Analysis

  • max time kernel
    134s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 08:50

General

  • Target

    RemoteDesktop_1.2.5405.0_x64.msi

  • Size

    29.6MB

  • MD5

    7552e7db7251fe9d77e81c27a9530911

  • SHA1

    e642571f7bbaffa4a52f47f21a3a647b272b78b0

  • SHA256

    4112c41c16346cbc1d12ce848456d365853d66afa75f4f4011aa5da200a03a86

  • SHA512

    f3a58fc75e284496502b26523080d599a365bf0ee0e9f8b1e183133f52baffbb54398e55aa75ec16ba791c36c6ceb6c99ade1217edabf151ceb88a1a38c31fda

  • SSDEEP

    786432:nExe/nmv9R/WRwm1S+tjhlRNlnBQu4qfwydn+qjoPDFEejA2:n5/nmv/+R71DJR6RALxJ0LFE

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Loads dropped DLL 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\RemoteDesktop_1.2.5405.0_x64.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4980
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 7053DCEC9AF3CEEF769C159839580669 C
      2⤵
      • Loads dropped DLL
      PID:3096
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1444
  • C:\Windows\system32\notepad.exe
    "C:\Windows\system32\notepad.exe"
    1⤵
      PID:4408
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff92b18ab58,0x7ff92b18ab68,0x7ff92b18ab78
        2⤵
          PID:3500
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=2000,i,7314359013007331184,10650104212615344159,131072 /prefetch:2
          2⤵
            PID:2272
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=2000,i,7314359013007331184,10650104212615344159,131072 /prefetch:8
            2⤵
              PID:3260
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2300 --field-trial-handle=2000,i,7314359013007331184,10650104212615344159,131072 /prefetch:8
              2⤵
                PID:3908
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=2000,i,7314359013007331184,10650104212615344159,131072 /prefetch:1
                2⤵
                  PID:1452
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=2000,i,7314359013007331184,10650104212615344159,131072 /prefetch:1
                  2⤵
                    PID:4848
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3648 --field-trial-handle=2000,i,7314359013007331184,10650104212615344159,131072 /prefetch:1
                    2⤵
                      PID:1120
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4628 --field-trial-handle=2000,i,7314359013007331184,10650104212615344159,131072 /prefetch:8
                      2⤵
                        PID:4644
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4692 --field-trial-handle=2000,i,7314359013007331184,10650104212615344159,131072 /prefetch:8
                        2⤵
                          PID:1456
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=2000,i,7314359013007331184,10650104212615344159,131072 /prefetch:8
                          2⤵
                            PID:4396
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=2000,i,7314359013007331184,10650104212615344159,131072 /prefetch:8
                            2⤵
                              PID:4000
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4736 --field-trial-handle=2000,i,7314359013007331184,10650104212615344159,131072 /prefetch:8
                              2⤵
                                PID:676
                            • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                              1⤵
                                PID:4000

                              Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                      Filesize

                                      264KB

                                      MD5

                                      f50f89a0a91564d0b8a211f8921aa7de

                                      SHA1

                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                      SHA256

                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                      SHA512

                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      1KB

                                      MD5

                                      b22612ecd945477fa3a06d9e70af0032

                                      SHA1

                                      16fede74a3129e633350e64f01ec56ed55f01835

                                      SHA256

                                      f8e7ecde228da0637e59c9a4c615f88967720504fe30116e66ba8143ae5fd6df

                                      SHA512

                                      43957ebfdd6b49ad006310f45ac8783d84b5cd413341bc2e838a3ad6e4c9e1876630005ee69cfcc595872a0d912138a12bea6dd29e032ec010fe7f72d0483269

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                      Filesize

                                      2B

                                      MD5

                                      d751713988987e9331980363e24189ce

                                      SHA1

                                      97d170e1550eee4afc0af065b78cda302a97674c

                                      SHA256

                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                      SHA512

                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      356B

                                      MD5

                                      170f5368a93e2ce489dbf996c62c355a

                                      SHA1

                                      6385b311498b350596ea5269cd4dcba591e9d731

                                      SHA256

                                      43c9bf80c82f7785834acc17a15b56342113a1cbe34485c98060238c2f625f8d

                                      SHA512

                                      45e407a4d4e46083870e9797d0b2b0b29790bcf972ea0b9a80ecc565b2032263ee0cf6c0213860f54d1ef0b0470d0768eba4e21832e4951dedc4aaeb039a0345

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      7KB

                                      MD5

                                      3ae2126806d67227309099e60f9f5afa

                                      SHA1

                                      d403c7d852873322b93ad9fcc56e21becac0c409

                                      SHA256

                                      6c5b11491486797e460fa19189e2fb73fb1acea797160d72f5d2a64572c0332a

                                      SHA512

                                      0a4686d7752bf3f3aab77d59ab09e31c5f2914666fc7ce82c44bdf8d6b86cced5a4339c6658389cc08017a0b9d2fc4d40445a76333e9a76572477a195e68fb3e

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                      Filesize

                                      16KB

                                      MD5

                                      94183c3b468d124d6b5aa0cff4214dcc

                                      SHA1

                                      5c8c3659c96ab28c5c0557190cfd38ae09758fda

                                      SHA256

                                      9a3511193814c19348d5990ecae7d4aa0f3dfbd4476ce1964e6b480e6808b51e

                                      SHA512

                                      171a14af41fa29ae9b1a598fb9063310cc6e98e7c71ed03eb0d817a6c5a3e7a5276c63af9f53db4d2bf2ee4518c37fb90acdd735938837b5426be6c6286f583f

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      260KB

                                      MD5

                                      166fa8a150401e639d2fa6eed753608e

                                      SHA1

                                      be71a2d1759bfbe1d1cd1d5833476b5bc7fb55ef

                                      SHA256

                                      46669b15474d4465db3df63af6d3fa9ff0269ae4a78fb27dd563b601610d94bf

                                      SHA512

                                      f9cba2d830aaa928855005943b0fb3f038877381956f961057d16c0658049b090ad0557fb17e9df15c58c5400b21662be90738f70fe93bfe4603c16dbe7562eb

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      131KB

                                      MD5

                                      819a211ecad4d070c95a8596d19bd2bd

                                      SHA1

                                      4b6109f125c17edc34fc1c0ce5056a8029218c5f

                                      SHA256

                                      6efb0e8a5f553fb76a01c02287cabae1e73a7c68e57356097a16d8e890948edf

                                      SHA512

                                      68d8aaa79b5c33ec9fc3fba929dc83a91c1f416fbf5e5de97d961c1a549e3347b02c77ed65894a1454366ddb69d2c062293da6e758836247ca8178278000f8cf

                                    • C:\Users\Admin\AppData\Local\Temp\MSI28A6.tmp

                                      Filesize

                                      188KB

                                      MD5

                                      c8c743c2bcf5265878340999d55bb393

                                      SHA1

                                      77aeebaf5ec2398d11f1f17cd7f26839925a469f

                                      SHA256

                                      59038ef5f76c0e59bd281ce309756047816a9ceefac0492ead32fffb985449b3

                                      SHA512

                                      ae096615bdad68873e1120c635a1afb84d1e54055d82fef7234c89320c825818ee68a58f78901294354ffea714884c354b930b48b6f8c65fb585e1dc5d2703e6

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cjmxkpn1.wqc.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • memory/1444-23-0x00000199AC2A0000-0x00000199AC316000-memory.dmp

                                      Filesize

                                      472KB

                                    • memory/1444-22-0x00000199AC250000-0x00000199AC294000-memory.dmp

                                      Filesize

                                      272KB

                                    • memory/1444-12-0x0000019992DF0000-0x0000019992E12000-memory.dmp

                                      Filesize

                                      136KB