Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/11/2023, 22:54

General

  • Target

    1cbf0d1736fe6059eadd329cfec5c7dc72f646fdeba65631d471488016a58bbe.msi

  • Size

    3.6MB

  • MD5

    531c347accd7a17a513d403fedf173f0

  • SHA1

    6ecb00ba05eda37a23e4355364616fb779eca538

  • SHA256

    1cbf0d1736fe6059eadd329cfec5c7dc72f646fdeba65631d471488016a58bbe

  • SHA512

    2c4827e421add64f82c57c568ab6e4895d44a5db499540c9cb53d7dc96d159b4b61cf453d47ecb03fd91c364927d1c123f44092b373969ccb11e2cbb8cd99ada

  • SSDEEP

    49152:tUvUESYyZ3GgD+7/WXbB6oIJgACo8tfkMjpmW:aSYyZ3vD+7AUoIJgACAMp

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\1cbf0d1736fe6059eadd329cfec5c7dc72f646fdeba65631d471488016a58bbe.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3900
    • C:\Windows\system32\pcaui.exe
      "C:\Windows\system32\pcaui.exe" -g {d8ff6d16-6a3a-468a-8b44-01714ddc49ea} -x {5d343d82-8bb4-4a5f-a17b-78abf57b73a5} -a "Acrobat Professional/Standard 6" -v "Adobe" -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 1 -f 0 -k 0
      2⤵
        PID:1364
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding BCCF30EA9830C9F181AC411B7E4F225B C
        2⤵
        • Loads dropped DLL
        PID:3972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MSIA8A4.tmp

      Filesize

      48KB

      MD5

      c209dd150a489095a8045713bac02e79

      SHA1

      8a52231cf700b5bd510a983247d14000ebb46db3

      SHA256

      9abfb56f541ab153997cf4d99a7ec2be237c1a753e9b0a4b319fd262508b5211

      SHA512

      73ee4b617a7dcb6f616ac115eb5037c16e462ef3dbe178c9ed3fa9091938b31c1c98606f659f882bae9eae53bdbe83298e4f4ec3f58b7a080d9b51ff52f41cd3

    • C:\Users\Admin\AppData\Local\Temp\MSIA8A4.tmp

      Filesize

      48KB

      MD5

      c209dd150a489095a8045713bac02e79

      SHA1

      8a52231cf700b5bd510a983247d14000ebb46db3

      SHA256

      9abfb56f541ab153997cf4d99a7ec2be237c1a753e9b0a4b319fd262508b5211

      SHA512

      73ee4b617a7dcb6f616ac115eb5037c16e462ef3dbe178c9ed3fa9091938b31c1c98606f659f882bae9eae53bdbe83298e4f4ec3f58b7a080d9b51ff52f41cd3

    • C:\Users\Admin\AppData\Local\Temp\MSIB2E6.tmp

      Filesize

      60KB

      MD5

      da7d840224aa5de956ad2ef043229096

      SHA1

      62b26a15411b2de89388ba8db110f48c69838d98

      SHA256

      7ec4b55f864a8744b647003853562c16897bc5a9a15cb6e271c7e425aba846d3

      SHA512

      d0e9c38a3f623db824d9309dc927d9822000dc54f623683fa7bcbd4fa32596f1f2a53dcdd85d76b57198c0c9dcd442a610d7b46eef51c25b82e8615e44c6b5e8

    • C:\Users\Admin\AppData\Local\Temp\MSIB2E6.tmp

      Filesize

      60KB

      MD5

      da7d840224aa5de956ad2ef043229096

      SHA1

      62b26a15411b2de89388ba8db110f48c69838d98

      SHA256

      7ec4b55f864a8744b647003853562c16897bc5a9a15cb6e271c7e425aba846d3

      SHA512

      d0e9c38a3f623db824d9309dc927d9822000dc54f623683fa7bcbd4fa32596f1f2a53dcdd85d76b57198c0c9dcd442a610d7b46eef51c25b82e8615e44c6b5e8

    • C:\Users\Admin\AppData\Local\Temp\MSIB2F6.tmp

      Filesize

      32KB

      MD5

      d323a3ebb3bce01f663e70c4c16c30da

      SHA1

      8b78b76f5acaceeb30b0621ed1111d96e55f2426

      SHA256

      d37a7755b215e915991963165da0e8afb80d78e39b3f7853de856ac52810a3be

      SHA512

      f67f7d4d9a3f9f7b5b2bd76d6c59e2f0ee70e4d096d02f4ca6377637958030ce9dadef80551e7df90822775f733f14d10686b3db8841c33d0a24518302a2ad8d

    • C:\Users\Admin\AppData\Local\Temp\MSIB2F6.tmp

      Filesize

      32KB

      MD5

      d323a3ebb3bce01f663e70c4c16c30da

      SHA1

      8b78b76f5acaceeb30b0621ed1111d96e55f2426

      SHA256

      d37a7755b215e915991963165da0e8afb80d78e39b3f7853de856ac52810a3be

      SHA512

      f67f7d4d9a3f9f7b5b2bd76d6c59e2f0ee70e4d096d02f4ca6377637958030ce9dadef80551e7df90822775f733f14d10686b3db8841c33d0a24518302a2ad8d

    • C:\Users\Admin\AppData\Local\Temp\MSIB355.tmp

      Filesize

      52KB

      MD5

      07ce4da97166beb04eada923671ba59a

      SHA1

      c85475f7179f4f2d1087cef5f8684342811d0885

      SHA256

      92248c85cb30417c9a1fe03f59f6de9c38211a78e156cd67cd593a5e11b5467c

      SHA512

      46e18195fa50a990f218066517c043d1ac7a525017e47c2bc3f436fa2586d68683bbfbe5963dbb6cc0dd22a9bb67df9c9baf351fb1327ebc47913297378f59e9

    • C:\Users\Admin\AppData\Local\Temp\MSIB355.tmp

      Filesize

      52KB

      MD5

      07ce4da97166beb04eada923671ba59a

      SHA1

      c85475f7179f4f2d1087cef5f8684342811d0885

      SHA256

      92248c85cb30417c9a1fe03f59f6de9c38211a78e156cd67cd593a5e11b5467c

      SHA512

      46e18195fa50a990f218066517c043d1ac7a525017e47c2bc3f436fa2586d68683bbfbe5963dbb6cc0dd22a9bb67df9c9baf351fb1327ebc47913297378f59e9