Analysis

  • max time kernel
    136s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2023 13:52

General

  • Target

    postgresql-8.3.msi

  • Size

    157KB

  • MD5

    9bd95420958b9c6773f86cd061eec0e2

  • SHA1

    f2201c71555875f8368bed067f4bdccd115a02ea

  • SHA256

    5322707fb675f25ce085eaafce716cb2428d509416bd8bc5bdaf68f846442ea6

  • SHA512

    c9bde16c945870879e6537007669155116fda18a52737218261bec3d94c16b22bceed5d109647e454c9bdc67fa9f48a4fb99ffdbfea20db11ae9704b42c15deb

  • SSDEEP

    1536:o4LjxwVJrjCQJZbrOt+sa/lTREfOcqDp:bLSI6POtra/lTR

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\postgresql-8.3.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4068
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 808555C4E8D7D11F93F36B21F3F36AAC C
      2⤵
      • Loads dropped DLL
      PID:1088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIF08A.tmp

    Filesize

    48KB

    MD5

    246c2abfdfc0c728eaac835d7733e2b7

    SHA1

    b60eed815ce8f0e096cef0483083834ab05de022

    SHA256

    3569d3af32012dc51422b37be3ff838bae3d5f4412bd60b57fd2c0ce3c2180ff

    SHA512

    43d63f7969854e2cdda78d0a724aaa5eb2200228b4c44cc74c73108ce7aede7af85fc463d8967a3f9a9cdfab1bcc0ee171b343972f4608e6324618f35c362bae

  • C:\Users\Admin\AppData\Local\Temp\MSIF08A.tmp

    Filesize

    48KB

    MD5

    246c2abfdfc0c728eaac835d7733e2b7

    SHA1

    b60eed815ce8f0e096cef0483083834ab05de022

    SHA256

    3569d3af32012dc51422b37be3ff838bae3d5f4412bd60b57fd2c0ce3c2180ff

    SHA512

    43d63f7969854e2cdda78d0a724aaa5eb2200228b4c44cc74c73108ce7aede7af85fc463d8967a3f9a9cdfab1bcc0ee171b343972f4608e6324618f35c362bae