Resubmissions
03/05/2024, 19:40
240503-ydhb3adh4v 603/05/2024, 19:38
240503-ychw7sdh21 603/05/2024, 19:28
240503-x639kagf87 6Analysis
-
max time kernel
1175s -
max time network
1202s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
Zulu2021_x64_ru.msi
Resource
win10v2004-20240226-en
General
-
Target
Zulu2021_x64_ru.msi
-
Size
206.4MB
-
MD5
e260569b5a0e6f095e05ce8dac46db99
-
SHA1
2649b0409a76e8552b995597bf2a166812b4be23
-
SHA256
aeb36aa6d3eb358179aede6e745ed1079e5e358021ba7a2067780f94525fadb2
-
SHA512
d2629ee23c5351f36feafb466ac870797140722d05d79f9891fc46e491dff8d650130e7772dd998e85c0092bc5f7bc34674c5e5e6135e31227e2b214bae0196f
-
SSDEEP
6291456:sze6qDEqmeopAntDHavQPkhNjK02C5uQN6E:szehER7poD6IMhNO78uQN
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2468 msiexec.exe 6 2468 msiexec.exe 11 2468 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Loads dropped DLL 1 IoCs
pid Process 4572 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2468 msiexec.exe Token: SeIncreaseQuotaPrivilege 2468 msiexec.exe Token: SeSecurityPrivilege 4004 msiexec.exe Token: SeCreateTokenPrivilege 2468 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2468 msiexec.exe Token: SeLockMemoryPrivilege 2468 msiexec.exe Token: SeIncreaseQuotaPrivilege 2468 msiexec.exe Token: SeMachineAccountPrivilege 2468 msiexec.exe Token: SeTcbPrivilege 2468 msiexec.exe Token: SeSecurityPrivilege 2468 msiexec.exe Token: SeTakeOwnershipPrivilege 2468 msiexec.exe Token: SeLoadDriverPrivilege 2468 msiexec.exe Token: SeSystemProfilePrivilege 2468 msiexec.exe Token: SeSystemtimePrivilege 2468 msiexec.exe Token: SeProfSingleProcessPrivilege 2468 msiexec.exe Token: SeIncBasePriorityPrivilege 2468 msiexec.exe Token: SeCreatePagefilePrivilege 2468 msiexec.exe Token: SeCreatePermanentPrivilege 2468 msiexec.exe Token: SeBackupPrivilege 2468 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeShutdownPrivilege 2468 msiexec.exe Token: SeDebugPrivilege 2468 msiexec.exe Token: SeAuditPrivilege 2468 msiexec.exe Token: SeSystemEnvironmentPrivilege 2468 msiexec.exe Token: SeChangeNotifyPrivilege 2468 msiexec.exe Token: SeRemoteShutdownPrivilege 2468 msiexec.exe Token: SeUndockPrivilege 2468 msiexec.exe Token: SeSyncAgentPrivilege 2468 msiexec.exe Token: SeEnableDelegationPrivilege 2468 msiexec.exe Token: SeManageVolumePrivilege 2468 msiexec.exe Token: SeImpersonatePrivilege 2468 msiexec.exe Token: SeCreateGlobalPrivilege 2468 msiexec.exe Token: SeCreateTokenPrivilege 2468 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2468 msiexec.exe Token: SeLockMemoryPrivilege 2468 msiexec.exe Token: SeIncreaseQuotaPrivilege 2468 msiexec.exe Token: SeMachineAccountPrivilege 2468 msiexec.exe Token: SeTcbPrivilege 2468 msiexec.exe Token: SeSecurityPrivilege 2468 msiexec.exe Token: SeTakeOwnershipPrivilege 2468 msiexec.exe Token: SeLoadDriverPrivilege 2468 msiexec.exe Token: SeSystemProfilePrivilege 2468 msiexec.exe Token: SeSystemtimePrivilege 2468 msiexec.exe Token: SeProfSingleProcessPrivilege 2468 msiexec.exe Token: SeIncBasePriorityPrivilege 2468 msiexec.exe Token: SeCreatePagefilePrivilege 2468 msiexec.exe Token: SeCreatePermanentPrivilege 2468 msiexec.exe Token: SeBackupPrivilege 2468 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeShutdownPrivilege 2468 msiexec.exe Token: SeDebugPrivilege 2468 msiexec.exe Token: SeAuditPrivilege 2468 msiexec.exe Token: SeSystemEnvironmentPrivilege 2468 msiexec.exe Token: SeChangeNotifyPrivilege 2468 msiexec.exe Token: SeRemoteShutdownPrivilege 2468 msiexec.exe Token: SeUndockPrivilege 2468 msiexec.exe Token: SeSyncAgentPrivilege 2468 msiexec.exe Token: SeEnableDelegationPrivilege 2468 msiexec.exe Token: SeManageVolumePrivilege 2468 msiexec.exe Token: SeImpersonatePrivilege 2468 msiexec.exe Token: SeCreateGlobalPrivilege 2468 msiexec.exe Token: SeCreateTokenPrivilege 2468 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2468 msiexec.exe Token: SeLockMemoryPrivilege 2468 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4572 4004 msiexec.exe 95 PID 4004 wrote to memory of 4572 4004 msiexec.exe 95 PID 4004 wrote to memory of 4572 4004 msiexec.exe 95
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Zulu2021_x64_ru.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2468
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C2811C9B5533AD2A3626933FEC4C3807 C2⤵
- Loads dropped DLL
PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:1768
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4284 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:4056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0