Analysis

  • max time kernel
    136s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:20

General

  • Target

    560ed7c0690709054230841c407078e23d4d9fda6010532c67c9e770ac738a0e.msi

  • Size

    3.4MB

  • MD5

    7203ef46aaf6025241c97992a7c29060

  • SHA1

    0fe541ba136b560b88af8acd0b01b2b797ecaf6b

  • SHA256

    560ed7c0690709054230841c407078e23d4d9fda6010532c67c9e770ac738a0e

  • SHA512

    62b736cd397748c2c94f2be5b4d301a1002331c364c03226ade301100e66636d8b2a9d342537804bb9852aa8de9bab0c232e64ca26d034009af4f5a8c0f942fa

  • SSDEEP

    24576:OwwSmUoTZoSCYyPF4Zj4BIQQWVPr3gFp+lg5G0TmFfOvEIqLdrf1NKcRNHYyT31E:Ow+U/NP73W+lKGdFa8LJ1NKwYyj1E

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Loads dropped DLL 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\560ed7c0690709054230841c407078e23d4d9fda6010532c67c9e770ac738a0e.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3432
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 9564D4DEED5D15A208A91BD4C662200B C
      2⤵
      • Loads dropped DLL
      PID:4120

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI7C92.tmp
    Filesize

    108KB

    MD5

    5fce93d0616d1b8fd39b1370ec531352

    SHA1

    ad56511714690ddcd657ea090c06210c1a5ddd4b

    SHA256

    6ae9276ffe699f58cde70664bc3773f21f3e97e554593d0430f4e28dd9a29a3d

    SHA512

    a04e717eb88f29d7fb26f124b378397533b9d8d0934c6ec0690b71bb17d095bb395a312366ee40f8b4c25f63e2765ce761d0ac00d4f872725c9435c23d20a4ef

  • memory/4120-9-0x00000000030B0000-0x00000000030CD000-memory.dmp
    Filesize

    116KB