Analysis
-
max time kernel
155s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
94b8ab735d503884585fdb5a735b3ea3485b6b19c1899939a5b2c0a80616400a.msi
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
94b8ab735d503884585fdb5a735b3ea3485b6b19c1899939a5b2c0a80616400a.msi
Resource
win10v2004-20231215-en
General
-
Target
94b8ab735d503884585fdb5a735b3ea3485b6b19c1899939a5b2c0a80616400a.msi
-
Size
1.5MB
-
MD5
9c8696dbb48add540a75737327c537d2
-
SHA1
78b4eb7d363e017eb06e03408d7952bbb843f9a9
-
SHA256
94b8ab735d503884585fdb5a735b3ea3485b6b19c1899939a5b2c0a80616400a
-
SHA512
6ee26ecedd0386eca113e61086f6623b36ca093d24e41d90cf45412072d94d91dddb39c86ce726c3514da3d0221d3cf03455b00cc5d0987ca63d45c12225cf4a
-
SSDEEP
49152:yErvYpW8zBQSc0ZnSKeZKumZr7Amyq3TGtezO:RYQ0ZncK/AEs
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe -
Loads dropped DLL 6 IoCs
pid Process 512 MsiExec.exe 512 MsiExec.exe 512 MsiExec.exe 512 MsiExec.exe 512 MsiExec.exe 512 MsiExec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 00000000040000003462af5746133e160000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff0000000027010100000800003462af570000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff0000000007000100006809003462af57000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1d3462af57000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000003462af5700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4320 msiexec.exe Token: SeIncreaseQuotaPrivilege 4320 msiexec.exe Token: SeSecurityPrivilege 3764 msiexec.exe Token: SeCreateTokenPrivilege 4320 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4320 msiexec.exe Token: SeLockMemoryPrivilege 4320 msiexec.exe Token: SeIncreaseQuotaPrivilege 4320 msiexec.exe Token: SeMachineAccountPrivilege 4320 msiexec.exe Token: SeTcbPrivilege 4320 msiexec.exe Token: SeSecurityPrivilege 4320 msiexec.exe Token: SeTakeOwnershipPrivilege 4320 msiexec.exe Token: SeLoadDriverPrivilege 4320 msiexec.exe Token: SeSystemProfilePrivilege 4320 msiexec.exe Token: SeSystemtimePrivilege 4320 msiexec.exe Token: SeProfSingleProcessPrivilege 4320 msiexec.exe Token: SeIncBasePriorityPrivilege 4320 msiexec.exe Token: SeCreatePagefilePrivilege 4320 msiexec.exe Token: SeCreatePermanentPrivilege 4320 msiexec.exe Token: SeBackupPrivilege 4320 msiexec.exe Token: SeRestorePrivilege 4320 msiexec.exe Token: SeShutdownPrivilege 4320 msiexec.exe Token: SeDebugPrivilege 4320 msiexec.exe Token: SeAuditPrivilege 4320 msiexec.exe Token: SeSystemEnvironmentPrivilege 4320 msiexec.exe Token: SeChangeNotifyPrivilege 4320 msiexec.exe Token: SeRemoteShutdownPrivilege 4320 msiexec.exe Token: SeUndockPrivilege 4320 msiexec.exe Token: SeSyncAgentPrivilege 4320 msiexec.exe Token: SeEnableDelegationPrivilege 4320 msiexec.exe Token: SeManageVolumePrivilege 4320 msiexec.exe Token: SeImpersonatePrivilege 4320 msiexec.exe Token: SeCreateGlobalPrivilege 4320 msiexec.exe Token: SeCreateTokenPrivilege 4320 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4320 msiexec.exe Token: SeLockMemoryPrivilege 4320 msiexec.exe Token: SeIncreaseQuotaPrivilege 4320 msiexec.exe Token: SeMachineAccountPrivilege 4320 msiexec.exe Token: SeTcbPrivilege 4320 msiexec.exe Token: SeSecurityPrivilege 4320 msiexec.exe Token: SeTakeOwnershipPrivilege 4320 msiexec.exe Token: SeLoadDriverPrivilege 4320 msiexec.exe Token: SeSystemProfilePrivilege 4320 msiexec.exe Token: SeSystemtimePrivilege 4320 msiexec.exe Token: SeProfSingleProcessPrivilege 4320 msiexec.exe Token: SeIncBasePriorityPrivilege 4320 msiexec.exe Token: SeCreatePagefilePrivilege 4320 msiexec.exe Token: SeCreatePermanentPrivilege 4320 msiexec.exe Token: SeBackupPrivilege 4320 msiexec.exe Token: SeRestorePrivilege 4320 msiexec.exe Token: SeShutdownPrivilege 4320 msiexec.exe Token: SeDebugPrivilege 4320 msiexec.exe Token: SeAuditPrivilege 4320 msiexec.exe Token: SeSystemEnvironmentPrivilege 4320 msiexec.exe Token: SeChangeNotifyPrivilege 4320 msiexec.exe Token: SeRemoteShutdownPrivilege 4320 msiexec.exe Token: SeUndockPrivilege 4320 msiexec.exe Token: SeSyncAgentPrivilege 4320 msiexec.exe Token: SeEnableDelegationPrivilege 4320 msiexec.exe Token: SeManageVolumePrivilege 4320 msiexec.exe Token: SeImpersonatePrivilege 4320 msiexec.exe Token: SeCreateGlobalPrivilege 4320 msiexec.exe Token: SeCreateTokenPrivilege 4320 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4320 msiexec.exe Token: SeLockMemoryPrivilege 4320 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4320 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3764 wrote to memory of 512 3764 msiexec.exe 86 PID 3764 wrote to memory of 512 3764 msiexec.exe 86 PID 3764 wrote to memory of 512 3764 msiexec.exe 86 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\94b8ab735d503884585fdb5a735b3ea3485b6b19c1899939a5b2c0a80616400a.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4320
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 24AABD7843308A215A0706A41F487633 C2⤵
- Loads dropped DLL
PID:512
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
128KB
MD54c020db20bf16028e735dd0166c6c1af
SHA1ecec202c476d34659ca1bdd37d3f955e14534f07
SHA2567969371f2215ea2ae53bb46c1011c53162700b08e9e2f7ebd305d95f0fa0521f
SHA5124298e8bdc6b1153c17dcd0293ce229fe1196d776f8a55d794d68bdd0c27e9170e105f1140fe8c0f3fa874feceb4c30472463f34b0bb09c08b3e56eb671fab6ab
-
Filesize
339KB
MD56d5c3b6bfa0f91678291ca830c534cab
SHA1e40948d6c2c4f8385b8758a29fbe63e7e8e4369c
SHA2562b387c45d683e75092b281cb7d48ebcbdd5fc51ca92f5c01e5914b2cc35d4e5f
SHA512bb880f1efaee9db82afdf720baa7445bbb1e57a48a9b14f46845b1204b2572b3dc4aa94f2ecce2112126844d2e935c383244bdae484ea742e317fff8794ba9ba