Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
.NET Framework 4.6.2/NDP462-KB3151800-x86-x64-AllOS-ENU.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
.NET Framework 4.6.2/NDP462-KB3151800-x86-x64-AllOS-ENU.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral3
Sample
AcerDisplayWidget.msi
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
AcerDisplayWidget.msi
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
AcerDisplayWidget_Setup_v402.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
AcerDisplayWidget_Setup_v402.exe
Resource
win10v2004-20240220-en
General
-
Target
AcerDisplayWidget.msi
-
Size
29.5MB
-
MD5
d203f457661a5302f7314ba5803191bc
-
SHA1
1813fa747fdc7fc798bb7bd45a2088ff5d310ec1
-
SHA256
e708fe4b7a8d6a07bf5e670cfd64e0e6949b4a8752e013ca9693313b1c50e15f
-
SHA512
ac64ec7b80f011fadb65418d491639e7c3c147857812993c336f893ad46e70fb8dedeea87d2d0605aa50295f58aae460d2dcb0f19e9283a7165bb47d1dba28a3
-
SSDEEP
786432:OqousVZRHad2yswfP6e1oU7iE+Zc7aB5J6j0GxR:yZHw62oOIZc+6Fx
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 2512 msiexec.exe 5 2512 msiexec.exe 7 2512 msiexec.exe 11 1968 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe -
Loads dropped DLL 5 IoCs
pid Process 1968 MsiExec.exe 1968 MsiExec.exe 1968 MsiExec.exe 1968 MsiExec.exe 1968 MsiExec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2512 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2512 msiexec.exe Token: SeIncreaseQuotaPrivilege 2512 msiexec.exe Token: SeRestorePrivilege 2912 msiexec.exe Token: SeTakeOwnershipPrivilege 2912 msiexec.exe Token: SeSecurityPrivilege 2912 msiexec.exe Token: SeCreateTokenPrivilege 2512 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2512 msiexec.exe Token: SeLockMemoryPrivilege 2512 msiexec.exe Token: SeIncreaseQuotaPrivilege 2512 msiexec.exe Token: SeMachineAccountPrivilege 2512 msiexec.exe Token: SeTcbPrivilege 2512 msiexec.exe Token: SeSecurityPrivilege 2512 msiexec.exe Token: SeTakeOwnershipPrivilege 2512 msiexec.exe Token: SeLoadDriverPrivilege 2512 msiexec.exe Token: SeSystemProfilePrivilege 2512 msiexec.exe Token: SeSystemtimePrivilege 2512 msiexec.exe Token: SeProfSingleProcessPrivilege 2512 msiexec.exe Token: SeIncBasePriorityPrivilege 2512 msiexec.exe Token: SeCreatePagefilePrivilege 2512 msiexec.exe Token: SeCreatePermanentPrivilege 2512 msiexec.exe Token: SeBackupPrivilege 2512 msiexec.exe Token: SeRestorePrivilege 2512 msiexec.exe Token: SeShutdownPrivilege 2512 msiexec.exe Token: SeDebugPrivilege 2512 msiexec.exe Token: SeAuditPrivilege 2512 msiexec.exe Token: SeSystemEnvironmentPrivilege 2512 msiexec.exe Token: SeChangeNotifyPrivilege 2512 msiexec.exe Token: SeRemoteShutdownPrivilege 2512 msiexec.exe Token: SeUndockPrivilege 2512 msiexec.exe Token: SeSyncAgentPrivilege 2512 msiexec.exe Token: SeEnableDelegationPrivilege 2512 msiexec.exe Token: SeManageVolumePrivilege 2512 msiexec.exe Token: SeImpersonatePrivilege 2512 msiexec.exe Token: SeCreateGlobalPrivilege 2512 msiexec.exe Token: SeCreateTokenPrivilege 2512 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2512 msiexec.exe Token: SeLockMemoryPrivilege 2512 msiexec.exe Token: SeIncreaseQuotaPrivilege 2512 msiexec.exe Token: SeMachineAccountPrivilege 2512 msiexec.exe Token: SeTcbPrivilege 2512 msiexec.exe Token: SeSecurityPrivilege 2512 msiexec.exe Token: SeTakeOwnershipPrivilege 2512 msiexec.exe Token: SeLoadDriverPrivilege 2512 msiexec.exe Token: SeSystemProfilePrivilege 2512 msiexec.exe Token: SeSystemtimePrivilege 2512 msiexec.exe Token: SeProfSingleProcessPrivilege 2512 msiexec.exe Token: SeIncBasePriorityPrivilege 2512 msiexec.exe Token: SeCreatePagefilePrivilege 2512 msiexec.exe Token: SeCreatePermanentPrivilege 2512 msiexec.exe Token: SeBackupPrivilege 2512 msiexec.exe Token: SeRestorePrivilege 2512 msiexec.exe Token: SeShutdownPrivilege 2512 msiexec.exe Token: SeDebugPrivilege 2512 msiexec.exe Token: SeAuditPrivilege 2512 msiexec.exe Token: SeSystemEnvironmentPrivilege 2512 msiexec.exe Token: SeChangeNotifyPrivilege 2512 msiexec.exe Token: SeRemoteShutdownPrivilege 2512 msiexec.exe Token: SeUndockPrivilege 2512 msiexec.exe Token: SeSyncAgentPrivilege 2512 msiexec.exe Token: SeEnableDelegationPrivilege 2512 msiexec.exe Token: SeManageVolumePrivilege 2512 msiexec.exe Token: SeImpersonatePrivilege 2512 msiexec.exe Token: SeCreateGlobalPrivilege 2512 msiexec.exe Token: SeCreateTokenPrivilege 2512 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2912 wrote to memory of 1968 2912 msiexec.exe 29 PID 2912 wrote to memory of 1968 2912 msiexec.exe 29 PID 2912 wrote to memory of 1968 2912 msiexec.exe 29 PID 2912 wrote to memory of 1968 2912 msiexec.exe 29 PID 2912 wrote to memory of 1968 2912 msiexec.exe 29 PID 2912 wrote to memory of 1968 2912 msiexec.exe 29 PID 2912 wrote to memory of 1968 2912 msiexec.exe 29
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\AcerDisplayWidget.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2512
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C152DB270E038151D7200BB1741CB296 C2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
216KB
MD5d261a064a6612a2b5f8774e55d49e8bb
SHA1a4ac194b86202bc8ad412a642f42ce1aeca2c433
SHA25683a68300f22fa9f45fea46e16aada7887c3b8b09cef3faf098c30b428e6a4629
SHA5122857e9422de455ec3351bc61a62f2d1e49a29112efdadf30f84d7920c2867b2bb20bdb43e8f4346b5004e8ee8612cedd098ebb4b66dc6ba8a2fff718e0154238
-
Filesize
377KB
MD5197b1bdd8ca8123d3d4a9445e2a8859c
SHA1f1ed85a054d63c4bf9006bd75062549179b9d776
SHA256b10fbfbcf69cbf5f728e508dbfdde40cfe045e8b7a8e58e4e1b0f05150ede90a
SHA512e7d711f8c1f87ab59bfcd50944082ad49e87c3457ff93188f99c171b5d788941af22480e65957936263bd9fbd3179dbeb84532b3dd5b2086bcdb8dee21af4cc8
-
Filesize
375KB
MD51d5bf0c2a610dd324f0e1990cdf3b65f
SHA1c94c6f943b0fad5a05351a2fd62e93e75b17faad
SHA2563b16c4678f727d35db5e033883cd943e8bb0b84ee15afeb18cf796ae2372e1e9
SHA51273ae2bcc83ad67f41f416f295d516d45c7786b3f09276ff9c1c611b151d1e8f1ee1bff80ff2c966a2746e1ced2c888dd70b9fe10ae42563ace09c42076a3bc4f
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06