Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe
Resource
win10v2004-20240226-en
General
-
Target
b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe
-
Size
6.0MB
-
MD5
366bc6388245a3ae5a13a2bee4cd1b56
-
SHA1
5ca5f8df4eb6a23f8a8c4909e314467cf38deb36
-
SHA256
b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2
-
SHA512
f7058d1f32fc976705f8c4abf9242343119a44a32ec8969a133366e3c6f0af77e853db6de306e1b6f8c78e5d5efd7e566f4e340f8a616e3ec01aa7eb35f60664
-
SSDEEP
98304:DhDq6qXCP7yKPNmxecLushvf7U9BYnK/Ag12QzwZ+8/jN3zz+ESjsEtZ3TW6:dDq6UE7oJQzw/jNDzm53Th
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 884 MsiExec.exe 4628 MsiExec.exe 4628 MsiExec.exe 4628 MsiExec.exe 4628 MsiExec.exe 4628 MsiExec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\Z: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\P: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\U: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\R: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\V: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\S: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\X: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\T: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\M: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\Y: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 4896 msiexec.exe Token: SeCreateTokenPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeAssignPrimaryTokenPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeLockMemoryPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeIncreaseQuotaPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeMachineAccountPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeTcbPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSecurityPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeTakeOwnershipPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeLoadDriverPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSystemProfilePrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSystemtimePrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeProfSingleProcessPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeIncBasePriorityPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreatePagefilePrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreatePermanentPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeBackupPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeRestorePrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeShutdownPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeDebugPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeAuditPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSystemEnvironmentPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeChangeNotifyPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeRemoteShutdownPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeUndockPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSyncAgentPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeEnableDelegationPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeManageVolumePrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeImpersonatePrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreateGlobalPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreateTokenPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeAssignPrimaryTokenPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeLockMemoryPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeIncreaseQuotaPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeMachineAccountPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeTcbPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSecurityPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeTakeOwnershipPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeLoadDriverPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSystemProfilePrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSystemtimePrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeProfSingleProcessPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeIncBasePriorityPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreatePagefilePrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreatePermanentPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeBackupPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeRestorePrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeShutdownPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeDebugPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeAuditPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSystemEnvironmentPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeChangeNotifyPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeRemoteShutdownPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeUndockPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeSyncAgentPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeEnableDelegationPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeManageVolumePrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeImpersonatePrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreateGlobalPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeCreateTokenPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeAssignPrimaryTokenPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeLockMemoryPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeIncreaseQuotaPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe Token: SeMachineAccountPrivilege 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe 1096 msiexec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4896 wrote to memory of 884 4896 msiexec.exe 93 PID 4896 wrote to memory of 884 4896 msiexec.exe 93 PID 4896 wrote to memory of 884 4896 msiexec.exe 93 PID 4752 wrote to memory of 1096 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe 94 PID 4752 wrote to memory of 1096 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe 94 PID 4752 wrote to memory of 1096 4752 b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe 94 PID 4896 wrote to memory of 4628 4896 msiexec.exe 95 PID 4896 wrote to memory of 4628 4896 msiexec.exe 95 PID 4896 wrote to memory of 4628 4896 msiexec.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe"C:\Users\Admin\AppData\Local\Temp\b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\gasdgtt\TD远程协助(TO DESK) 2.3.0\install\TD远程协助(TO DESK).msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\b78112b8eced8b7e581730c13e55dd7e9a722acbe6c68f806883913d78142ad2.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1717927297 "2⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:1096
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 76A785407364165C3BE935ED0A83F72D C2⤵
- Loads dropped DLL
PID:884
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B5ABEA5F4B845CB7EF2C7701FA3F8E27 C2⤵
- Loads dropped DLL
PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
1.4MB
MD50392f8459009c52b349f798b30f39278
SHA17f46a00dbf265fe0b591a9dd7cd7f1165009e4a2
SHA256410089e31e683cb8d4ed15e573c8547248777bd642ef7beb90713ba485850037
SHA5122a8885e031fdd4aabcfb3c1dca04c0db0fe1fd8ea74cedd7e1c44a7d787a7947028dacebada243cc0455eab835cf012ee907c72323c74acbf31c500bc8e4e6da