Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-04-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
93a98b919aec23411ae62dba8d0d22f939da45dec19db2b4e7293124d8f1507f.msi
Resource
win7-20240221-en
General
-
Target
93a98b919aec23411ae62dba8d0d22f939da45dec19db2b4e7293124d8f1507f.msi
-
Size
1.9MB
-
MD5
82b8bd90e500fb0bf878d6f430c5abec
-
SHA1
f004c09428f2f18a145212a9e55eef3615858f9c
-
SHA256
93a98b919aec23411ae62dba8d0d22f939da45dec19db2b4e7293124d8f1507f
-
SHA512
82b2e997bf5bc0d08ab8dd921aef3e8d620a61c26f86b6f481845ad694d7b97f65dfa42e1c18b83f0f827cad9df69a409b75d96793e5bd7124c26bc7cb07f881
-
SSDEEP
49152:Ksjitd+vszAlozTy4g5r8+5eNBABxGNvXreD68f:rihTyfcXreO8f
Malware Config
Extracted
qakbot
tchk06
1702463600
45.138.74.191:443
65.108.218.24:443
-
camp_date
2023-12-13 10:33:20 +0000 UTC
Signatures
-
Detect Qakbot Payload 12 IoCs
Processes:
resource yara_rule behavioral1/memory/1488-321-0x0000000000130000-0x000000000015F000-memory.dmp family_qakbot_v5 behavioral1/memory/1488-322-0x0000000000100000-0x000000000012D000-memory.dmp family_qakbot_v5 behavioral1/memory/1488-327-0x0000000180000000-0x000000018002E000-memory.dmp family_qakbot_v5 behavioral1/memory/1488-326-0x0000000180000000-0x000000018002E000-memory.dmp family_qakbot_v5 behavioral1/memory/1940-329-0x0000000000060000-0x000000000008E000-memory.dmp family_qakbot_v5 behavioral1/memory/1940-336-0x0000000000060000-0x000000000008E000-memory.dmp family_qakbot_v5 behavioral1/memory/1488-345-0x0000000180000000-0x000000018002E000-memory.dmp family_qakbot_v5 behavioral1/memory/1940-353-0x0000000000060000-0x000000000008E000-memory.dmp family_qakbot_v5 behavioral1/memory/1940-355-0x0000000000060000-0x000000000008E000-memory.dmp family_qakbot_v5 behavioral1/memory/1940-354-0x0000000000060000-0x000000000008E000-memory.dmp family_qakbot_v5 behavioral1/memory/1940-356-0x0000000000060000-0x000000000008E000-memory.dmp family_qakbot_v5 behavioral1/memory/1940-357-0x0000000000060000-0x000000000008E000-memory.dmp family_qakbot_v5 -
Blocklisted process makes network request 3 IoCs
Processes:
msiexec.exemsiexec.exeflow pid process 3 2072 msiexec.exe 5 2072 msiexec.exe 7 1316 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Drops file in Windows directory 12 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File created C:\Windows\Installer\f7709a2.msi msiexec.exe File created C:\Windows\Installer\f7709a3.ipi msiexec.exe File opened for modification C:\Windows\Installer\f7709a3.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI171C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI236C.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\f7709a2.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIFF7.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI1545.tmp msiexec.exe -
Executes dropped EXE 1 IoCs
Processes:
MSI236C.tmppid process 2780 MSI236C.tmp -
Loads dropped DLL 11 IoCs
Processes:
MsiExec.exeMsiExec.exerundll32.exepid process 1956 MsiExec.exe 1956 MsiExec.exe 1956 MsiExec.exe 1956 MsiExec.exe 1956 MsiExec.exe 2636 MsiExec.exe 2636 MsiExec.exe 1488 rundll32.exe 1488 rundll32.exe 1488 rundll32.exe 1488 rundll32.exe -
Modifies data under HKEY_USERS 43 IoCs
Processes:
DrvInst.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe -
Modifies registry class 12 IoCs
Processes:
wermgr.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\mninibtyauk\fa8289d8 = a484e643d16769b002aa8ad95509c1de9034b2c825f8c1f6d77aa28e1dc92a7e86c85fd75a1fe1ba0e3d10c09090fedf03982f4f314fab6811062f1d5197328127 wermgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\mninibtyauk\5e9ef7d8 = 27277daf9af408a7e8c7002505043a2809b89cc20ea2ac68f7f179a87cc02e865e047f9854575ee29003421ebc4f293dd85fa033e42be371044467543c62e747f9d283dceaf785c18cfc2afebd69fef25d wermgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\mninibtyauk\9234f746 = 07d127bc11377b7e83663d3ce1b89b406bbbe055dc47aac6a4127a910c1c1210444e7303f50e72ab837c203507ce88ce9c70f25bbf41ae2d4ae79d22ea4268c63678572a172efa02e1081c0a7c4f97a5f7deac386c15463082c77987bde7a7b363 wermgr.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\mninibtyauk wermgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\mninibtyauk\c59be209 = 0723b73e737c17179433f6094309b212bed9cfd33aca9cf27376a0313500f5f00bf605ce1e3b6d58a889bb79da2d2b86f3601f9c3cfcbb6539fc2c511764faf3ccc887d00e62a235c9379341a0ae37e10d6a9224ae82636be205b13e01010a0104 wermgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\mninibtyauk\8d7bec6d = 053125f67139854903ec963a2f0535dc98750c259084bfd8b95ddb98c3028a1e11451dd81208b91a9ef5e781ebaf462d35c52e668ed0a3577de92935d8849c46d3287a6812f15441552e81787991742b27 wermgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\mninibtyauk\41d1ecf3 = e644894a71364c7ff3153288e21fe1a347b041339a2edfcba6c5ca9d3a8d43cd9aa3f1dfa245e01dc9149094cb97c03137501fd044adf046b2900173db63f648282022f23b5c4c948b25d020ed32bdc9eee8884afade83c28995332108c3fc1c79 wermgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\mninibtyauk\55dca346 = 85718a55cb8f0559825e5fcb1b2e4f6af85fd39ce78d5594386842459973c273de407db01b2ada1fc6e7f265ec85420d28226dabc07bf7807f6e85719b9a6ebec0709c300d89f3c67e45819fdace34ebecac75d2c8efca058d0125d55be3db7797 wermgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\mninibtyauk\c59be209 = a770e7fa9597b7626d6e9b15d5f13fe0ca31e6363fbd285804f2ef422b3737f979954f9622fa182345ff04b6d698fd433985c110cb431e370f842c1fdf04cb402bebfe03b15c14b3edeeacc30e7f9ada257e6356a7ae67346883ebbb03888217a4eeacb47d9fe1f990e4b5a9f468457426f0a29db2fe33b36c273d7fc9389f2eed wermgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\mninibtyauk\93b3aac1 = 052342a5890456228219a81017bb059cec51196120e2a9430011d98d3b22912436afb4ab979898d6ae14296cabb1691ca4b739bb46d9bf32f02dcd50233c5e520785b3bc158ed815e774d5063ea7417f8ca2ddfe9024ac67a634baf35fdd54ec015c3395bb915a15c7662372a5aebb0754e9a0a47fbda7c4b10d15d939e07342626f23c58baac150596a82c71fb0a6761872a304c1175c96c0fbce62e46c32461c wermgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\mninibtyauk\5f19aa5f = a5c276d1b3669abb3b4012caac2de2e5dd8108e2809cd9caca406510d70bd15c86db41e111bb5e6aacd24f0db87a8e27102b8308b2472b2d6ee101d42934872c96 wermgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\mninibtyauk\c41cbf8e = 0574d00198b704d61508bfb7ea4f44d280b3e1572701896e6c7ec6d16293e27b00dd6cfface2529f38a218057e4a0ece05689c8eb42af86679cf66d984b16e9d98b03bfc06ece84717b31bbeef17c8a7decf4e406c7d5dd61e3ce392eb3cd866b55878afb9ca69e3239cd814babc437387 wermgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msiexec.exeMSI236C.tmprundll32.exewermgr.exepid process 1316 msiexec.exe 1316 msiexec.exe 2780 MSI236C.tmp 1488 rundll32.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe 1940 wermgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 2072 msiexec.exe Token: SeIncreaseQuotaPrivilege 2072 msiexec.exe Token: SeRestorePrivilege 1316 msiexec.exe Token: SeTakeOwnershipPrivilege 1316 msiexec.exe Token: SeSecurityPrivilege 1316 msiexec.exe Token: SeCreateTokenPrivilege 2072 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2072 msiexec.exe Token: SeLockMemoryPrivilege 2072 msiexec.exe Token: SeIncreaseQuotaPrivilege 2072 msiexec.exe Token: SeMachineAccountPrivilege 2072 msiexec.exe Token: SeTcbPrivilege 2072 msiexec.exe Token: SeSecurityPrivilege 2072 msiexec.exe Token: SeTakeOwnershipPrivilege 2072 msiexec.exe Token: SeLoadDriverPrivilege 2072 msiexec.exe Token: SeSystemProfilePrivilege 2072 msiexec.exe Token: SeSystemtimePrivilege 2072 msiexec.exe Token: SeProfSingleProcessPrivilege 2072 msiexec.exe Token: SeIncBasePriorityPrivilege 2072 msiexec.exe Token: SeCreatePagefilePrivilege 2072 msiexec.exe Token: SeCreatePermanentPrivilege 2072 msiexec.exe Token: SeBackupPrivilege 2072 msiexec.exe Token: SeRestorePrivilege 2072 msiexec.exe Token: SeShutdownPrivilege 2072 msiexec.exe Token: SeDebugPrivilege 2072 msiexec.exe Token: SeAuditPrivilege 2072 msiexec.exe Token: SeSystemEnvironmentPrivilege 2072 msiexec.exe Token: SeChangeNotifyPrivilege 2072 msiexec.exe Token: SeRemoteShutdownPrivilege 2072 msiexec.exe Token: SeUndockPrivilege 2072 msiexec.exe Token: SeSyncAgentPrivilege 2072 msiexec.exe Token: SeEnableDelegationPrivilege 2072 msiexec.exe Token: SeManageVolumePrivilege 2072 msiexec.exe Token: SeImpersonatePrivilege 2072 msiexec.exe Token: SeCreateGlobalPrivilege 2072 msiexec.exe Token: SeCreateTokenPrivilege 2072 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2072 msiexec.exe Token: SeLockMemoryPrivilege 2072 msiexec.exe Token: SeIncreaseQuotaPrivilege 2072 msiexec.exe Token: SeMachineAccountPrivilege 2072 msiexec.exe Token: SeTcbPrivilege 2072 msiexec.exe Token: SeSecurityPrivilege 2072 msiexec.exe Token: SeTakeOwnershipPrivilege 2072 msiexec.exe Token: SeLoadDriverPrivilege 2072 msiexec.exe Token: SeSystemProfilePrivilege 2072 msiexec.exe Token: SeSystemtimePrivilege 2072 msiexec.exe Token: SeProfSingleProcessPrivilege 2072 msiexec.exe Token: SeIncBasePriorityPrivilege 2072 msiexec.exe Token: SeCreatePagefilePrivilege 2072 msiexec.exe Token: SeCreatePermanentPrivilege 2072 msiexec.exe Token: SeBackupPrivilege 2072 msiexec.exe Token: SeRestorePrivilege 2072 msiexec.exe Token: SeShutdownPrivilege 2072 msiexec.exe Token: SeDebugPrivilege 2072 msiexec.exe Token: SeAuditPrivilege 2072 msiexec.exe Token: SeSystemEnvironmentPrivilege 2072 msiexec.exe Token: SeChangeNotifyPrivilege 2072 msiexec.exe Token: SeRemoteShutdownPrivilege 2072 msiexec.exe Token: SeUndockPrivilege 2072 msiexec.exe Token: SeSyncAgentPrivilege 2072 msiexec.exe Token: SeEnableDelegationPrivilege 2072 msiexec.exe Token: SeManageVolumePrivilege 2072 msiexec.exe Token: SeImpersonatePrivilege 2072 msiexec.exe Token: SeCreateGlobalPrivilege 2072 msiexec.exe Token: SeCreateTokenPrivilege 2072 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 2072 msiexec.exe 2072 msiexec.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
msiexec.exerundll32.exedescription pid process target process PID 1316 wrote to memory of 1956 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 1956 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 1956 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 1956 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 1956 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 1956 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 1956 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 2636 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 2636 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 2636 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 2636 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 2636 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 2636 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 2636 1316 msiexec.exe MsiExec.exe PID 1316 wrote to memory of 2780 1316 msiexec.exe MSI236C.tmp PID 1316 wrote to memory of 2780 1316 msiexec.exe MSI236C.tmp PID 1316 wrote to memory of 2780 1316 msiexec.exe MSI236C.tmp PID 1316 wrote to memory of 2780 1316 msiexec.exe MSI236C.tmp PID 1316 wrote to memory of 2780 1316 msiexec.exe MSI236C.tmp PID 1316 wrote to memory of 2780 1316 msiexec.exe MSI236C.tmp PID 1316 wrote to memory of 2780 1316 msiexec.exe MSI236C.tmp PID 1488 wrote to memory of 1940 1488 rundll32.exe wermgr.exe PID 1488 wrote to memory of 1940 1488 rundll32.exe wermgr.exe PID 1488 wrote to memory of 1940 1488 rundll32.exe wermgr.exe PID 1488 wrote to memory of 1940 1488 rundll32.exe wermgr.exe PID 1488 wrote to memory of 1940 1488 rundll32.exe wermgr.exe PID 1488 wrote to memory of 1940 1488 rundll32.exe wermgr.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\93a98b919aec23411ae62dba8d0d22f939da45dec19db2b4e7293124d8f1507f.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DB0381FCE957C0F8CE2639342405DCD9 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B1D00F474DD7465CE2A7AD1B2717B75E2⤵
- Loads dropped DLL
-
C:\Windows\Installer\MSI236C.tmp"C:\Windows\Installer\MSI236C.tmp" /HideWindow rundll32 C:\Users\Admin\AppData\Roaming\KROST.dll,hvsi2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000570" "00000000000005BC"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\KROST.dll,hvsi1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wermgr.exeC:\Windows\System32\wermgr.exe2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\f7709a4.rbsFilesize
1KB
MD57c71fba3c4471cbd26384440d3fd0ef1
SHA1969c03b1f15228eeb03d2ed8c43e5b80c52460a4
SHA256ad00ce91efe03f4667b1ed852ca86acc52fb5c9ba0d7d9d6a2de3217bf390c79
SHA51278337b2c0e74c32d0af3d01b849b8f48c2bfa5aa6dd6efee7caeb9e41804f64f029026d97525eec0ce4f232cf627b864e466fff63b09c7cf197b228176621fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8555326CC9661C9937DC5053B6C38763Filesize
1KB
MD5866912c070f1ecacacc2d5bca55ba129
SHA1b7ab3308d1ea4477ba1480125a6fbda936490cbb
SHA25685666a562ee0be5ce925c1d8890a6f76a87ec16d4d7d5f29ea7419cf20123b69
SHA512f91e855e0346ac8c3379129154e01488bb22cff7f6a6df2a80f1671e43c5df8acae36fdf5ee0eb2320f287a681a326b6f1df36e8e37aa5597c4797dd6b43b7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8555326CC9661C9937DC5053B6C38763Filesize
326B
MD5b2f7b4e4775728a70b600bd0aac9e81f
SHA13747169e20dabd00662e3bbd2f68cb3ba7a49303
SHA2563f3389357fc8fe1a0b3e294b933c752f0bd8dbd8a77c731b940ae999bcadf231
SHA512e38edabadf2042c3000422e07309366daa08486763856be0d96cdf18cc4a328a88b6609431ad0c0fb890897fad727874df32a5a3d295627a9b8999fbc6c105b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f63e0e21cf73a130f73bd99630086a39
SHA1cb8323410ae730b4254bde7cbb57f172dcac7834
SHA2565599fb1c998ec6505381052daa6590cee73a3972d6d16ff5dd2655c4ff3418a6
SHA512e2da7f5f29fa1007365b8e29bd038141b2714896ab1a5f511006ecdac19317cdadcde4d1af49ba4485d1d8f5051bf0ceacba2c7d16f1f1ccf3733eb8b27cf588
-
C:\Users\Admin\AppData\Local\Temp\Cab9677.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\MSI9F19.tmpFilesize
721KB
MD55a1f2196056c0a06b79a77ae981c7761
SHA1a880ae54395658f129e24732800e207ecd0b5603
SHA25652f41817669af7ac55b1516894ee705245c3148f2997fa0e6617e9cc6353e41e
SHA5129afc180ebc10c0ee0d7306f4b7085608a4e69321044d474691587bf7e63f945888781a9fc5e69568d351ac690b0335214bd04bdf5c75fd8a3bd1ec4be5d3475a
-
C:\Users\Admin\AppData\Local\Temp\Tar969A.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
C:\Users\Admin\AppData\Local\Temp\Tar9883.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Users\Admin\AppData\Roaming\KROST.dllFilesize
459KB
MD50a29918110937641bbe4a2d5ee5e4272
SHA17d4a6976c1ece81e01d1f16ac5506266d5210734
SHA256780be7a70ce3567ef268f6c768fc5a3d2510310c603bf481ebffd65e4fe95ff3
SHA512998a6ee2fa6b345aeea72afaa91add8433e986a2678dbb8995ead786c30bdc00704c39c4857935b20669005b292736d50e1c6ad38901aa1f29db7b6a597fae3f
-
C:\Windows\Installer\MSI236C.tmpFilesize
397KB
MD5b41e1b0ae2ec215c568c395b0dbb738a
SHA190d8e50176a1f4436604468279f29a128723c64b
SHA256a97e782c5612c1a9c8a56c56a943f6190fa7a73c346566860b519ef02efd0dca
SHA512828d00ea08aa5c5d28b2e513687ee1ff910670f49f938064682e56da05544ba9d73ba9244f77b5df8acaeeb7b756d62f67e5acbc95bae86b4706f6324c4ccaba
-
memory/1488-320-0x0000000069140000-0x00000000691BE000-memory.dmpFilesize
504KB
-
memory/1488-345-0x0000000180000000-0x000000018002E000-memory.dmpFilesize
184KB
-
memory/1488-321-0x0000000000130000-0x000000000015F000-memory.dmpFilesize
188KB
-
memory/1488-322-0x0000000000100000-0x000000000012D000-memory.dmpFilesize
180KB
-
memory/1488-327-0x0000000180000000-0x000000018002E000-memory.dmpFilesize
184KB
-
memory/1488-326-0x0000000180000000-0x000000018002E000-memory.dmpFilesize
184KB
-
memory/1940-329-0x0000000000060000-0x000000000008E000-memory.dmpFilesize
184KB
-
memory/1940-336-0x0000000000060000-0x000000000008E000-memory.dmpFilesize
184KB
-
memory/1940-328-0x0000000000110000-0x0000000000112000-memory.dmpFilesize
8KB
-
memory/1940-353-0x0000000000060000-0x000000000008E000-memory.dmpFilesize
184KB
-
memory/1940-355-0x0000000000060000-0x000000000008E000-memory.dmpFilesize
184KB
-
memory/1940-354-0x0000000000060000-0x000000000008E000-memory.dmpFilesize
184KB
-
memory/1940-356-0x0000000000060000-0x000000000008E000-memory.dmpFilesize
184KB
-
memory/1940-357-0x0000000000060000-0x000000000008E000-memory.dmpFilesize
184KB
-
memory/2780-314-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB