Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2023, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
6be34df727fcb79123e4e8f472ad24b698d83395fb17d4db019e9976f485cd83.msi
Resource
win10v2004-20231023-en
Behavioral task
behavioral2
Sample
97a5fe1d2174e9d34cee8c1d6751bf01f99d8f40b1ae0bce205b8f2f0483225c.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
b0fd1ff7f5d45be89fffc04937f352754c6055e1f4ca26a9257169ce168569ef.msi
Resource
win10v2004-20231020-en
Behavioral task
behavioral4
Sample
c42000f2f6526c782757aa43246b4c1a12d366610721df6b6112305064d48a32.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
f659b269fbe4128588f7a2fa4d6022cc74e508d28eee05c5aff26cc23b7bd1a5.dll
Resource
win10v2004-20231025-en
General
-
Target
6be34df727fcb79123e4e8f472ad24b698d83395fb17d4db019e9976f485cd83.msi
-
Size
26.8MB
-
MD5
628e6068c4cb1be86b489574452fc9ab
-
SHA1
b0e4e9bb6ef8aa7a9fcb9c9e571d8162b1b2443a
-
SHA256
6be34df727fcb79123e4e8f472ad24b698d83395fb17d4db019e9976f485cd83
-
SHA512
f0f79ed20dbbebecfe80f419c4fb454743c723c249b84d61cb0d1026133ff401b0221932e762b104a8f4d64b2dd22156c00d548b85344e9bf6fd4e99a8926459
-
SSDEEP
786432:EZwgU6F7ALHnL2+xlyBwXobj4qzMvmcBF0jb:cE6F7Azn1xMV34OMvan
Malware Config
Signatures
-
Loads dropped DLL 9 IoCs
pid Process 4132 MsiExec.exe 4132 MsiExec.exe 4132 MsiExec.exe 4132 MsiExec.exe 4132 MsiExec.exe 4132 MsiExec.exe 4132 MsiExec.exe 4132 MsiExec.exe 4132 MsiExec.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 13 4672 msiexec.exe 15 4672 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\A4278059BC3746E69A0B27353110D471.TMP\WiseCustomCall.dll MsiExec.exe File created C:\Windows\A4278059BC3746E69A0B27353110D471.TMP\WiseCustomCall.CEB85044_2EEF_484A_8907_2EAF870F92ED.dll MsiExec.exe File created C:\Windows\A4278059BC3746E69A0B27353110D471.TMP\WiseCustomCalla.CEB85044_2EEF_484A_8907_2EAF870F92ED.dll MsiExec.exe File created C:\Windows\A4278059BC3746E69A0B27353110D471.TMP\WiseCustomCalla1.CEB85044_2EEF_484A_8907_2EAF870F92ED.dll MsiExec.exe File created C:\Windows\A4278059BC3746E69A0B27353110D471.TMP\WiseCustomCalla.92A04A00_8854_4FDB_8A3A_F7F61D547DD6.dll MsiExec.exe File created C:\Windows\A4278059BC3746E69A0B27353110D471.TMP\WiseCustomCall.92A04A00_8854_4FDB_8A3A_F7F61D547DD6.dll MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4672 msiexec.exe Token: SeIncreaseQuotaPrivilege 4672 msiexec.exe Token: SeSecurityPrivilege 4088 msiexec.exe Token: SeCreateTokenPrivilege 4672 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4672 msiexec.exe Token: SeLockMemoryPrivilege 4672 msiexec.exe Token: SeIncreaseQuotaPrivilege 4672 msiexec.exe Token: SeMachineAccountPrivilege 4672 msiexec.exe Token: SeTcbPrivilege 4672 msiexec.exe Token: SeSecurityPrivilege 4672 msiexec.exe Token: SeTakeOwnershipPrivilege 4672 msiexec.exe Token: SeLoadDriverPrivilege 4672 msiexec.exe Token: SeSystemProfilePrivilege 4672 msiexec.exe Token: SeSystemtimePrivilege 4672 msiexec.exe Token: SeProfSingleProcessPrivilege 4672 msiexec.exe Token: SeIncBasePriorityPrivilege 4672 msiexec.exe Token: SeCreatePagefilePrivilege 4672 msiexec.exe Token: SeCreatePermanentPrivilege 4672 msiexec.exe Token: SeBackupPrivilege 4672 msiexec.exe Token: SeRestorePrivilege 4672 msiexec.exe Token: SeShutdownPrivilege 4672 msiexec.exe Token: SeDebugPrivilege 4672 msiexec.exe Token: SeAuditPrivilege 4672 msiexec.exe Token: SeSystemEnvironmentPrivilege 4672 msiexec.exe Token: SeChangeNotifyPrivilege 4672 msiexec.exe Token: SeRemoteShutdownPrivilege 4672 msiexec.exe Token: SeUndockPrivilege 4672 msiexec.exe Token: SeSyncAgentPrivilege 4672 msiexec.exe Token: SeEnableDelegationPrivilege 4672 msiexec.exe Token: SeManageVolumePrivilege 4672 msiexec.exe Token: SeImpersonatePrivilege 4672 msiexec.exe Token: SeCreateGlobalPrivilege 4672 msiexec.exe Token: SeCreateTokenPrivilege 4672 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4672 msiexec.exe Token: SeLockMemoryPrivilege 4672 msiexec.exe Token: SeIncreaseQuotaPrivilege 4672 msiexec.exe Token: SeMachineAccountPrivilege 4672 msiexec.exe Token: SeTcbPrivilege 4672 msiexec.exe Token: SeSecurityPrivilege 4672 msiexec.exe Token: SeTakeOwnershipPrivilege 4672 msiexec.exe Token: SeLoadDriverPrivilege 4672 msiexec.exe Token: SeSystemProfilePrivilege 4672 msiexec.exe Token: SeSystemtimePrivilege 4672 msiexec.exe Token: SeProfSingleProcessPrivilege 4672 msiexec.exe Token: SeIncBasePriorityPrivilege 4672 msiexec.exe Token: SeCreatePagefilePrivilege 4672 msiexec.exe Token: SeCreatePermanentPrivilege 4672 msiexec.exe Token: SeBackupPrivilege 4672 msiexec.exe Token: SeRestorePrivilege 4672 msiexec.exe Token: SeShutdownPrivilege 4672 msiexec.exe Token: SeDebugPrivilege 4672 msiexec.exe Token: SeAuditPrivilege 4672 msiexec.exe Token: SeSystemEnvironmentPrivilege 4672 msiexec.exe Token: SeChangeNotifyPrivilege 4672 msiexec.exe Token: SeRemoteShutdownPrivilege 4672 msiexec.exe Token: SeUndockPrivilege 4672 msiexec.exe Token: SeSyncAgentPrivilege 4672 msiexec.exe Token: SeEnableDelegationPrivilege 4672 msiexec.exe Token: SeManageVolumePrivilege 4672 msiexec.exe Token: SeImpersonatePrivilege 4672 msiexec.exe Token: SeCreateGlobalPrivilege 4672 msiexec.exe Token: SeCreateTokenPrivilege 4672 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4672 msiexec.exe Token: SeLockMemoryPrivilege 4672 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4672 msiexec.exe 4672 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4088 wrote to memory of 4132 4088 msiexec.exe 89 PID 4088 wrote to memory of 4132 4088 msiexec.exe 89 PID 4088 wrote to memory of 4132 4088 msiexec.exe 89
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\6be34df727fcb79123e4e8f472ad24b698d83395fb17d4db019e9976f485cd83.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4672
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8F2C2A12249F71586E78F6C98544ACEE C2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:4132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5ff7446c8c951e30fdb1b8bf2998ff457
SHA196eb950ae2b3c108da101c64267713d26711c9e2
SHA25696d0323b72f317b9c0be1e8bc9b922258b6bb6520a032fd240bbf0c086826abd
SHA512d20e6a672293a1ae1b280413d824e205098ee480d6f69d024fc4f643083f4970f388ef3c8247f0b387b9ddf1128d2442cbd8a982f9a09ddf9d2fc27e9f0c9154
-
Filesize
64KB
MD5ff7446c8c951e30fdb1b8bf2998ff457
SHA196eb950ae2b3c108da101c64267713d26711c9e2
SHA25696d0323b72f317b9c0be1e8bc9b922258b6bb6520a032fd240bbf0c086826abd
SHA512d20e6a672293a1ae1b280413d824e205098ee480d6f69d024fc4f643083f4970f388ef3c8247f0b387b9ddf1128d2442cbd8a982f9a09ddf9d2fc27e9f0c9154
-
Filesize
238KB
MD5792953a279efde80e70561e5fa2fe5d2
SHA1c91b6612145f96cc3fd1c7b12736427d4ea7df00
SHA256bb67895f98f5dedd9090ec8f5476b998e353b8ed444c225dfd6fc06e6939cb89
SHA5129fad635f819aad740bb6b72e5e2c293ffe217e3e54ca43c864139e3e83d272dfffbf8ebe9fa02ee00e690a04aa6728180ae89e15a599aa3f310a53bb1c34e149
-
Filesize
238KB
MD5792953a279efde80e70561e5fa2fe5d2
SHA1c91b6612145f96cc3fd1c7b12736427d4ea7df00
SHA256bb67895f98f5dedd9090ec8f5476b998e353b8ed444c225dfd6fc06e6939cb89
SHA5129fad635f819aad740bb6b72e5e2c293ffe217e3e54ca43c864139e3e83d272dfffbf8ebe9fa02ee00e690a04aa6728180ae89e15a599aa3f310a53bb1c34e149
-
Filesize
238KB
MD5792953a279efde80e70561e5fa2fe5d2
SHA1c91b6612145f96cc3fd1c7b12736427d4ea7df00
SHA256bb67895f98f5dedd9090ec8f5476b998e353b8ed444c225dfd6fc06e6939cb89
SHA5129fad635f819aad740bb6b72e5e2c293ffe217e3e54ca43c864139e3e83d272dfffbf8ebe9fa02ee00e690a04aa6728180ae89e15a599aa3f310a53bb1c34e149
-
Filesize
238KB
MD5792953a279efde80e70561e5fa2fe5d2
SHA1c91b6612145f96cc3fd1c7b12736427d4ea7df00
SHA256bb67895f98f5dedd9090ec8f5476b998e353b8ed444c225dfd6fc06e6939cb89
SHA5129fad635f819aad740bb6b72e5e2c293ffe217e3e54ca43c864139e3e83d272dfffbf8ebe9fa02ee00e690a04aa6728180ae89e15a599aa3f310a53bb1c34e149
-
Filesize
67KB
MD59edde986ce80b8486fe45d0d271d6360
SHA1c76091790b1153ab02ca7d8c4dfe23a8bd5c7a06
SHA256af23351ed60666b21ebca19d4e69dd19e7ba09226714384d84493e25cf5501d0
SHA512a8c646ac34af0069860eef0a906ef8e3d14e8a687cdfcb71cab254f90686b2d69ae6161c779a590bb81c4b9da83fd9af83d6d434cdc6fefc9f965c3a7c6eecf5
-
Filesize
67KB
MD59edde986ce80b8486fe45d0d271d6360
SHA1c76091790b1153ab02ca7d8c4dfe23a8bd5c7a06
SHA256af23351ed60666b21ebca19d4e69dd19e7ba09226714384d84493e25cf5501d0
SHA512a8c646ac34af0069860eef0a906ef8e3d14e8a687cdfcb71cab254f90686b2d69ae6161c779a590bb81c4b9da83fd9af83d6d434cdc6fefc9f965c3a7c6eecf5
-
Filesize
67KB
MD59edde986ce80b8486fe45d0d271d6360
SHA1c76091790b1153ab02ca7d8c4dfe23a8bd5c7a06
SHA256af23351ed60666b21ebca19d4e69dd19e7ba09226714384d84493e25cf5501d0
SHA512a8c646ac34af0069860eef0a906ef8e3d14e8a687cdfcb71cab254f90686b2d69ae6161c779a590bb81c4b9da83fd9af83d6d434cdc6fefc9f965c3a7c6eecf5
-
Filesize
67KB
MD59edde986ce80b8486fe45d0d271d6360
SHA1c76091790b1153ab02ca7d8c4dfe23a8bd5c7a06
SHA256af23351ed60666b21ebca19d4e69dd19e7ba09226714384d84493e25cf5501d0
SHA512a8c646ac34af0069860eef0a906ef8e3d14e8a687cdfcb71cab254f90686b2d69ae6161c779a590bb81c4b9da83fd9af83d6d434cdc6fefc9f965c3a7c6eecf5
-
C:\Windows\A4278059BC3746E69A0B27353110D471.TMP\WiseCustomCall.92A04A00_8854_4FDB_8A3A_F7F61D547DD6.dll
Filesize65KB
MD5aa5fca54191c81348e466c2ff8a8bd9c
SHA11c0911969a26a93e8feeead18df97cc4cdd75f34
SHA2566b36b0b5457dc6fe232c8535cf21532d6a44213405d202bfa4d1c4471dfc1983
SHA51216a4deea052b9b599280759405e1cf3ad04904073dece8b48c79671dfb3f15f9dd32e453dbf65b54a114164022b6bda4f9f305a0ac3f802d7291f8fb9d195623
-
C:\Windows\A4278059BC3746E69A0B27353110D471.TMP\WiseCustomCalla.CEB85044_2EEF_484A_8907_2EAF870F92ED.dll
Filesize946KB
MD50000579bbad080c89bce243ecdd981a2
SHA187c62f6a8201d9535ccaaa9cf9f6b4d891610f52
SHA2569e1df95d52320a93288bc62243186869a9eec1a0df5af4b3dc98e0fa649a78bb
SHA51262614c26df1826ba7fe0ef3a481949075cd173ed2857a3a78179f8eb76eaf7df052135a976fb4661616ebbd71595c2dcc266b2066160108238d51a69bd49c27f
-
C:\Windows\A4278059BC3746E69A0B27353110D471.TMP\WiseCustomCalla.CEB85044_2EEF_484A_8907_2EAF870F92ED.dll
Filesize946KB
MD50000579bbad080c89bce243ecdd981a2
SHA187c62f6a8201d9535ccaaa9cf9f6b4d891610f52
SHA2569e1df95d52320a93288bc62243186869a9eec1a0df5af4b3dc98e0fa649a78bb
SHA51262614c26df1826ba7fe0ef3a481949075cd173ed2857a3a78179f8eb76eaf7df052135a976fb4661616ebbd71595c2dcc266b2066160108238d51a69bd49c27f
-
C:\Windows\A4278059BC3746E69A0B27353110D471.TMP\WiseCustomCalla.CEB85044_2EEF_484A_8907_2EAF870F92ED.dll
Filesize946KB
MD50000579bbad080c89bce243ecdd981a2
SHA187c62f6a8201d9535ccaaa9cf9f6b4d891610f52
SHA2569e1df95d52320a93288bc62243186869a9eec1a0df5af4b3dc98e0fa649a78bb
SHA51262614c26df1826ba7fe0ef3a481949075cd173ed2857a3a78179f8eb76eaf7df052135a976fb4661616ebbd71595c2dcc266b2066160108238d51a69bd49c27f
-
C:\Windows\A4278059BC3746E69A0B27353110D471.TMP\WiseCustomCalla.CEB85044_2EEF_484A_8907_2EAF870F92ED.dll
Filesize946KB
MD50000579bbad080c89bce243ecdd981a2
SHA187c62f6a8201d9535ccaaa9cf9f6b4d891610f52
SHA2569e1df95d52320a93288bc62243186869a9eec1a0df5af4b3dc98e0fa649a78bb
SHA51262614c26df1826ba7fe0ef3a481949075cd173ed2857a3a78179f8eb76eaf7df052135a976fb4661616ebbd71595c2dcc266b2066160108238d51a69bd49c27f
-
C:\Windows\A4278059BC3746E69A0B27353110D471.TMP\WiseCustomCalla.CEB85044_2EEF_484A_8907_2EAF870F92ED.dll
Filesize946KB
MD50000579bbad080c89bce243ecdd981a2
SHA187c62f6a8201d9535ccaaa9cf9f6b4d891610f52
SHA2569e1df95d52320a93288bc62243186869a9eec1a0df5af4b3dc98e0fa649a78bb
SHA51262614c26df1826ba7fe0ef3a481949075cd173ed2857a3a78179f8eb76eaf7df052135a976fb4661616ebbd71595c2dcc266b2066160108238d51a69bd49c27f