Analysis
-
max time kernel
136s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.MSIL_Injector.ABS.gen.Eldorado.24339.22234.msi
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.MSIL_Injector.ABS.gen.Eldorado.24339.22234.msi
Resource
win10v2004-20240226-en
General
-
Target
SecuriteInfo.com.W32.MSIL_Injector.ABS.gen.Eldorado.24339.22234.msi
-
Size
1.8MB
-
MD5
304f02f1b09b3c50763800b259546566
-
SHA1
4733135c1038a34387963896b999f61b387598c4
-
SHA256
ec37381bb188d021159e9a66674e0256df03f358e1c7d914b002ab5259861634
-
SHA512
03374a284581e4d36d2982781efaaf85aac87f936f7a0c61473f3e36186614da53ad51eac8b6d78a0275948dc53cb68c895ea9f3d1f40d7bf8345b7a979464dc
-
SSDEEP
24576:vifuulS3dKBXYus26Jj5/Fn3cLNXSmhsv1ssbzOVzBp6S/kBw9Agx4RGHAGih:vimCS3dKBX5sTGb85GVzrKw9LiRmfih
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 8 4464 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe -
Loads dropped DLL 2 IoCs
pid Process 2140 MsiExec.exe 2140 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4464 msiexec.exe Token: SeIncreaseQuotaPrivilege 4464 msiexec.exe Token: SeSecurityPrivilege 3144 msiexec.exe Token: SeCreateTokenPrivilege 4464 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4464 msiexec.exe Token: SeLockMemoryPrivilege 4464 msiexec.exe Token: SeIncreaseQuotaPrivilege 4464 msiexec.exe Token: SeMachineAccountPrivilege 4464 msiexec.exe Token: SeTcbPrivilege 4464 msiexec.exe Token: SeSecurityPrivilege 4464 msiexec.exe Token: SeTakeOwnershipPrivilege 4464 msiexec.exe Token: SeLoadDriverPrivilege 4464 msiexec.exe Token: SeSystemProfilePrivilege 4464 msiexec.exe Token: SeSystemtimePrivilege 4464 msiexec.exe Token: SeProfSingleProcessPrivilege 4464 msiexec.exe Token: SeIncBasePriorityPrivilege 4464 msiexec.exe Token: SeCreatePagefilePrivilege 4464 msiexec.exe Token: SeCreatePermanentPrivilege 4464 msiexec.exe Token: SeBackupPrivilege 4464 msiexec.exe Token: SeRestorePrivilege 4464 msiexec.exe Token: SeShutdownPrivilege 4464 msiexec.exe Token: SeDebugPrivilege 4464 msiexec.exe Token: SeAuditPrivilege 4464 msiexec.exe Token: SeSystemEnvironmentPrivilege 4464 msiexec.exe Token: SeChangeNotifyPrivilege 4464 msiexec.exe Token: SeRemoteShutdownPrivilege 4464 msiexec.exe Token: SeUndockPrivilege 4464 msiexec.exe Token: SeSyncAgentPrivilege 4464 msiexec.exe Token: SeEnableDelegationPrivilege 4464 msiexec.exe Token: SeManageVolumePrivilege 4464 msiexec.exe Token: SeImpersonatePrivilege 4464 msiexec.exe Token: SeCreateGlobalPrivilege 4464 msiexec.exe Token: SeCreateTokenPrivilege 4464 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4464 msiexec.exe Token: SeLockMemoryPrivilege 4464 msiexec.exe Token: SeIncreaseQuotaPrivilege 4464 msiexec.exe Token: SeMachineAccountPrivilege 4464 msiexec.exe Token: SeTcbPrivilege 4464 msiexec.exe Token: SeSecurityPrivilege 4464 msiexec.exe Token: SeTakeOwnershipPrivilege 4464 msiexec.exe Token: SeLoadDriverPrivilege 4464 msiexec.exe Token: SeSystemProfilePrivilege 4464 msiexec.exe Token: SeSystemtimePrivilege 4464 msiexec.exe Token: SeProfSingleProcessPrivilege 4464 msiexec.exe Token: SeIncBasePriorityPrivilege 4464 msiexec.exe Token: SeCreatePagefilePrivilege 4464 msiexec.exe Token: SeCreatePermanentPrivilege 4464 msiexec.exe Token: SeBackupPrivilege 4464 msiexec.exe Token: SeRestorePrivilege 4464 msiexec.exe Token: SeShutdownPrivilege 4464 msiexec.exe Token: SeDebugPrivilege 4464 msiexec.exe Token: SeAuditPrivilege 4464 msiexec.exe Token: SeSystemEnvironmentPrivilege 4464 msiexec.exe Token: SeChangeNotifyPrivilege 4464 msiexec.exe Token: SeRemoteShutdownPrivilege 4464 msiexec.exe Token: SeUndockPrivilege 4464 msiexec.exe Token: SeSyncAgentPrivilege 4464 msiexec.exe Token: SeEnableDelegationPrivilege 4464 msiexec.exe Token: SeManageVolumePrivilege 4464 msiexec.exe Token: SeImpersonatePrivilege 4464 msiexec.exe Token: SeCreateGlobalPrivilege 4464 msiexec.exe Token: SeCreateTokenPrivilege 4464 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4464 msiexec.exe Token: SeLockMemoryPrivilege 4464 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4464 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3144 wrote to memory of 2140 3144 msiexec.exe 96 PID 3144 wrote to memory of 2140 3144 msiexec.exe 96 PID 3144 wrote to memory of 2140 3144 msiexec.exe 96
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.MSIL_Injector.ABS.gen.Eldorado.24339.22234.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4464
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9FF5C1BE92DF617DAC661AA84D9CFCE2 C2⤵
- Loads dropped DLL
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4332 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:1136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
325KB
MD5f048cf239cc583f8433634acf23cae55
SHA17d3a296a05267855cc637c5bf95fe687b7a765a2
SHA2564d6efad25f62f4c34998385819e46569869b09de4d8b3f1e22dc9e8f032ed3bb
SHA512a021d559150338ef823b8749d95ac262ec13d9c9ed80d2d0d67e0d7690ae61713219a5edf88d83832ad673f0d7a1d306b49af4f07020c98bac2cfb006bcf0c53