Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 15:07
Behavioral task
behavioral1
Sample
Android Fastboot & mini ADB Drivers/Android ADB Fastboot 1.7.msi
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Android Fastboot & mini ADB Drivers/Android ADB Fastboot 1.7.msi
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Android Fastboot & mini ADB Drivers/UniversalAdbDriverSetup.msi
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Android Fastboot & mini ADB Drivers/UniversalAdbDriverSetup.msi
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Android Fastboot & mini ADB Drivers/adb-setup-1.4.3.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Android Fastboot & mini ADB Drivers/adb-setup-1.4.3.exe
Resource
win10v2004-20231222-en
General
-
Target
Android Fastboot & mini ADB Drivers/Android ADB Fastboot 1.7.msi
-
Size
3.7MB
-
MD5
0a1e784597bc17f9b420796a7b931eeb
-
SHA1
f2f9d0e17278a3eb9a6428b4cd6a1ca4094f7009
-
SHA256
367521fd6b5f361df98a7c5b3809f030b64c431609d7ae4ba2690850ccf11b76
-
SHA512
31bde1cd229f178b045429fcfc3b0d0f6f0d9c99e5cc7ec257e638ed3c713852e55f58bbf5bb2bdad2018038f0a69ea3aae066c6c24ea288f83c4ea5023670bb
-
SSDEEP
98304:5YwADYeHcczaFB8i99RDGgYQB1mdMgWqO:jASIi9f97B1m6gA
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
Processes:
MsiExec.exeMsiExec.exepid Process 3888 MsiExec.exe 3888 MsiExec.exe 3888 MsiExec.exe 3888 MsiExec.exe 3888 MsiExec.exe 3008 MsiExec.exe 3008 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc Process File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Drops file in Windows directory 12 IoCs
Processes:
msiexec.exedescription ioc Process File opened for modification C:\Windows\Installer\e588aa7.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8D18.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\e588aa7.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8E42.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{29FB844C-8CE6-450A-9510-A07FD091CD57} msiexec.exe File opened for modification C:\Windows\Installer\MSI9102.tmp msiexec.exe File created C:\Windows\Installer\{29FB844C-8CE6-450A-9510-A07FD091CD57}\Android.exe msiexec.exe File opened for modification C:\Windows\Installer\{29FB844C-8CE6-450A-9510-A07FD091CD57}\Android.exe msiexec.exe File created C:\Windows\Installer\e588aa9.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
msiexec.exedescription ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\22\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\23 msiexec.exe -
Modifies registry class 24 IoCs
Processes:
msiexec.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C448BF926EC8A05459010AF70D19DC75\MainFeature msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\Version = "17235968" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\ProductIcon = "C:\\Windows\\Installer\\{29FB844C-8CE6-450A-9510-A07FD091CD57}\\Android.exe" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\DeploymentFlags = "3" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\Android Fastboot & mini ADB Drivers\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C448BF926EC8A05459010AF70D19DC75 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\PackageCode = "CE684704D628D0E42A19395EC7A2D8DA" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1D54F4542764ED54D82DA39284C70B46 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1D54F4542764ED54D82DA39284C70B46\C448BF926EC8A05459010AF70D19DC75 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\SourceList\PackageName = "Android ADB Fastboot 1.7.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Android Fastboot & mini ADB Drivers\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\ProductName = "Android ADB Fastboot" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C448BF926EC8A05459010AF70D19DC75\Clients = 3a0000000000 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msiexec.exepid Process 3340 msiexec.exe 3340 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid Process Token: SeShutdownPrivilege 2220 msiexec.exe Token: SeIncreaseQuotaPrivilege 2220 msiexec.exe Token: SeSecurityPrivilege 3340 msiexec.exe Token: SeCreateTokenPrivilege 2220 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2220 msiexec.exe Token: SeLockMemoryPrivilege 2220 msiexec.exe Token: SeIncreaseQuotaPrivilege 2220 msiexec.exe Token: SeMachineAccountPrivilege 2220 msiexec.exe Token: SeTcbPrivilege 2220 msiexec.exe Token: SeSecurityPrivilege 2220 msiexec.exe Token: SeTakeOwnershipPrivilege 2220 msiexec.exe Token: SeLoadDriverPrivilege 2220 msiexec.exe Token: SeSystemProfilePrivilege 2220 msiexec.exe Token: SeSystemtimePrivilege 2220 msiexec.exe Token: SeProfSingleProcessPrivilege 2220 msiexec.exe Token: SeIncBasePriorityPrivilege 2220 msiexec.exe Token: SeCreatePagefilePrivilege 2220 msiexec.exe Token: SeCreatePermanentPrivilege 2220 msiexec.exe Token: SeBackupPrivilege 2220 msiexec.exe Token: SeRestorePrivilege 2220 msiexec.exe Token: SeShutdownPrivilege 2220 msiexec.exe Token: SeDebugPrivilege 2220 msiexec.exe Token: SeAuditPrivilege 2220 msiexec.exe Token: SeSystemEnvironmentPrivilege 2220 msiexec.exe Token: SeChangeNotifyPrivilege 2220 msiexec.exe Token: SeRemoteShutdownPrivilege 2220 msiexec.exe Token: SeUndockPrivilege 2220 msiexec.exe Token: SeSyncAgentPrivilege 2220 msiexec.exe Token: SeEnableDelegationPrivilege 2220 msiexec.exe Token: SeManageVolumePrivilege 2220 msiexec.exe Token: SeImpersonatePrivilege 2220 msiexec.exe Token: SeCreateGlobalPrivilege 2220 msiexec.exe Token: SeCreateTokenPrivilege 2220 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2220 msiexec.exe Token: SeLockMemoryPrivilege 2220 msiexec.exe Token: SeIncreaseQuotaPrivilege 2220 msiexec.exe Token: SeMachineAccountPrivilege 2220 msiexec.exe Token: SeTcbPrivilege 2220 msiexec.exe Token: SeSecurityPrivilege 2220 msiexec.exe Token: SeTakeOwnershipPrivilege 2220 msiexec.exe Token: SeLoadDriverPrivilege 2220 msiexec.exe Token: SeSystemProfilePrivilege 2220 msiexec.exe Token: SeSystemtimePrivilege 2220 msiexec.exe Token: SeProfSingleProcessPrivilege 2220 msiexec.exe Token: SeIncBasePriorityPrivilege 2220 msiexec.exe Token: SeCreatePagefilePrivilege 2220 msiexec.exe Token: SeCreatePermanentPrivilege 2220 msiexec.exe Token: SeBackupPrivilege 2220 msiexec.exe Token: SeRestorePrivilege 2220 msiexec.exe Token: SeShutdownPrivilege 2220 msiexec.exe Token: SeDebugPrivilege 2220 msiexec.exe Token: SeAuditPrivilege 2220 msiexec.exe Token: SeSystemEnvironmentPrivilege 2220 msiexec.exe Token: SeChangeNotifyPrivilege 2220 msiexec.exe Token: SeRemoteShutdownPrivilege 2220 msiexec.exe Token: SeUndockPrivilege 2220 msiexec.exe Token: SeSyncAgentPrivilege 2220 msiexec.exe Token: SeEnableDelegationPrivilege 2220 msiexec.exe Token: SeManageVolumePrivilege 2220 msiexec.exe Token: SeImpersonatePrivilege 2220 msiexec.exe Token: SeCreateGlobalPrivilege 2220 msiexec.exe Token: SeCreateTokenPrivilege 2220 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2220 msiexec.exe Token: SeLockMemoryPrivilege 2220 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid Process 2220 msiexec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
msiexec.exedescription pid Process procid_target PID 3340 wrote to memory of 3888 3340 msiexec.exe 91 PID 3340 wrote to memory of 3888 3340 msiexec.exe 91 PID 3340 wrote to memory of 3888 3340 msiexec.exe 91 PID 3340 wrote to memory of 3008 3340 msiexec.exe 100 PID 3340 wrote to memory of 3008 3340 msiexec.exe 100 PID 3340 wrote to memory of 3008 3340 msiexec.exe 100
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Android Fastboot & mini ADB Drivers\Android ADB Fastboot 1.7.msi"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2220
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 82875205361342406632C9A3EB6BD6B4 C2⤵
- Loads dropped DLL
PID:3888
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1F5F2F98E1C3B4BA44A014BCF29C75892⤵
- Loads dropped DLL
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD59384813b60b796edbf833d948386fb06
SHA1755fd5a3fcba9f486b25be4524ffc58039aeb533
SHA256e29d501bb64b7149d77f19ab09871c49fd48ba06d4973c3f64dba78b8e76f1f6
SHA512d8fedbc59047f648d043d28f164bb9a2543b9a89e702c96a6a98bfcca2abfeb82584e65f6df5fa172227d2ce8222733190d324e9fae6e76c051e91b4733670a2
-
Filesize
209KB
MD526bb078a67c7eedd5e55756e49e08150
SHA117475069b69ea63f637694ecfaad694499e2a09e
SHA2564f4ad63074a619bf5505aab6e81db5be0c2368e2c3aa48f5874607a00c89f81e
SHA512b929ba0960fa103fd9cbbb824fe41f1f49b3072c7ea715b46fd583e002638c81909c6194bfea7f480ff79ce3a1e411591a9b3d9b3213dbda2eea3df3b08b019f
-
Filesize
3.7MB
MD50a1e784597bc17f9b420796a7b931eeb
SHA1f2f9d0e17278a3eb9a6428b4cd6a1ca4094f7009
SHA256367521fd6b5f361df98a7c5b3809f030b64c431609d7ae4ba2690850ccf11b76
SHA51231bde1cd229f178b045429fcfc3b0d0f6f0d9c99e5cc7ec257e638ed3c713852e55f58bbf5bb2bdad2018038f0a69ea3aae066c6c24ea288f83c4ea5023670bb