Overview
overview
10Static
static
3fx_cast_br...64.exe
windows7-x64
10fx_cast_br...64.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Bonjour.msi
windows7-x64
6Bonjour.msi
windows10-2004-x64
6dns_sd_bindings.dll
windows7-x64
1dns_sd_bindings.dll
windows10-2004-x64
1fx_cast_bridge.exe
windows7-x64
1fx_cast_bridge.exe
windows10-2004-x64
1fx_cast_bridge.json
windows7-x64
3fx_cast_bridge.json
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
fx_cast_bridge-0.3.0-x64.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fx_cast_bridge-0.3.0-x64.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Bonjour.msi
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Bonjour.msi
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
dns_sd_bindings.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
dns_sd_bindings.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
fx_cast_bridge.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
fx_cast_bridge.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
fx_cast_bridge.json
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
fx_cast_bridge.json
Resource
win10v2004-20240426-en
General
-
Target
Bonjour.msi
-
Size
2.2MB
-
MD5
e14a6762e68472c648ea0eea0ebe01a0
-
SHA1
a854475b22a934ff977edc23e110ebba79a010fd
-
SHA256
34b0af1165f531847b509d3d47f22bb87f3eed93344521986105350bccc2cbed
-
SHA512
cfbf3dc4b6ee58dacd1e50cfdd73a202ef2b6d0526fe657a19c0b0a05a9e879b1a275368290c7da1a1f93971c4beead53765491dc0971886521b005247a22093
-
SSDEEP
49152:Oa3PPXjym3MYPiau9KXeixE2g58HcvGtXZXECrcxiO/pP/k/vY80as686oX/:VXemcYPiarP
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 2576 msiexec.exe 5 2576 msiexec.exe 7 2576 msiexec.exe 9 2576 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Loads dropped DLL 1 IoCs
pid Process 2792 MsiExec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2576 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2576 msiexec.exe Token: SeIncreaseQuotaPrivilege 2576 msiexec.exe Token: SeRestorePrivilege 2976 msiexec.exe Token: SeTakeOwnershipPrivilege 2976 msiexec.exe Token: SeSecurityPrivilege 2976 msiexec.exe Token: SeCreateTokenPrivilege 2576 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2576 msiexec.exe Token: SeLockMemoryPrivilege 2576 msiexec.exe Token: SeIncreaseQuotaPrivilege 2576 msiexec.exe Token: SeMachineAccountPrivilege 2576 msiexec.exe Token: SeTcbPrivilege 2576 msiexec.exe Token: SeSecurityPrivilege 2576 msiexec.exe Token: SeTakeOwnershipPrivilege 2576 msiexec.exe Token: SeLoadDriverPrivilege 2576 msiexec.exe Token: SeSystemProfilePrivilege 2576 msiexec.exe Token: SeSystemtimePrivilege 2576 msiexec.exe Token: SeProfSingleProcessPrivilege 2576 msiexec.exe Token: SeIncBasePriorityPrivilege 2576 msiexec.exe Token: SeCreatePagefilePrivilege 2576 msiexec.exe Token: SeCreatePermanentPrivilege 2576 msiexec.exe Token: SeBackupPrivilege 2576 msiexec.exe Token: SeRestorePrivilege 2576 msiexec.exe Token: SeShutdownPrivilege 2576 msiexec.exe Token: SeDebugPrivilege 2576 msiexec.exe Token: SeAuditPrivilege 2576 msiexec.exe Token: SeSystemEnvironmentPrivilege 2576 msiexec.exe Token: SeChangeNotifyPrivilege 2576 msiexec.exe Token: SeRemoteShutdownPrivilege 2576 msiexec.exe Token: SeUndockPrivilege 2576 msiexec.exe Token: SeSyncAgentPrivilege 2576 msiexec.exe Token: SeEnableDelegationPrivilege 2576 msiexec.exe Token: SeManageVolumePrivilege 2576 msiexec.exe Token: SeImpersonatePrivilege 2576 msiexec.exe Token: SeCreateGlobalPrivilege 2576 msiexec.exe Token: SeCreateTokenPrivilege 2576 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2576 msiexec.exe Token: SeLockMemoryPrivilege 2576 msiexec.exe Token: SeIncreaseQuotaPrivilege 2576 msiexec.exe Token: SeMachineAccountPrivilege 2576 msiexec.exe Token: SeTcbPrivilege 2576 msiexec.exe Token: SeSecurityPrivilege 2576 msiexec.exe Token: SeTakeOwnershipPrivilege 2576 msiexec.exe Token: SeLoadDriverPrivilege 2576 msiexec.exe Token: SeSystemProfilePrivilege 2576 msiexec.exe Token: SeSystemtimePrivilege 2576 msiexec.exe Token: SeProfSingleProcessPrivilege 2576 msiexec.exe Token: SeIncBasePriorityPrivilege 2576 msiexec.exe Token: SeCreatePagefilePrivilege 2576 msiexec.exe Token: SeCreatePermanentPrivilege 2576 msiexec.exe Token: SeBackupPrivilege 2576 msiexec.exe Token: SeRestorePrivilege 2576 msiexec.exe Token: SeShutdownPrivilege 2576 msiexec.exe Token: SeDebugPrivilege 2576 msiexec.exe Token: SeAuditPrivilege 2576 msiexec.exe Token: SeSystemEnvironmentPrivilege 2576 msiexec.exe Token: SeChangeNotifyPrivilege 2576 msiexec.exe Token: SeRemoteShutdownPrivilege 2576 msiexec.exe Token: SeUndockPrivilege 2576 msiexec.exe Token: SeSyncAgentPrivilege 2576 msiexec.exe Token: SeEnableDelegationPrivilege 2576 msiexec.exe Token: SeManageVolumePrivilege 2576 msiexec.exe Token: SeImpersonatePrivilege 2576 msiexec.exe Token: SeCreateGlobalPrivilege 2576 msiexec.exe Token: SeCreateTokenPrivilege 2576 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2576 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2792 2976 msiexec.exe 29 PID 2976 wrote to memory of 2792 2976 msiexec.exe 29 PID 2976 wrote to memory of 2792 2976 msiexec.exe 29 PID 2976 wrote to memory of 2792 2976 msiexec.exe 29 PID 2976 wrote to memory of 2792 2976 msiexec.exe 29 PID 2976 wrote to memory of 2792 2976 msiexec.exe 29 PID 2976 wrote to memory of 2792 2976 msiexec.exe 29
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Bonjour.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2576
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 31525700DE5CD051C05363740E1503A1 C2⤵
- Loads dropped DLL
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
71KB
MD59441d63e08ee7f859bc26a19b1630bf0
SHA17b5967ede45b1e4bacb783794ead545c59a23ebf
SHA25644bafa74642b0d67e0dc831f674546ad5c637fd02c6d9a96345cc1a02a9be3b1
SHA51240dcc4d22b66d1422fbf7df94224f365f9ab9b52fd7d6147ca4e62dff3d6a542d91776707b90331ce108aeb7f95e9188d528348c7b220e5e43f90606f4f7d356
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a