Analysis
-
max time kernel
1s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
VPN_Windows_Installer.msi
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VPN_Windows_Installer.msi
Resource
win10v2004-20231222-en
General
-
Target
VPN_Windows_Installer.msi
-
Size
18.4MB
-
MD5
240f6fcaea6b562d40decc19193e0f40
-
SHA1
8fb8e0668d021a705e5beda16152492ac8d29a29
-
SHA256
46746aca3805982e8b7ace71e9505f6f46fc77e1ff3efce20d7844f216b6ac9c
-
SHA512
989d7b6f493d4a364180c84c4022a544d147b6e7c7ed49f42f730121901765cfc14df9483c3fad0527aa323e052f89c67d80a78e9f970072b53f187b93ad57c8
-
SSDEEP
393216:jcf5oB4c6CdthqMCEnzFRSw303xb9EfVAhAK5yTVTmLDrSHL:koBl6Gq7Ez/SwkB5E2mK59ur
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2028 msiexec.exe 6 2028 msiexec.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2028 msiexec.exe Token: SeIncreaseQuotaPrivilege 2028 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 msiexec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\VPN_Windows_Installer.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2028
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5db468d2610152f1a447ef6d6c5fc8f11
SHA1792593c400479f25495e848720021c868f033ca1
SHA256f0edb45bc18b382f59af938b64adffb8bb23311168b7b17340a39a9cfb5e80d0
SHA512b3a057a0da75ba4d2adecd4f1c499d4f4f94e8235d10a7b0c6f9cb977b4dd10ffd60433107bf8da12cfb7d7c13b38966b7e9ae8e174e8f1e0e39d421cdb5b316