Overview
overview
8Static
static
8OFFICE2016...ui.msi
windows7-x64
6OFFICE2016...ui.msi
windows10-2004-x64
6OFFICE2016...es.dll
windows7-x64
1OFFICE2016...es.dll
windows10-2004-x64
1OFFICE2016...es.dll
windows7-x64
1OFFICE2016...es.dll
windows10-2004-x64
1OFFICE2016...es.dll
windows7-x64
1OFFICE2016...es.dll
windows10-2004-x64
1OFFICE2016...es.dll
windows7-x64
1OFFICE2016...es.dll
windows10-2004-x64
1OFFICE2016...es.dll
windows7-x64
1OFFICE2016...es.dll
windows10-2004-x64
1OFFICE2016...ct.dll
windows7-x64
1OFFICE2016...ct.dll
windows10-2004-x64
3OFFICE2016...ca.dll
windows7-x64
1OFFICE2016...ca.dll
windows10-2004-x64
1OFFICE2016...es.dll
windows7-x64
1OFFICE2016...es.dll
windows10-2004-x64
1OFFICE2016...es.dll
windows7-x64
1OFFICE2016...es.dll
windows10-2004-x64
1OFFICE2016...es.dll
windows7-x64
1OFFICE2016...es.dll
windows10-2004-x64
1OFFICE2016...es.dll
windows7-x64
1OFFICE2016...es.dll
windows10-2004-x64
1OFFICE2016...ui.msi
windows7-x64
6OFFICE2016...ui.msi
windows10-2004-x64
6OFFICE2016...ui.msi
windows7-x64
6OFFICE2016...ui.msi
windows10-2004-x64
OFFICE2016...ui.msi
windows7-x64
6OFFICE2016...ui.msi
windows10-2004-x64
6OFFICE2016/leame.htm
windows7-x64
1OFFICE2016/leame.htm
windows10-2004-x64
1Analysis
-
max time kernel
113s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-04-2024 23:00
Behavioral task
behavioral1
Sample
OFFICE2016/access.es-es/accessmui.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
OFFICE2016/access.es-es/accessmui.msi
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
OFFICE2016/admin/en-us/octres.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
OFFICE2016/admin/en-us/octres.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
OFFICE2016/admin/es-es/octres.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
OFFICE2016/admin/es-es/octres.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
OFFICE2016/admin/fr-fr/octres.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
OFFICE2016/admin/fr-fr/octres.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
OFFICE2016/admin/it-it/octres.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
OFFICE2016/admin/it-it/octres.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
OFFICE2016/admin/ja-jp/octres.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
OFFICE2016/admin/ja-jp/octres.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
OFFICE2016/admin/oct.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
OFFICE2016/admin/oct.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
OFFICE2016/admin/octca.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
OFFICE2016/admin/octca.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
OFFICE2016/admin/pt-br/octres.dll
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
OFFICE2016/admin/pt-br/octres.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
OFFICE2016/admin/ru-ru/octres.dll
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
OFFICE2016/admin/ru-ru/octres.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
OFFICE2016/admin/zh-cn/octres.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
OFFICE2016/admin/zh-cn/octres.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
OFFICE2016/admin/zh-tw/octres.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
OFFICE2016/admin/zh-tw/octres.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
OFFICE2016/dcf.es-es/dcfmui.msi
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
OFFICE2016/dcf.es-es/dcfmui.msi
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
OFFICE2016/excel.es-es/excelmui.msi
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
OFFICE2016/excel.es-es/excelmui.msi
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
OFFICE2016/groove.es-es/groovemui.msi
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
OFFICE2016/groove.es-es/groovemui.msi
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
OFFICE2016/leame.htm
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
OFFICE2016/leame.htm
Resource
win10v2004-20240226-en
General
-
Target
OFFICE2016/access.es-es/accessmui.msi
-
Size
2.3MB
-
MD5
98ef1950d6bb20c2f2295f748d955d33
-
SHA1
77354d86de152b784e0874378e6a0c1926c5b0b8
-
SHA256
cda2daa7883bf165df5b28ab39a88775f115f5eb3186d838a59284d7dca84e1e
-
SHA512
6aa11d19ae305f331894828db20b131ef0ad0ed2183f6444dc9a97451faef70fd5730e3d7eb14ef407dc07709e2b69e9b9fa174111c41d506275e219a4292c3c
-
SSDEEP
49152:JhIu+svi4ut1yFXyzEKqle+93GwtF2Vb1eksj:JhIuFvPut1WKM3Gw7Yb
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe -
Drops file in Windows directory 7 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f77d4bd.msi msiexec.exe File opened for modification C:\Windows\Installer\f77d4bd.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID654.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDA2C.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe -
Loads dropped DLL 2 IoCs
Processes:
MsiExec.exepid process 1248 MsiExec.exe 1248 MsiExec.exe -
Modifies data under HKEY_USERS 43 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msiexec.exepid process 2596 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 55 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exedescription pid process Token: SeShutdownPrivilege 2596 msiexec.exe Token: SeIncreaseQuotaPrivilege 2596 msiexec.exe Token: SeRestorePrivilege 2412 msiexec.exe Token: SeTakeOwnershipPrivilege 2412 msiexec.exe Token: SeSecurityPrivilege 2412 msiexec.exe Token: SeCreateTokenPrivilege 2596 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2596 msiexec.exe Token: SeLockMemoryPrivilege 2596 msiexec.exe Token: SeIncreaseQuotaPrivilege 2596 msiexec.exe Token: SeMachineAccountPrivilege 2596 msiexec.exe Token: SeTcbPrivilege 2596 msiexec.exe Token: SeSecurityPrivilege 2596 msiexec.exe Token: SeTakeOwnershipPrivilege 2596 msiexec.exe Token: SeLoadDriverPrivilege 2596 msiexec.exe Token: SeSystemProfilePrivilege 2596 msiexec.exe Token: SeSystemtimePrivilege 2596 msiexec.exe Token: SeProfSingleProcessPrivilege 2596 msiexec.exe Token: SeIncBasePriorityPrivilege 2596 msiexec.exe Token: SeCreatePagefilePrivilege 2596 msiexec.exe Token: SeCreatePermanentPrivilege 2596 msiexec.exe Token: SeBackupPrivilege 2596 msiexec.exe Token: SeRestorePrivilege 2596 msiexec.exe Token: SeShutdownPrivilege 2596 msiexec.exe Token: SeDebugPrivilege 2596 msiexec.exe Token: SeAuditPrivilege 2596 msiexec.exe Token: SeSystemEnvironmentPrivilege 2596 msiexec.exe Token: SeChangeNotifyPrivilege 2596 msiexec.exe Token: SeRemoteShutdownPrivilege 2596 msiexec.exe Token: SeUndockPrivilege 2596 msiexec.exe Token: SeSyncAgentPrivilege 2596 msiexec.exe Token: SeEnableDelegationPrivilege 2596 msiexec.exe Token: SeManageVolumePrivilege 2596 msiexec.exe Token: SeImpersonatePrivilege 2596 msiexec.exe Token: SeCreateGlobalPrivilege 2596 msiexec.exe Token: SeBackupPrivilege 2384 vssvc.exe Token: SeRestorePrivilege 2384 vssvc.exe Token: SeAuditPrivilege 2384 vssvc.exe Token: SeBackupPrivilege 2412 msiexec.exe Token: SeRestorePrivilege 2412 msiexec.exe Token: SeRestorePrivilege 2632 DrvInst.exe Token: SeRestorePrivilege 2632 DrvInst.exe Token: SeRestorePrivilege 2632 DrvInst.exe Token: SeRestorePrivilege 2632 DrvInst.exe Token: SeRestorePrivilege 2632 DrvInst.exe Token: SeRestorePrivilege 2632 DrvInst.exe Token: SeRestorePrivilege 2632 DrvInst.exe Token: SeLoadDriverPrivilege 2632 DrvInst.exe Token: SeLoadDriverPrivilege 2632 DrvInst.exe Token: SeLoadDriverPrivilege 2632 DrvInst.exe Token: SeRestorePrivilege 2412 msiexec.exe Token: SeTakeOwnershipPrivilege 2412 msiexec.exe Token: SeRestorePrivilege 2412 msiexec.exe Token: SeTakeOwnershipPrivilege 2412 msiexec.exe Token: SeRestorePrivilege 2412 msiexec.exe Token: SeTakeOwnershipPrivilege 2412 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 2596 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
msiexec.exedescription pid process target process PID 2412 wrote to memory of 1248 2412 msiexec.exe MsiExec.exe PID 2412 wrote to memory of 1248 2412 msiexec.exe MsiExec.exe PID 2412 wrote to memory of 1248 2412 msiexec.exe MsiExec.exe PID 2412 wrote to memory of 1248 2412 msiexec.exe MsiExec.exe PID 2412 wrote to memory of 1248 2412 msiexec.exe MsiExec.exe PID 2412 wrote to memory of 1248 2412 msiexec.exe MsiExec.exe PID 2412 wrote to memory of 1248 2412 msiexec.exe MsiExec.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\OFFICE2016\access.es-es\accessmui.msi1⤵
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2596
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F347DC5EAAF1854D814918D0994274B22⤵
- Loads dropped DLL
PID:1248
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004C4" "0000000000000060"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5774854bd7eb1c548aa517e7f9175941c
SHA1d6a79c4a1470a4703325ade8f4004a9c858a26bd
SHA256238bf80f9469f0c9406e2b58828348f70cf5d2ce40f0517ca863e8660148600c
SHA512278f53d21debf7ffd1169ea75615037a10137e801a8da9b631b83f8c5a9eef6e77c245adc3606054d96543a9a7f7a7445083109b739443e31bab0f0a7c1a04af
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
95KB
MD5acfd123d0e36411b9c1f556853dd9ea5
SHA1812025408e21687dcd6e8eeb1667025a7b7abcbf
SHA256d89dd83af50bfc6e325e2b4e7eecd982ec3ddee9ccb9cfef86d8a5593907c317
SHA512e01da6d2867ca5a029d60bac781cef6639485255ce515bc8e094a43fa107b0d8c120b7bb3de75457407479de71585dfd9475b1b1f39d2d82d303586ccdb9024d