXE File opened (read-only) \??\Z: MSIEXEC.EXE File opened (read-only) \??\I: MSIEXEC.EXE File opened (read-only) \??\W: MSIEXEC.EXE File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: MSIEXEC.EXE File opened (read-only) \??\R: MSIEXEC.EXE File opened (read-only) \??\X: MSIEXEC.EXE File opened (read-only) \??\S: MSIEXEC.EXE File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\O: MSIEXEC.EXE File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: MSIEXEC.EXE File opened (read-only) \??\B: MSIEXEC.EXE File opened (read-only) \??\G: MSIEXEC.EXE File opened (read-only) \??\M: MSIEXEC.EXE File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: MSIEXEC.EXE File opened (read-only) \??\K: MSIEXEC.EXE File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: MSIEXEC.EXE -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IDriver2.exe msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\ID msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\_ISRES1033.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IUserCnv.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\objpscnv.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\ISRT.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IDriver.exe msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\iGdiCnv.dll msiexec.exe File created C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IScrCnv.dll msiexec.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\Installer\e582872.msi msiexec.exe File created C:\Windows\Installer\e582873.mst msiexec.exe File opened for modification C:\Windows\Installer\e582873.mst msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{790EC520-CCCC-4810-A0FE-061633204CE4} msiexec.exe File opened for modification C:\Windows\Installer\e582872.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI2FC5.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1A\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1b msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{ABC466D7-B7AD-4872-8C72-ED582EF279CE} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{A485A16F-1011-42A0-A5B6-48336907A783}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}\1.0\0 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{4C514B88-F041-4813-82C0-C6BB0627BC3E}\ProxyStubClsid msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{30350C57-F1F4-4ADC-9ECB-FA66FD8A3BE6}\ProxyStubClsid msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B23DEBC2-3C5C-47A6-8FF8-148132D193F4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{1DE0B0AC-D65A-4B47-B4E4-37C8E065D9A1}\ProxyStubClsid msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{BC859C55-34D2-43CE-A4B7-8AB67768B386}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{65A707C4-67DA-4A26-830B-5898BDEFC31D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F31ADE0D-9319-4067-829A-107D25C1C131}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{FA5380BC-76C8-4AD6-A4C4-6F6CB5F32CAE}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9E8176B8-C130-49DA-AB56-F3378E54ADFD}\ = "ISetupCABFileMsi2" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{D9DFAFFD-B547-4387-992F-E5863D4D7E17}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ABC466D7-B7AD-4872-8C72-ED582EF279CE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78994A88-276B-4F15-BAF6-FB4CD3F9E223}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F43DC703-046B-4FB0-8AC2-0CB24623994D}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{1F74B51C-963F-420E-90FA-FD96FA7712DC}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{99438BE3-EA31-4C13-85FD-FEB81A61AB34} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1AEFB69D-57BB-4963-AFA8-09FA9614E1CB}\ = "ISetupShell" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9DFAFFD-B547-4387-992F-E5863D4D7E17}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{46715E70-0B7D-45BA-A447-AA0951073C78}\ProxyStubClsid msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1DE0B0AC-D65A-4B47-B4E4-37C8E065D9A1}\TypeLib\Version = "1.0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EDF81340-0BD9-40B7-825C-29AEE7A64D4E}\TypeLib\Version = "1.0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{184C53CC-8D6D-4A58-8108-90167678B84C}\ = "ISetupReboot" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F814097-CE38-493E-BFCC-CB3599998D05}\ = "ISetupGUIObject" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{F1F45426-4ECC-4E2F-A2AD-3424A424B336}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2B3ECF2E-3F2C-42BB-BA02-049A739F12C0}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{8D32D517-C668-44B4-97AE-8ECC0CE064FB}\ProxyStubClsid msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\ISInstallDriver.StringTable msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{8F814097-CE38-493E-BFCC-CB3599998D05}\ProxyStubClsid msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{D86AEAFD-A3AD-4F9D-BDA5-D70696A1FEAB}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{44D68E56-4A11-4C14-806B-083FFA62767C}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F26F1EB5-850C-4AF9-BAFD-F388686C21B5}\TypeLib\Version = "1.0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E104755-C78C-4BAC-941C-29857740D46F}\ = "InstallShield InstallDriver" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{023F4789-ADC1-4030-9DE3-7ED7F57EA2CA}\ProxyStubClsid msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8919C3B9-E8FF-43A7-86B3-FA09E0201947}\TypeLib\Version = "1.0" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{2057FC3B-B6A8-4669-B49B-393B0B0193A9} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{06FC2BEF-62EE-4724-8FEB-64C73B939BA3}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{EAD11E89-6394-4747-A64E-634E4FF7DDDA}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9DFAFFD-B547-4387-992F-E5863D4D7E17}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{06FC2BEF-62EE-4724-8FEB-64C73B939BA3}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E4FB44E-D416-4243-B811-8E116F9CE39A}\ = "PSFactoryBuffer" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{44D68E56-4A11-4C14-806B-083FFA62767C} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{023F4789-ADC1-4030-9DE3-7ED7F57EA2CA}\TypeLib\Version = "1.0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C7DC20AA-E26E-4FC9-9DBE-FAFDE6C5CCCD}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{78994A88-276B-4F15-BAF6-FB4CD3F9E223}\ProxyStubClsid msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{46E4AEB7-19C5-4A43-AD65-FF6859E43C2B} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2FB74205-04B5-4683-B5B5-492FCFDE9ADF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{1AEFB69D-57BB-4963-AFA8-09FA9614E1CB}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AEED9AE1-AE66-4065-A274-DC7BBFEE354B}\ = "IInstallDriverVersion" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ED3EBE1C-E2BF-460F-870E-F17D6EC454F8}\ = "ISetupMedia" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{ABC466D7-B7AD-4872-8C72-ED582EF279CE}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1F4F8765-2131-46E5-8621-08517089ACE6}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A351BCFD-F07F-48CB-91A0-AF69317D9D6D}\ = "ISetupObjectClass" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BB7CE443-5294-42A0-8BC6-C3584A0E9E5E}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{46715E70-0B7D-45BA-A447-AA0951073C78}\ = "ISetupScriptEngine2" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FA5380BC-76C8-4AD6-A4C4-6F6CB5F32CAE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AEED9AE1-AE66-4065-A274-DC7BBFEE354B}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{CD549FD5-6590-4F67-B60E-E7422ADAF1B3}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{28A18BE3-9194-44B1-A5BB-7245C5D344B2}\TypeLib\ = "{01F6AFCB-2AFF-4A6F-8681-E51C4AC277B7}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E4FB44E-D416-4243-B811-8E116F9CE39A}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{AF21D406-D32C-4413-81CE-B9AF860E1361}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{0AA8743E-3991-438C-8631-3C8C169399E6} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{52305DC4-1B79-41CE-90D0-0B84AF096018}\ProxyStubClsid msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3480 msiexec.exe 3480 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1356 swift3d.exe Token: SeIncreaseQuotaPrivilege 1356 swift3d.exe Token: SeSecurityPrivilege 3480 msiexec.exe Token: SeCreateTokenPrivilege 1356 swift3d.exe Token: SeAssignPrimaryTokenPrivilege 1356 swift3d.exe Token: SeLockMemoryPrivilege 1356 swift3d.exe Token: SeIncreaseQuotaPrivilege 1356 swift3d.exe Token: SeMachineAccountPrivilege 1356 swift3d.exe Token: SeTcbPrivilege 1356 swift3d.exe Token: SeSecurityPrivilege 1356 swift3d.exe Token: SeTakeOwnershipPrivilege 1356 swift3d.exe Token: SeLoadDriverPrivilege 1356 swift3d.exe Token: SeSystemProfilePrivilege 1356 swift3d.exe Token: SeSystemtimePrivilege 1356 swift3d.exe Token: SeProfSingleProcessPrivilege 1356 swift3d.exe Token: SeIncBasePriorityPrivilege 1356 swift3d.exe Token: SeCreatePagefilePrivilege 1356 swift3d.exe Token: SeCreatePermanentPrivilege 1356 swift3d.exe Token: SeBackupPrivilege 1356 swift3d.exe Token: SeRestorePrivilege 1356 swift3d.exe Token: SeShutdownPrivilege 1356 swift3d.exe Token: SeDebugPrivilege 1356 swift3d.exe Token: SeAuditPrivilege 1356 swift3d.exe Token: SeSystemEnvironmentPrivilege 1356 swift3d.exe Token: SeChangeNotifyPrivilege 1356 swift3d.exe Token: SeRemoteShutdownPrivilege 1356 swift3d.exe Token: SeUndockPrivilege 1356 swift3d.exe Token: SeSyncAgentPrivilege 1356 swift3d.exe Token: SeEnableDelegationPrivilege 1356 swift3d.exe Token: SeManageVolumePrivilege 1356 swift3d.exe Token: SeImpersonatePrivilege 1356 swift3d.exe Token: SeCreateGlobalPrivilege 1356 swift3d.exe Token: SeRestorePrivilege 3480 msiexec.exe Token: SeTakeOwnershipPrivilege 3480 msiexec.exe Token: SeRestorePrivilege 3480 msiexec.exe Token: SeTakeOwnershipPrivilege 3480 msiexec.exe Token: SeRestorePrivilege 3480 msiexec.exe Token: SeTakeOwnershipPrivilege 3480 msiexec.exe Token: SeRestorePrivilege 3480 msiexec.exe Token: SeTakeOwnershipPrivilege 3480 msiexec.exe Token: SeShutdownPrivilege 2908 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 2908 MSIEXEC.EXE Token: SeCreateTokenPrivilege 2908 MSIEXEC.EXE Token: SeAssignPrimaryTokenPrivilege 2908 MSIEXEC.EXE Token: SeLockMemoryPrivilege 2908 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 2908 MSIEXEC.EXE Token: SeMachineAccountPrivilege 2908 MSIEXEC.EXE Token: SeTcbPrivilege 2908 MSIEXEC.EXE Token: SeSecurityPrivilege 2908 MSIEXEC.EXE Token: SeTakeOwnershipPrivilege 2908 MSIEXEC.EXE Token: SeLoadDriverPrivilege 2908 MSIEXEC.EXE Token: SeSystemProfilePrivilege 2908 MSIEXEC.EXE Token: SeSystemtimePrivilege 2908 MSIEXEC.EXE Token: SeProfSingleProcessPrivilege 2908 MSIEXEC.EXE Token: SeIncBasePriorityPrivilege 2908 MSIEXEC.EXE Token: SeCreatePagefilePrivilege 2908 MSIEXEC.EXE Token: SeCreatePermanentPrivilege 2908 MSIEXEC.EXE Token: SeBackupPrivilege 2908 MSIEXEC.EXE Token: SeRestorePrivilege 2908 MSIEXEC.EXE Token: SeShutdownPrivilege 2908 MSIEXEC.EXE Token: SeDebugPrivilege 2908 MSIEXEC.EXE Token: SeAuditPrivilege 2908 MSIEXEC.EXE Token: SeSystemEnvironmentPrivilege 2908 MSIEXEC.EXE Token: SeChangeNotifyPrivilege 2908 MSIEXEC.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1356 swift3d.exe 2908 MSIEXEC.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2908 1356 swift3d.exe 95 PID 1356 wrote to memory of 2908 1356 swift3d.exe 95 PID 1356 wrote to memory of 2908 1356 swift3d.exe 95 PID 3480 wrote to memory of 4336 3480 msiexec.exe 96 PID 3480 wrote to memory of 4336 3480 msiexec.exe 96 PID 3480 wrote to memory of 4336 3480 msiexec.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\swift3d.exe"C:\Users\Admin\AppData\Local\Temp\swift3d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\MSIEXEC.EXEMSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Temp\_is3B5\Swift 3D v6.00.msi" EVALUATION="1" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp"2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2908
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F66D13803E60A67C8E58F562BA7A8EE8 C2⤵
- Loads dropped DLL
PID:4336
-
-
C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IDriver.exeC:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IDriver.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD54ec5a7ef6d588c82bc0f6f6c11baa675
SHA1bdcdefeb50d009b5c37320945cd3580d7a258651
SHA256406a4109ab7c77a4a3e4e30018790404b60911eb95a8754ee1c7770101c41dea
SHA5128b20313d865ca15b24771fa225ae09312c72e6041d380f85c89c10f7dd4a15ebe1003bf2f49bfb5f0063f75221b998fdf5d5a82341ce027febe05cb39a60b7e7
-
Filesize
744KB
MD5a9d3658c5be72816812a5a32e4560ba3
SHA1649003292ee74d2407fae441fb92b605a0d91f90
SHA256b2527d1e2297506796f898e90907fb4c8c7e063f2898194e74152fa9ca21923f
SHA512b80283aafbe8cd59720979d51a5524a1d53b001e59c6fe9693c754b238101ac6058122130e0be97ce22dc4f7edce9cd84aa4fde869bf728cff8fba1733638c5b
-
Filesize
260KB
MD5f6aabdf85821a9c61c61dec9408f40cc
SHA1ddac695de73be7a67357aea89c7b9c2ca21fc4e1
SHA2569ee23586d456db53d59fbaa8669e817461aeaf94f81237ead3f2c23cac8c40fa
SHA51273d2e4352c4055c8d08ad5499fc4495ff6fa7613970f9c0a3cf73dae645fc9102e62cf9c7dd046d6bc3c909cbafd06a30812d1d9bcf8f34c4a253c09d628b538
-
Filesize
176KB
MD5afdfec6679ce99596261ff182afbe9e6
SHA13289711e3ce8bb72bd84bb0bc33f95d958648f4c
SHA25681b931aaf908e1e372802db04dfbe5256209d488bfe88d58841fc13acadedfd6
SHA512c8ce4617d03084f37b8766f0505922a8f380e0d2745658864197535c43c3b2f985c4a2bac2228752857782181cd41167bfa4b784c7ce3e8a94932d58d099753a
-
Filesize
168KB
MD5197c2ce7cf2a98ae895ece98d88b8245
SHA1f734d8dc508138501e79b384fe1a689920c6ba93
SHA256260924991dff4fbd2f691913007aee1f3136708671ef3309b4f9ec8687da6f1e
SHA512a7ff5f0d56a13d340d9ec1b977f9e995bf7dc61f6bf4b8ecd7369793d39032a43e587146e6b9a9084be5a9cc709876bf971983a218c2af631d3950cd3391cd47
-
Filesize
32KB
MD5aba70b81a5811e7b140271595d66f06f
SHA142ef824151e67cf921d861d83872c9ef13b500e6
SHA25626d4765c2461fccd669e455d33659397d6f82fe261ece256c3f19b831dcfa0ba
SHA5128780d68124e309b8ec2dbbbac18be3291fefabfd6ed9154645eddfb4dd8076e2fda97168d7c5ea9b378b54ee900f75bd409736cfc1262e0d167e0ff62078de0a
-
Filesize
744KB
MD5a9d3658c5be72816812a5a32e4560ba3
SHA1649003292ee74d2407fae441fb92b605a0d91f90
SHA256b2527d1e2297506796f898e90907fb4c8c7e063f2898194e74152fa9ca21923f
SHA512b80283aafbe8cd59720979d51a5524a1d53b001e59c6fe9693c754b238101ac6058122130e0be97ce22dc4f7edce9cd84aa4fde869bf728cff8fba1733638c5b
-
Filesize
400KB
MD5db28ca3ba3c2045aa7b6e59aa9831c68
SHA155b44ea55f3a04b916339c81e1cc3f3db62d54cc
SHA256ca41725fb64338211a9f9740f45f1b0c4d80e6c7e84a1d2e5580dcecbf87e489
SHA51282c409611e61acad6b2986372ff72682e611b7ee5a88e74fec9c7864ce50c7494adba4165a44f2cc99b93daee33ad67320aed4fd5f85ef2fbc4779bf69f55efb
-
Filesize
260KB
MD5f6aabdf85821a9c61c61dec9408f40cc
SHA1ddac695de73be7a67357aea89c7b9c2ca21fc4e1
SHA2569ee23586d456db53d59fbaa8669e817461aeaf94f81237ead3f2c23cac8c40fa
SHA51273d2e4352c4055c8d08ad5499fc4495ff6fa7613970f9c0a3cf73dae645fc9102e62cf9c7dd046d6bc3c909cbafd06a30812d1d9bcf8f34c4a253c09d628b538
-
Filesize
168KB
MD5197c2ce7cf2a98ae895ece98d88b8245
SHA1f734d8dc508138501e79b384fe1a689920c6ba93
SHA256260924991dff4fbd2f691913007aee1f3136708671ef3309b4f9ec8687da6f1e
SHA512a7ff5f0d56a13d340d9ec1b977f9e995bf7dc61f6bf4b8ecd7369793d39032a43e587146e6b9a9084be5a9cc709876bf971983a218c2af631d3950cd3391cd47
-
Filesize
168KB
MD5197c2ce7cf2a98ae895ece98d88b8245
SHA1f734d8dc508138501e79b384fe1a689920c6ba93
SHA256260924991dff4fbd2f691913007aee1f3136708671ef3309b4f9ec8687da6f1e
SHA512a7ff5f0d56a13d340d9ec1b977f9e995bf7dc61f6bf4b8ecd7369793d39032a43e587146e6b9a9084be5a9cc709876bf971983a218c2af631d3950cd3391cd47
-
Filesize
528KB
MD51c1332bf83f505cb60e06c76fe111cdd
SHA13c80e9bd5a41ac3f8fa129d61261ea07db29f801
SHA2569602fafb7de17b14a3474c64944db928ef6c23e20935c0e82e918fa2447cc979
SHA512bd7cb4113f5b6067c55e7df1f6dac6b4058a0bdc9b0e7d6875f1718bdcc84d315ea8a2d373a45c47c82326a74cbce41a508f493eac59db99f7cd5e4f33ac575f
-
Filesize
176KB
MD5afdfec6679ce99596261ff182afbe9e6
SHA13289711e3ce8bb72bd84bb0bc33f95d958648f4c
SHA25681b931aaf908e1e372802db04dfbe5256209d488bfe88d58841fc13acadedfd6
SHA512c8ce4617d03084f37b8766f0505922a8f380e0d2745658864197535c43c3b2f985c4a2bac2228752857782181cd41167bfa4b784c7ce3e8a94932d58d099753a
-
Filesize
176KB
MD5afdfec6679ce99596261ff182afbe9e6
SHA13289711e3ce8bb72bd84bb0bc33f95d958648f4c
SHA25681b931aaf908e1e372802db04dfbe5256209d488bfe88d58841fc13acadedfd6
SHA512c8ce4617d03084f37b8766f0505922a8f380e0d2745658864197535c43c3b2f985c4a2bac2228752857782181cd41167bfa4b784c7ce3e8a94932d58d099753a
-
Filesize
32KB
MD5aba70b81a5811e7b140271595d66f06f
SHA142ef824151e67cf921d861d83872c9ef13b500e6
SHA25626d4765c2461fccd669e455d33659397d6f82fe261ece256c3f19b831dcfa0ba
SHA5128780d68124e309b8ec2dbbbac18be3291fefabfd6ed9154645eddfb4dd8076e2fda97168d7c5ea9b378b54ee900f75bd409736cfc1262e0d167e0ff62078de0a
-
Filesize
32KB
MD5aba70b81a5811e7b140271595d66f06f
SHA142ef824151e67cf921d861d83872c9ef13b500e6
SHA25626d4765c2461fccd669e455d33659397d6f82fe261ece256c3f19b831dcfa0ba
SHA5128780d68124e309b8ec2dbbbac18be3291fefabfd6ed9154645eddfb4dd8076e2fda97168d7c5ea9b378b54ee900f75bd409736cfc1262e0d167e0ff62078de0a
-
Filesize
108KB
MD574fe9c456578feb1b870b130ea089294
SHA154cd5a8e6168c3f7f8a491c4444ca16351e1b16b
SHA2564555ac99b14dd339dafd9bdf71fd27ff9a2dfb756053aa6cf2ea79b899a26067
SHA5126b2d6c62bbfe8988672ef543014099b63722573ed5989262a5d88a4069bd4232c6bf469550cbf724e5e14750a550a972a52aa7dcf7c73bf3ef52ac09c06f1306
-
Filesize
108KB
MD574fe9c456578feb1b870b130ea089294
SHA154cd5a8e6168c3f7f8a491c4444ca16351e1b16b
SHA2564555ac99b14dd339dafd9bdf71fd27ff9a2dfb756053aa6cf2ea79b899a26067
SHA5126b2d6c62bbfe8988672ef543014099b63722573ed5989262a5d88a4069bd4232c6bf469550cbf724e5e14750a550a972a52aa7dcf7c73bf3ef52ac09c06f1306
-
Filesize
108KB
MD574fe9c456578feb1b870b130ea089294
SHA154cd5a8e6168c3f7f8a491c4444ca16351e1b16b
SHA2564555ac99b14dd339dafd9bdf71fd27ff9a2dfb756053aa6cf2ea79b899a26067
SHA5126b2d6c62bbfe8988672ef543014099b63722573ed5989262a5d88a4069bd4232c6bf469550cbf724e5e14750a550a972a52aa7dcf7c73bf3ef52ac09c06f1306
-
Filesize
108KB
MD574fe9c456578feb1b870b130ea089294
SHA154cd5a8e6168c3f7f8a491c4444ca16351e1b16b
SHA2564555ac99b14dd339dafd9bdf71fd27ff9a2dfb756053aa6cf2ea79b899a26067
SHA5126b2d6c62bbfe8988672ef543014099b63722573ed5989262a5d88a4069bd4232c6bf469550cbf724e5e14750a550a972a52aa7dcf7c73bf3ef52ac09c06f1306
-
Filesize
108KB
MD574fe9c456578feb1b870b130ea089294
SHA154cd5a8e6168c3f7f8a491c4444ca16351e1b16b
SHA2564555ac99b14dd339dafd9bdf71fd27ff9a2dfb756053aa6cf2ea79b899a26067
SHA5126b2d6c62bbfe8988672ef543014099b63722573ed5989262a5d88a4069bd4232c6bf469550cbf724e5e14750a550a972a52aa7dcf7c73bf3ef52ac09c06f1306
-
Filesize
48KB
MD5fa13aa9996fe8d85aa680e9f5e4f23e8
SHA1cbc23243a9a595b6d91431c4c275c1ab2adc6642
SHA2568f40c1dc28323a3c5310bf21372b9756ca547c20c7cf63197e071a9e1e66b31b
SHA5129f4bd08583dbaadaec281d05d79c11a1dc1651d2d96cc4ecddd68e74178c3eec843e43bea14c546ba18b371177684dde0c21211e8fdb0369bbeeb5e31fdbe87e
-
Filesize
48KB
MD5fa13aa9996fe8d85aa680e9f5e4f23e8
SHA1cbc23243a9a595b6d91431c4c275c1ab2adc6642
SHA2568f40c1dc28323a3c5310bf21372b9756ca547c20c7cf63197e071a9e1e66b31b
SHA5129f4bd08583dbaadaec281d05d79c11a1dc1651d2d96cc4ecddd68e74178c3eec843e43bea14c546ba18b371177684dde0c21211e8fdb0369bbeeb5e31fdbe87e
-
Filesize
48KB
MD5fa13aa9996fe8d85aa680e9f5e4f23e8
SHA1cbc23243a9a595b6d91431c4c275c1ab2adc6642
SHA2568f40c1dc28323a3c5310bf21372b9756ca547c20c7cf63197e071a9e1e66b31b
SHA5129f4bd08583dbaadaec281d05d79c11a1dc1651d2d96cc4ecddd68e74178c3eec843e43bea14c546ba18b371177684dde0c21211e8fdb0369bbeeb5e31fdbe87e
-
Filesize
5KB
MD56c87581375d4e4789761b9833c2a1b4d
SHA1310395fde36429b08b615831152399db7e4267a2
SHA25643160e278e4302e378e754149c6394bc51d1969a7941687cfcc6c00b25151282
SHA512ff499900dd9ae154825bb1b8a65f7c53367a4a75131ce1aa08ffbd0bbaae4d8e3a062455d74b8dce41fc89648bed33fb2ecd95e7ba57098caa7ca652f176dfd2
-
Filesize
875KB
MD5f93a766e58d9c06b5cfd7c095fdd4b97
SHA1d02e24a8c14bc127ff1cbac8ef7c43830142d0e0
SHA256c00e1e874d0093112e898c615b0f81fa8a0974c25cf01638fe6acb949b1940ed
SHA51265089a6b7a916716866192781af098b8939ad8ef5881abfafbfebc53fd747c3af5b2451668f4e60ca6c3c15eacf485e009c260e710ab934537c4d98ab67d3bbe
-
Filesize
45.3MB
MD567aacd1030de66157d01711d5991181e
SHA11a108e6e03530b0b7de858cf919222b8bb9070d3
SHA256e2ff5ad3fa547914dc12b1a797ee5abaaf9ea9b3eb1bae2768975d0afee0a197
SHA5125d9c1c0adcfa21ad92b93bf2e75ae599375b2ffd73c64de2f51cb9001cbdf5ec4d0f7b3385f23074d7dabb24a88f9379e29964087f24b2b697e4d3199aaad0ea
-
Filesize
400KB
MD5db28ca3ba3c2045aa7b6e59aa9831c68
SHA155b44ea55f3a04b916339c81e1cc3f3db62d54cc
SHA256ca41725fb64338211a9f9740f45f1b0c4d80e6c7e84a1d2e5580dcecbf87e489
SHA51282c409611e61acad6b2986372ff72682e611b7ee5a88e74fec9c7864ce50c7494adba4165a44f2cc99b93daee33ad67320aed4fd5f85ef2fbc4779bf69f55efb
-
Filesize
400KB
MD5db28ca3ba3c2045aa7b6e59aa9831c68
SHA155b44ea55f3a04b916339c81e1cc3f3db62d54cc
SHA256ca41725fb64338211a9f9740f45f1b0c4d80e6c7e84a1d2e5580dcecbf87e489
SHA51282c409611e61acad6b2986372ff72682e611b7ee5a88e74fec9c7864ce50c7494adba4165a44f2cc99b93daee33ad67320aed4fd5f85ef2fbc4779bf69f55efb
-
Filesize
400KB
MD5db28ca3ba3c2045aa7b6e59aa9831c68
SHA155b44ea55f3a04b916339c81e1cc3f3db62d54cc
SHA256ca41725fb64338211a9f9740f45f1b0c4d80e6c7e84a1d2e5580dcecbf87e489
SHA51282c409611e61acad6b2986372ff72682e611b7ee5a88e74fec9c7864ce50c7494adba4165a44f2cc99b93daee33ad67320aed4fd5f85ef2fbc4779bf69f55efb
-
Filesize
95KB
MD544b39b5405e95277660fd8ba4c577120
SHA138ed024d5e6911f35962d1cc93653a91248441f2
SHA2562847a2006e2b9e670c74cc025916fce764cd33bf6708053ef834b02c282d21d6
SHA512882898e6d5f63b7663e996be34a7e6686de70056cb76e06be207268fe4832bce999919b0e91a44df201f476f595df90a4da6696742becb7be2f2dd903281fa72
-
Filesize
528KB
MD51c1332bf83f505cb60e06c76fe111cdd
SHA13c80e9bd5a41ac3f8fa129d61261ea07db29f801
SHA2569602fafb7de17b14a3474c64944db928ef6c23e20935c0e82e918fa2447cc979
SHA512bd7cb4113f5b6067c55e7df1f6dac6b4058a0bdc9b0e7d6875f1718bdcc84d315ea8a2d373a45c47c82326a74cbce41a508f493eac59db99f7cd5e4f33ac575f
-
Filesize
528KB
MD51c1332bf83f505cb60e06c76fe111cdd
SHA13c80e9bd5a41ac3f8fa129d61261ea07db29f801
SHA2569602fafb7de17b14a3474c64944db928ef6c23e20935c0e82e918fa2447cc979
SHA512bd7cb4113f5b6067c55e7df1f6dac6b4058a0bdc9b0e7d6875f1718bdcc84d315ea8a2d373a45c47c82326a74cbce41a508f493eac59db99f7cd5e4f33ac575f
-
Filesize
528KB
MD51c1332bf83f505cb60e06c76fe111cdd
SHA13c80e9bd5a41ac3f8fa129d61261ea07db29f801
SHA2569602fafb7de17b14a3474c64944db928ef6c23e20935c0e82e918fa2447cc979
SHA512bd7cb4113f5b6067c55e7df1f6dac6b4058a0bdc9b0e7d6875f1718bdcc84d315ea8a2d373a45c47c82326a74cbce41a508f493eac59db99f7cd5e4f33ac575f
-
Filesize
278KB
MD51b843ec600c0d6afb4edfcca53558de4
SHA16343f5c547bc7fbca37daa62b920012d8df75981
SHA25603d4addd9f924bb06009ec826215364d4f210ec4c0dc0e7719af8cb5aca97fd6
SHA51219c37813a1ccba5c49f6735e5eada9560b78bdd30da27368594dd5e8977862e8e8d605b46e9dce69d298b9067a8bcd0d646efe0f214261ba7c33e7255b05d2ab
-
Filesize
1KB
MD5fdb73fbaf0fabf64eda9e25f42af7c77
SHA1a5ee97c9bd0b79a95471fe6c5e2d99ad9d2e01e4
SHA2560df50a8232903641b09a984b36094897634ef2d22b3f94f9ffea244f99d7f781
SHA5126b73ccb0b74f0d292c28aefc661747e20e9b573d39f30162c7848678ef1dae24afc7a9f1fffc73114382a95b529a59bfa929ecb654b5e9904cee84f09047656d
-
Filesize
875KB
MD5f93a766e58d9c06b5cfd7c095fdd4b97
SHA1d02e24a8c14bc127ff1cbac8ef7c43830142d0e0
SHA256c00e1e874d0093112e898c615b0f81fa8a0974c25cf01638fe6acb949b1940ed
SHA51265089a6b7a916716866192781af098b8939ad8ef5881abfafbfebc53fd747c3af5b2451668f4e60ca6c3c15eacf485e009c260e710ab934537c4d98ab67d3bbe