Analysis
-
max time kernel
6s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:55
Static task
static1
Behavioral task
behavioral1
Sample
588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe
Resource
win10v2004-20231215-en
General
-
Target
588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe
-
Size
58.1MB
-
MD5
2c0e631815c43c426990837a3eb6a64c
-
SHA1
e635bfcde96106c15781fbbf8b4212c3da547025
-
SHA256
588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4
-
SHA512
72b0f9410af3fc4c75eb003d19e07db4228922b4bef173a6face1d4f4d9a666f38bbe7920b0759c5e9f053901c90b7167d7b3d4eb09607106f764059654c3069
-
SSDEEP
1572864:R7KtQ4RVxPQVr+8+o9hLeypNKFj6mUqHYJG:R7Kt2rAyHAj6mUY+
Malware Config
Signatures
-
Detect jar appended to MSI 1 IoCs
resource yara_rule behavioral1/files/0x0009000000014a5b-148.dat jar_in_msi -
Executes dropped EXE 2 IoCs
pid Process 2540 ns17C7.tmp 2664 setup_asm_x86.exe -
Loads dropped DLL 9 IoCs
pid Process 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 2540 ns17C7.tmp 2664 setup_asm_x86.exe 2664 setup_asm_x86.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: MSIEXEC.EXE File opened (read-only) \??\U: MSIEXEC.EXE File opened (read-only) \??\W: MSIEXEC.EXE File opened (read-only) \??\Z: MSIEXEC.EXE File opened (read-only) \??\A: MSIEXEC.EXE File opened (read-only) \??\J: MSIEXEC.EXE File opened (read-only) \??\K: MSIEXEC.EXE File opened (read-only) \??\L: MSIEXEC.EXE File opened (read-only) \??\M: MSIEXEC.EXE File opened (read-only) \??\N: MSIEXEC.EXE File opened (read-only) \??\O: MSIEXEC.EXE File opened (read-only) \??\R: MSIEXEC.EXE File opened (read-only) \??\H: MSIEXEC.EXE File opened (read-only) \??\V: MSIEXEC.EXE File opened (read-only) \??\P: MSIEXEC.EXE File opened (read-only) \??\X: MSIEXEC.EXE File opened (read-only) \??\I: MSIEXEC.EXE File opened (read-only) \??\E: MSIEXEC.EXE File opened (read-only) \??\G: MSIEXEC.EXE File opened (read-only) \??\Q: MSIEXEC.EXE File opened (read-only) \??\S: MSIEXEC.EXE File opened (read-only) \??\Y: MSIEXEC.EXE File opened (read-only) \??\B: MSIEXEC.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2760 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 2760 MSIEXEC.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2664 setup_asm_x86.exe 2760 MSIEXEC.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2540 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 29 PID 2240 wrote to memory of 2540 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 29 PID 2240 wrote to memory of 2540 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 29 PID 2240 wrote to memory of 2540 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 29 PID 2240 wrote to memory of 2540 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 29 PID 2240 wrote to memory of 2540 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 29 PID 2240 wrote to memory of 2540 2240 588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe 29 PID 2540 wrote to memory of 2664 2540 ns17C7.tmp 30 PID 2540 wrote to memory of 2664 2540 ns17C7.tmp 30 PID 2540 wrote to memory of 2664 2540 ns17C7.tmp 30 PID 2540 wrote to memory of 2664 2540 ns17C7.tmp 30 PID 2540 wrote to memory of 2664 2540 ns17C7.tmp 30 PID 2540 wrote to memory of 2664 2540 ns17C7.tmp 30 PID 2540 wrote to memory of 2664 2540 ns17C7.tmp 30 PID 2664 wrote to memory of 2760 2664 setup_asm_x86.exe 31 PID 2664 wrote to memory of 2760 2664 setup_asm_x86.exe 31 PID 2664 wrote to memory of 2760 2664 setup_asm_x86.exe 31 PID 2664 wrote to memory of 2760 2664 setup_asm_x86.exe 31 PID 2664 wrote to memory of 2760 2664 setup_asm_x86.exe 31 PID 2664 wrote to memory of 2760 2664 setup_asm_x86.exe 31 PID 2664 wrote to memory of 2760 2664 setup_asm_x86.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe"C:\Users\Admin\AppData\Local\Temp\588d3cf5f6e2dfeea6d5c82849f9d35ae3afa583160018e8c0a3f8a6fe8deee4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\nso1759.tmp\ns17C7.tmp"C:\Users\Admin\AppData\Local\Temp\nso1759.tmp\ns17C7.tmp" "C:\Users\Admin\AppData\Local\Temp\nso1759.tmp\setup_asm_x86.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\nso1759.tmp\setup_asm_x86.exe"C:\Users\Admin\AppData\Local\Temp\nso1759.tmp\setup_asm_x86.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\MSIEXEC.EXEMSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Temp\{8DB43E59-741A-47F1-A5D8-1BEFE3C677E6}\Adaptec Storage Manager.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\nso1759.tmp" SETUPEXENAME="setup_asm_x86.exe"4⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2760
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2292
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 31248191960EDE4271AD8E2417E17D43 C2⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3419F337-19A2-429A-BFE0-99394A5A6685}1⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5851909E-32CE-49B0-B0AB-66D49E6CEC06}1⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{3370E75A-D0B3-471F-94BD-0171AE8C1BDC}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{9AE018E3-B792-4725-BD5B-B05A4E6ED8FB}1⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD590ed4938fd712e3ac49dfdff0ff63cc0
SHA1f3ae0ec59bd8fcb578310942bbf17c047d4895c9
SHA2569d3eee64d97e0b082a2ab26f997b29fd6f16bb49a70b711fdc241fca079c788b
SHA512c35ae7a402a01155a9aca294ee88a4029eeb2c560c25a33acb3e35d7060f8fa02d6bc0289b6cf44ed4e516cbd21a7c7b0843172d2686dc3a7270f40be08e0f70
-
Filesize
1.3MB
MD5e9884880c2c144aec14843b5b56a18d8
SHA17eb50576519bdad46e9fb00791d12a0857ed71fe
SHA2564ab41b99157256823462ecb9c140f0c43a4928e0d1656ed36856c535b15f8fb8
SHA5124733999d033186eb218c22d66f274bbdb304063bb606d9ed9ea7e7c3a86bace7b920580daf84b6a91d5a4f991f817b004b10b963966ace30d8e707f02925d221
-
Filesize
44KB
MD5138eb601efea88e18b08ae3c3e5978c5
SHA179d42a103dea17fbe4c847264c2e7ce517a937e6
SHA25637991a63aee45fc13ae47e59f82e339b4deb78a23c7d579dc888f1ef1c98cfa0
SHA512b1e826aacf3ddcd874d11de9ad47a139a7e64bd9c835e07c3fa84307e4fb61a88fac9aee4db2bea8022ee8aebce38dc80b00c48f93849988c7eccf30d085b355
-
Filesize
437B
MD53683743946fcf6f919bbadac2778304d
SHA183085b25e93914c58c5487a06e78289f1fdbbc38
SHA256862db3751a376dc8fdd31a341cd8183f5487dcb22b18fb603113d58c56bd0398
SHA5127e2e9e1d5791ceac75bbe4d6e6982a87af8bc62c21f21e60ff153e5cfd5f8e0f1f61f6a343e7af6446631a363b08f1f29c8a5a41b7f29e216e37d9c09c2d6e76
-
Filesize
13KB
MD5b60ed0c4b082775b0a8bbfa730394328
SHA14f3e82c7a8e5aa3314156ee6733ade63b4fd3d49
SHA256f9838b4ef735f2d02465700a9cc66b3809d254a106d587aa77ab0993f7733031
SHA512545849f584b24ed6c1016ca1a30a707297b884ebc07076d853ab2fe6c3b16eb14b9d60182517ca9f4fde2d785d3945415aacb13f9accf74e3df3e0d1fabd3e35
-
Filesize
6KB
MD52b81b005983d2147fd587f6a54e2480e
SHA1cb21d91fa43bec9b6948fdca4f312949e71beb9f
SHA256e2b3645086c5e0c75e3676db80fdb5d6a31e0f5bc7ee1689d077de1d02f46e7a
SHA512b436f636824291301543a3ecae879139bce22b9246cd01da4f1da65aa51122ce18feb53886eba398f51e991677c694ed244b0521a32d27be40c98523c0a845fb
-
Filesize
6KB
MD503a1a9be1f1e72f926ec9161825eedd6
SHA1d0574bafc615168c021788d413a3a73d275c492d
SHA2568a8bce943b78093ecd86a42c203931ee625f445acf5cb5b705e3b7eaf29c7110
SHA5128d82e15ee109d2236a995990fdd0c9fb39c9d3c4dea1c063f0806314e7a9d09a112f4f09091c265adba9f86ec7a0977294cce112e20ffb2f8b3ad62ab3dac396
-
Filesize
109KB
MD500a3d0756691997db4df0e80c23f6144
SHA151d62c67b560e799f11b7d40e325ec53f22db791
SHA2565b7dd90c9c2910658bd97d37f7ce4966c786f7e2e1c0625c1252bab37c1a9b77
SHA5120c7440afa7aed94d36fadd439cf24222a8be574bba41cbb716b256cdae505a905cfc40886feab89a8addf9b36625e4b5e18629e24f9852fa731ed38998648550
-
Filesize
113KB
MD5ebb0d19b342364ef3fd9fc8bc522e5e6
SHA128344608d07f19e43e5067ff9de440cbced6d382
SHA2567817c1f50abe4c2684c66f8e6648773799fa280f8c5b6290ba2963285c6c3b70
SHA51282202e3b15344b3cc95b2e69d195dad8cbc6102aec4f7133fcd10c1ad1ed569f5eedb221793f94ee58cc47a4b72566a02dcea94918d346861b67dd28c12fde46
-
Filesize
104KB
MD541cb698f967b4d9f2580ea2a21a5a710
SHA11e2db1ac09d0cfbd6601b95c2a1d78a80f78e236
SHA25610205dd8642824f9c81f32e73d8402e892a839b71a13b3816f548f3805fded8b
SHA5127e2f439d2ca8369c771819f8d137ec96822ea63ede9b34b10946343ea14b0b1cb3b828d43c17fb3c6c6ac8e2bd7aec4ee77dd6cce861706d476af1150d85a158
-
Filesize
255KB
MD50ec6b3d99d56f9fb9078b24d3b5ec4eb
SHA1f56262260561f5c342661a4956ee96eb1c84946a
SHA256eccd250aed9710a4b58f09bc2eea62bc5f9e181efd85dcbe2aa11d61f7a9c520
SHA5123267e8648b599cedf84a8b2fff8405e6c0662264fed9707e0c89791d4c9e33845576bd96cb3d17621d5e4cde5cac07526e11791bd0ef8017fcc4b441ba304465
-
Filesize
204KB
MD5f9e229f43602a309eda918cd01593d3d
SHA11cefd11fb16b4f70f5dde5c6784b36c3afb072f1
SHA256d8092829d8caea3cbef23d594f9de5e2bafc6b6ea63dbba0f2a3ee3056c33462
SHA512c1164cff26455b7c7d65cf0b8003961df84fad8a0760dd908004c8eb11a012755cebe132831a1399586c6e052eb1973d0c97bdb477a72d515865d3d82e5091d6
-
Filesize
321KB
MD5a13e6486c97f6d21f0d3aee8307b890e
SHA12fb258951625931d51fb654f5674497a9f076f95
SHA2565cf3b88bba1f4e136916c593825250ddf70d5c6cf1d78ba0081768cc64fad98c
SHA51258088ac72eef70c3a6b10dbf7d87d253abcac405cf8b5ed66c3ff13837250452b16015a6f62618905f88179eeae41ab9ba0fac124860cc4b19e2be47382f5aef
-
Filesize
1KB
MD542d0839f49601e747ec4ac60d1fa5fae
SHA1e99a1a8698ae552c519d4198f4e631d9e7c8a8c7
SHA2567c9d098f4b70283c617dbde2c2b4dde0a5ff10174e60945b76fdd537b283ae60
SHA512b8b1d18869e93b9ed9b21a2ea8be64a5951f114b1234f4fc5524085434ff1ed4e3c3e9a8727f0fddd3c312001c8ef9e6fd531924692c6f402724010a2cbc8e40
-
Filesize
20KB
MD536affbd6ff77d1515cfc1c5e998fbaf9
SHA1950d00ecc2e7fd2c48897814029e8eedf6397838
SHA256fccc7f79d29318d8ae78850c262bac762c28858709a6e6cf3b62bcd2729a61e3
SHA5122f29de86d486db783872581a43a834e5064d1488bc3f085ddc5a3287eb9ee8a4ce93d66f7b4965cafb3c4f06b38d4b0fcfdc0fcb1f99d61331a808e5d6011808
-
C:\Users\Admin\AppData\Local\Temp\{8DB43E59-741A-47F1-A5D8-1BEFE3C677E6}\Adaptec Storage Manager.msi
Filesize1KB
MD56b7d0521d9497a2d157aae1169c6ec99
SHA188faa34e86da4fd6bdd53ec33564f74c293c18ec
SHA256e73768c588385ae26d19089015a54d796ba60c606e7b0636a91f74f87044224f
SHA512763579843b466ab15bf31cd9b62db4dc9903c645f5612af0a61d88562dc7d0f2339fb9b9b74399857792f0bb9f774b345ab5812f87da441a84f22420de78c232
-
Filesize
2KB
MD51cfc7c1ee5f7be20a2224f5801570275
SHA1c06cbdab64a1b80915df51267a3593eaf0b19264
SHA256a7df5e52ae7d744d587f621b3abb14fa23941531402cf0b09db7f60a56c78fc7
SHA51295f63be015984a9d8622e742df0ce401880bc326431c16a0df0edf548160d52aa0e5493e8a59d5e297a7abd37c5dc7f0fa07dda7606c09cea275add68b1b2c89
-
Filesize
125KB
MD5b0bcc622f1fff0eec99e487fa1a4ddd9
SHA149aa392454bd5869fa23794196aedc38e8eea6f5
SHA256b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081
SHA5121572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7
-
Filesize
4KB
MD56547d1af397e1f2719c53a99fb43bd7a
SHA11c6000b23c9fb52f0ac8d6d77fa7a06a61f25e2e
SHA25619bc489f1e958abd0f47bc5d6c199a9bf74b379ddb0e2fca7b6ab4eeb9452848
SHA5126f135848d212754315815ccae1b5f58dc2dd1b0dbe043fec947b75e0f6f81d5a0cf5f23496f7938fdb4391b83bb1863a12bdfd8a946044d0b881da6282c1989f
-
Filesize
10KB
MD5da802677276c27b430cfb11c9da0bed2
SHA16893b15fdd34fae3d35bc5b01355a5a919dd9a7b
SHA256756861c52304402a3fc2e0fc9f3ecc8ebb546916fc2812f1df5f2e63da1c5a82
SHA5120b212788ccca336fe228335189ec3bd0dc207c296cf3b219a88511c44735f8e1913bf745699be0f29078a47adc0442e4ff891c0877541ccbcfa1ad5e4dc1b187
-
Filesize
96KB
MD5c8c93284e9bd0155d91fdd8b189b6f7a
SHA14010b7c23019bf3d387c0cc5c040e6498dbe5b57
SHA256fd05beabbb03019ee972a091787421103c5dc9744bd6bbd5535ab963bfe8d916
SHA5124400ac0c9348f5f08a18534a55dffc9419b16d8b413f59c00477c205037ea73f532acb6836b5b8f8436373dd0e12b9d513ffee535646a6a18105b5a1884c45aa
-
Filesize
63KB
MD5ba4a47cb8aff50a426e41592e801fab2
SHA1fbf44851247c02d9a4f2f79df587da461805c78e
SHA2568d8b97d2d6787fe277ae909bf1d2082b1e5148a6b59db7384c869e2d5dfc7f9c
SHA512f5ff229abcb349c80d814d92d6edae8fd9b1d5061181f26e7f2807a68f81b623008eeff8eb85064d003fe5a1fcf0a7a3e18419c333286a6730f1694969b01b4f
-
Filesize
73KB
MD55967d93c27980c7a9f1a7043d4613a4a
SHA1dc7b284cd78ac45dcab590eb4873ec05ca1158df
SHA2568542d84cab48a666b7e4f194369d1ae0091a48c5d277398aa1db7bbb3bb434d1
SHA51242c12695c70180347a16b40490ea8fa0d935ff73be3b7484563209801e1e2a69580e59d1f9666ecee4680cc7af3282434aa41f969f1e9b61379969de27e36cad
-
Filesize
45KB
MD5e81093770e1a16ae07fa7b79bb666394
SHA1b2ee38756d1a59e8e0e25f0fa0c1333c7448be51
SHA25659f2e809dfc425f59c36ff4dc6d78403a80eb9f0d1cac5590e010817abcb7a1e
SHA512ca87e7e8cd1783e27663b25d3a139ddd76fc63f3eb60849fc5683d7fab85c6a5954f3e2ff4ca722ca79b402a27f09751c78280d36fef2b134c1d3c88961371d2
-
Filesize
183KB
MD5150279095cfc5d8eb19fca51095b2397
SHA18d9667904e2c9bc18dc373d7deb96d95de10ba05
SHA2561344091ed7e5ebf432b6d5b7a52ad0d6888902d98f24d046abc5fdd04f09fa73
SHA512171ca45e06d97e10d56ce1345e16d729c5f8a37f21d3c11f0996e3168b75b3dfd27a392e53b4bcf967113338bf8d92bfa1dc768865c68d03f19eb43789bb7bfd
-
Filesize
545KB
MD596a7ecd707ebcdd47e3a72e4b10fce6a
SHA16d69ab012e86b15409e6f4ad772866200052796d
SHA256b65b04c73e7cbb2132faa0adb2e3a1ff1120470f1aa4440a5d7000750bb95b02
SHA51228eab950039b67df05e7675724806b1630524752097fede48e62dc941b9c9e971bd9ac5cde6816ae40b76fbe10d0da0fe75f53002e0d1dc48b87736e56cc65c2