Overview
overview
7Static
static
3CONECTAR M...64.msi
windows7-x64
7CONECTAR M...64.msi
windows10-2004-x64
7CONECTAR M...86.msi
windows7-x64
7CONECTAR M...86.msi
windows10-2004-x64
7CONECTAR M...MC.exe
windows7-x64
1CONECTAR M...MC.exe
windows10-2004-x64
1CONECTAR M..._3.dll
windows7-x64
1CONECTAR M..._3.dll
windows10-2004-x64
1CONECTAR M...ni.dll
windows7-x64
1CONECTAR M...ni.dll
windows10-2004-x64
1CONECTAR M...ni.dll
windows7-x64
1CONECTAR M...ni.dll
windows10-2004-x64
1CONECTAR M...ig.sys
windows7-x64
1CONECTAR M...ig.sys
windows10-2004-x64
1CONECTAR M..._3.dll
windows7-x64
1CONECTAR M..._3.dll
windows10-2004-x64
1CONECTAR M...ni.dll
windows7-x64
1CONECTAR M...ni.dll
windows10-2004-x64
1CONECTAR M...ni.dll
windows7-x64
1CONECTAR M...ni.dll
windows10-2004-x64
1CONECTAR M...ig.sys
windows7-x64
1CONECTAR M...ig.sys
windows10-2004-x64
1Analysis
-
max time kernel
88s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
CONECTAR MANDO PS3/BLUETHOOTH/BthPS3Setup_x64.msi
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CONECTAR MANDO PS3/BLUETHOOTH/BthPS3Setup_x64.msi
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
CONECTAR MANDO PS3/BLUETHOOTH/BthPS3Setup_x86.msi
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
CONECTAR MANDO PS3/BLUETHOOTH/BthPS3Setup_x86.msi
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
CONECTAR MANDO PS3/CABLE/DSHMC.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
CONECTAR MANDO PS3/CABLE/DSHMC.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
CONECTAR MANDO PS3/CABLE/x64/XInput1_3.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
CONECTAR MANDO PS3/CABLE/x64/XInput1_3.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
CONECTAR MANDO PS3/CABLE/x64/dshidmini.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
CONECTAR MANDO PS3/CABLE/x64/dshidmini.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
CONECTAR MANDO PS3/CABLE/x64/dshidmini/dshidmini.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
CONECTAR MANDO PS3/CABLE/x64/dshidmini/dshidmini.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
CONECTAR MANDO PS3/CABLE/x64/dshidmini/nssmkig.sys
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
CONECTAR MANDO PS3/CABLE/x64/dshidmini/nssmkig.sys
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
CONECTAR MANDO PS3/CABLE/x86/XInput1_3.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
CONECTAR MANDO PS3/CABLE/x86/XInput1_3.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
CONECTAR MANDO PS3/CABLE/x86/dshidmini.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
CONECTAR MANDO PS3/CABLE/x86/dshidmini.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
CONECTAR MANDO PS3/CABLE/x86/dshidmini/dshidmini.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
CONECTAR MANDO PS3/CABLE/x86/dshidmini/dshidmini.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
CONECTAR MANDO PS3/CABLE/x86/dshidmini/nssmkig.sys
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
CONECTAR MANDO PS3/CABLE/x86/dshidmini/nssmkig.sys
Resource
win10v2004-20231222-en
General
-
Target
CONECTAR MANDO PS3/BLUETHOOTH/BthPS3Setup_x86.msi
-
Size
3.0MB
-
MD5
fd81d0e9a638a9664d7e3332e124e787
-
SHA1
e23e771e2b2b8747f24d64b3cf8791dcee55f919
-
SHA256
cf23fbbf5d8b464c579c57640d6da76a767003e957268b69b96c9ce32d215f5e
-
SHA512
358f4615d847419a57e5c09385860784e3ab2f1b6a70445ec8a25302bc3a09c3dca8ab3592d7415e26d7148d3d524fecc846f4b360ef9a92a84ad90962c6a236
-
SSDEEP
98304:S6xh0DeTVVQMhbgwgr1f88lXA15flOs6YV0FLG:SOweTVVQMhklfVRA5d5d
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 5020 MsiExec.exe 5020 MsiExec.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 5 1788 msiexec.exe 8 1788 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1788 msiexec.exe Token: SeIncreaseQuotaPrivilege 1788 msiexec.exe Token: SeSecurityPrivilege 2876 msiexec.exe Token: SeCreateTokenPrivilege 1788 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1788 msiexec.exe Token: SeLockMemoryPrivilege 1788 msiexec.exe Token: SeIncreaseQuotaPrivilege 1788 msiexec.exe Token: SeMachineAccountPrivilege 1788 msiexec.exe Token: SeTcbPrivilege 1788 msiexec.exe Token: SeSecurityPrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeLoadDriverPrivilege 1788 msiexec.exe Token: SeSystemProfilePrivilege 1788 msiexec.exe Token: SeSystemtimePrivilege 1788 msiexec.exe Token: SeProfSingleProcessPrivilege 1788 msiexec.exe Token: SeIncBasePriorityPrivilege 1788 msiexec.exe Token: SeCreatePagefilePrivilege 1788 msiexec.exe Token: SeCreatePermanentPrivilege 1788 msiexec.exe Token: SeBackupPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeShutdownPrivilege 1788 msiexec.exe Token: SeDebugPrivilege 1788 msiexec.exe Token: SeAuditPrivilege 1788 msiexec.exe Token: SeSystemEnvironmentPrivilege 1788 msiexec.exe Token: SeChangeNotifyPrivilege 1788 msiexec.exe Token: SeRemoteShutdownPrivilege 1788 msiexec.exe Token: SeUndockPrivilege 1788 msiexec.exe Token: SeSyncAgentPrivilege 1788 msiexec.exe Token: SeEnableDelegationPrivilege 1788 msiexec.exe Token: SeManageVolumePrivilege 1788 msiexec.exe Token: SeImpersonatePrivilege 1788 msiexec.exe Token: SeCreateGlobalPrivilege 1788 msiexec.exe Token: SeCreateTokenPrivilege 1788 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1788 msiexec.exe Token: SeLockMemoryPrivilege 1788 msiexec.exe Token: SeIncreaseQuotaPrivilege 1788 msiexec.exe Token: SeMachineAccountPrivilege 1788 msiexec.exe Token: SeTcbPrivilege 1788 msiexec.exe Token: SeSecurityPrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeLoadDriverPrivilege 1788 msiexec.exe Token: SeSystemProfilePrivilege 1788 msiexec.exe Token: SeSystemtimePrivilege 1788 msiexec.exe Token: SeProfSingleProcessPrivilege 1788 msiexec.exe Token: SeIncBasePriorityPrivilege 1788 msiexec.exe Token: SeCreatePagefilePrivilege 1788 msiexec.exe Token: SeCreatePermanentPrivilege 1788 msiexec.exe Token: SeBackupPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeShutdownPrivilege 1788 msiexec.exe Token: SeDebugPrivilege 1788 msiexec.exe Token: SeAuditPrivilege 1788 msiexec.exe Token: SeSystemEnvironmentPrivilege 1788 msiexec.exe Token: SeChangeNotifyPrivilege 1788 msiexec.exe Token: SeRemoteShutdownPrivilege 1788 msiexec.exe Token: SeUndockPrivilege 1788 msiexec.exe Token: SeSyncAgentPrivilege 1788 msiexec.exe Token: SeEnableDelegationPrivilege 1788 msiexec.exe Token: SeManageVolumePrivilege 1788 msiexec.exe Token: SeImpersonatePrivilege 1788 msiexec.exe Token: SeCreateGlobalPrivilege 1788 msiexec.exe Token: SeCreateTokenPrivilege 1788 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1788 msiexec.exe Token: SeLockMemoryPrivilege 1788 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1788 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2876 wrote to memory of 5020 2876 msiexec.exe 91 PID 2876 wrote to memory of 5020 2876 msiexec.exe 91 PID 2876 wrote to memory of 5020 2876 msiexec.exe 91
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\CONECTAR MANDO PS3\BLUETHOOTH\BthPS3Setup_x86.msi"1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1788
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 66C1212D585BEE315EB57BAE45E25D8C C2⤵
- Loads dropped DLL
PID:5020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD54d8a68a1ebb7463f9a258a42e5106b86
SHA1bd401686e7b0e47d65b9021e476b8421cdcc7fc7
SHA2567f2f0ee6fd325d966487c64c0b753abcb671ba9bc086fd49f20d8324bbff9232
SHA512e3a37e060f8d899fd780c64e0e2786af5104a0b98a9d116c84194d227ae089a899f2b2f45d28125d4d3cb01f7bda091adce5b4200901b0409151d2c04e56556d