Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe
Resource
win10v2004-20240226-en
General
-
Target
b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe
-
Size
6.0MB
-
MD5
366bc6388245a3ae5a13a2bee4cd1b56
-
SHA1
5ca5f8df4eb6a23f8a8c4909e314467cf38deb36
-
SHA256
b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2
-
SHA512
f7058d1f32fc976705f8c4abf9242343119a44a32ec8969a133366e3c6f0af77e853db6de306e1b6f8c78e5d5efd7e566f4e340f8a616e3ec01aa7eb35f60664
-
SSDEEP
98304:DhDq6qXCP7yKPNmxecLushvf7U9BYnK/Ag12QzwZ+8/jN3zz+ESjsEtZ3TW6:dDq6UE7oJQzw/jNDzm53Th
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2420 MsiExec.exe 2468 MsiExec.exe 2468 MsiExec.exe 2468 MsiExec.exe 2468 MsiExec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\A: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\S: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\N: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\M: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\G: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\U: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\W: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\Y: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\P: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\Q: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2620 msiexec.exe Token: SeTakeOwnershipPrivilege 2620 msiexec.exe Token: SeSecurityPrivilege 2620 msiexec.exe Token: SeCreateTokenPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeAssignPrimaryTokenPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeLockMemoryPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeIncreaseQuotaPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeMachineAccountPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeTcbPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSecurityPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeTakeOwnershipPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeLoadDriverPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSystemProfilePrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSystemtimePrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeProfSingleProcessPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeIncBasePriorityPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreatePagefilePrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreatePermanentPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeBackupPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeRestorePrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeShutdownPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeDebugPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeAuditPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSystemEnvironmentPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeChangeNotifyPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeRemoteShutdownPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeUndockPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSyncAgentPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeEnableDelegationPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeManageVolumePrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeImpersonatePrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreateGlobalPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreateTokenPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeAssignPrimaryTokenPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeLockMemoryPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeIncreaseQuotaPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeMachineAccountPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeTcbPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSecurityPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeTakeOwnershipPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeLoadDriverPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSystemProfilePrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSystemtimePrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeProfSingleProcessPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeIncBasePriorityPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreatePagefilePrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreatePermanentPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeBackupPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeRestorePrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeShutdownPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeDebugPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeAuditPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSystemEnvironmentPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeChangeNotifyPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeRemoteShutdownPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeUndockPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSyncAgentPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeEnableDelegationPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeManageVolumePrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeImpersonatePrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreateGlobalPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreateTokenPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeAssignPrimaryTokenPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeLockMemoryPrivilege 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe 2668 msiexec.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2420 2620 msiexec.exe 29 PID 2620 wrote to memory of 2420 2620 msiexec.exe 29 PID 2620 wrote to memory of 2420 2620 msiexec.exe 29 PID 2620 wrote to memory of 2420 2620 msiexec.exe 29 PID 2620 wrote to memory of 2420 2620 msiexec.exe 29 PID 2620 wrote to memory of 2420 2620 msiexec.exe 29 PID 2620 wrote to memory of 2420 2620 msiexec.exe 29 PID 2344 wrote to memory of 2668 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe 30 PID 2344 wrote to memory of 2668 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe 30 PID 2344 wrote to memory of 2668 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe 30 PID 2344 wrote to memory of 2668 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe 30 PID 2344 wrote to memory of 2668 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe 30 PID 2344 wrote to memory of 2668 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe 30 PID 2344 wrote to memory of 2668 2344 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe 30 PID 2620 wrote to memory of 2468 2620 msiexec.exe 31 PID 2620 wrote to memory of 2468 2620 msiexec.exe 31 PID 2620 wrote to memory of 2468 2620 msiexec.exe 31 PID 2620 wrote to memory of 2468 2620 msiexec.exe 31 PID 2620 wrote to memory of 2468 2620 msiexec.exe 31 PID 2620 wrote to memory of 2468 2620 msiexec.exe 31 PID 2620 wrote to memory of 2468 2620 msiexec.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe"C:\Users\Admin\AppData\Local\Temp\b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\gasdgtt\TD远程协助(TO DESK) 2.3.0\install\TD远程协助(TO DESK).msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1717908529 "2⤵
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2668
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D0039FE920748E15D9C3CE3324C285DC C2⤵
- Loads dropped DLL
PID:2420
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5753C9A843005F71CF85A78129A4A5A4 C2⤵
- Loads dropped DLL
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD50392f8459009c52b349f798b30f39278
SHA17f46a00dbf265fe0b591a9dd7cd7f1165009e4a2
SHA256410089e31e683cb8d4ed15e573c8547248777bd642ef7beb90713ba485850037
SHA5122a8885e031fdd4aabcfb3c1dca04c0db0fe1fd8ea74cedd7e1c44a7d787a7947028dacebada243cc0455eab835cf012ee907c72323c74acbf31c500bc8e4e6da
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e