Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 01:09

General

  • Target

    36534002f2f3eeccef53f6ec6d8738a59ca66befb7e45678cd7ff36f385bc6c0.msi

  • Size

    7.4MB

  • MD5

    208ec7d9dbf22ecb0ac917ec5ee95406

  • SHA1

    afda9f769580d83626141c9810c0c770245d5519

  • SHA256

    36534002f2f3eeccef53f6ec6d8738a59ca66befb7e45678cd7ff36f385bc6c0

  • SHA512

    0b31ced59bc019d03164c401f238e34e1921640ec0e8c3903ccfbc3a45910ba47d155d85296d958f1bc5cf7f1990163b4a784e1d4fd0e06b88d9a7b12ad93ee6

  • SSDEEP

    196608:C8M9prSOw8UXb3JficKEBXLBxJUZRYI/wWlSldtZeZaKO2YI:C8M9pr7wHbZdKUfKZRZuzeZaKO2

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\36534002f2f3eeccef53f6ec6d8738a59ca66befb7e45678cd7ff36f385bc6c0.msi
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2504
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2844

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads