Analysis
-
max time kernel
359s -
max time network
361s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
node-v20.15.0-x64.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
node-v20.15.0-x64.msi
Resource
win10v2004-20240508-en
General
-
Target
node-v20.15.0-x64.msi
-
Size
25.3MB
-
MD5
a4cd4d0ca099d2c6c1ec1296202c7709
-
SHA1
02d997caa9f99a841aa0a0ea05ae110475553f28
-
SHA256
0945b75af2eb884790064d90dc2e05cb3443c196c2ff546d7354b81a0721f882
-
SHA512
a2a3cf14e8ee7a14d3a3cf1d10f104abccd0966a927d6e8595716b546ee8546316a341ea34478507c326f9c89f3c0e40130ac8757e794490ad9599d1b37c4d5d
-
SSDEEP
393216:+Gga8EFZLIx6DA9VH/gE/BfizAkWUZZ1Ftoxt/fDm/g9nyHkrbyYojQhNY3:+Gr8I9n4/2MnXDmAyErNojQTY3
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2320 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Loads dropped DLL 2 IoCs
pid Process 3008 MsiExec.exe 3008 MsiExec.exe -
Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
pid Process 2320 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2320 msiexec.exe Token: SeIncreaseQuotaPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeTakeOwnershipPrivilege 2468 msiexec.exe Token: SeSecurityPrivilege 2468 msiexec.exe Token: SeCreateTokenPrivilege 2320 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2320 msiexec.exe Token: SeLockMemoryPrivilege 2320 msiexec.exe Token: SeIncreaseQuotaPrivilege 2320 msiexec.exe Token: SeMachineAccountPrivilege 2320 msiexec.exe Token: SeTcbPrivilege 2320 msiexec.exe Token: SeSecurityPrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeLoadDriverPrivilege 2320 msiexec.exe Token: SeSystemProfilePrivilege 2320 msiexec.exe Token: SeSystemtimePrivilege 2320 msiexec.exe Token: SeProfSingleProcessPrivilege 2320 msiexec.exe Token: SeIncBasePriorityPrivilege 2320 msiexec.exe Token: SeCreatePagefilePrivilege 2320 msiexec.exe Token: SeCreatePermanentPrivilege 2320 msiexec.exe Token: SeBackupPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeShutdownPrivilege 2320 msiexec.exe Token: SeDebugPrivilege 2320 msiexec.exe Token: SeAuditPrivilege 2320 msiexec.exe Token: SeSystemEnvironmentPrivilege 2320 msiexec.exe Token: SeChangeNotifyPrivilege 2320 msiexec.exe Token: SeRemoteShutdownPrivilege 2320 msiexec.exe Token: SeUndockPrivilege 2320 msiexec.exe Token: SeSyncAgentPrivilege 2320 msiexec.exe Token: SeEnableDelegationPrivilege 2320 msiexec.exe Token: SeManageVolumePrivilege 2320 msiexec.exe Token: SeImpersonatePrivilege 2320 msiexec.exe Token: SeCreateGlobalPrivilege 2320 msiexec.exe Token: SeCreateTokenPrivilege 2320 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2320 msiexec.exe Token: SeLockMemoryPrivilege 2320 msiexec.exe Token: SeIncreaseQuotaPrivilege 2320 msiexec.exe Token: SeMachineAccountPrivilege 2320 msiexec.exe Token: SeTcbPrivilege 2320 msiexec.exe Token: SeSecurityPrivilege 2320 msiexec.exe Token: SeTakeOwnershipPrivilege 2320 msiexec.exe Token: SeLoadDriverPrivilege 2320 msiexec.exe Token: SeSystemProfilePrivilege 2320 msiexec.exe Token: SeSystemtimePrivilege 2320 msiexec.exe Token: SeProfSingleProcessPrivilege 2320 msiexec.exe Token: SeIncBasePriorityPrivilege 2320 msiexec.exe Token: SeCreatePagefilePrivilege 2320 msiexec.exe Token: SeCreatePermanentPrivilege 2320 msiexec.exe Token: SeBackupPrivilege 2320 msiexec.exe Token: SeRestorePrivilege 2320 msiexec.exe Token: SeShutdownPrivilege 2320 msiexec.exe Token: SeDebugPrivilege 2320 msiexec.exe Token: SeAuditPrivilege 2320 msiexec.exe Token: SeSystemEnvironmentPrivilege 2320 msiexec.exe Token: SeChangeNotifyPrivilege 2320 msiexec.exe Token: SeRemoteShutdownPrivilege 2320 msiexec.exe Token: SeUndockPrivilege 2320 msiexec.exe Token: SeSyncAgentPrivilege 2320 msiexec.exe Token: SeEnableDelegationPrivilege 2320 msiexec.exe Token: SeManageVolumePrivilege 2320 msiexec.exe Token: SeImpersonatePrivilege 2320 msiexec.exe Token: SeCreateGlobalPrivilege 2320 msiexec.exe Token: SeCreateTokenPrivilege 2320 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2320 msiexec.exe 2320 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2468 wrote to memory of 3008 2468 msiexec.exe 29 PID 2468 wrote to memory of 3008 2468 msiexec.exe 29 PID 2468 wrote to memory of 3008 2468 msiexec.exe 29 PID 2468 wrote to memory of 3008 2468 msiexec.exe 29 PID 2468 wrote to memory of 3008 2468 msiexec.exe 29
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\node-v20.15.0-x64.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2320
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding 57D05EDC1CD05124C7A8ADDBF915DBA7 C2⤵
- Loads dropped DLL
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
125KB
MD590214c2048bb810ef3513a28d1da72b4
SHA14e347124cd29f216992c276cb92565508dd7a267
SHA256398bc384f7b85143e605abdaa0588a01386da79652d1b0a4febdf66f0f45b758
SHA512ab8181dc29f1a2f6eec1847b1e8cf47fd20bf342b19d837a0222241d669897d0c241a04e4d894b5e2e8680bf963929af8fc5ee73644c23e34da7ba8feebb70b5
-
Filesize
390KB
MD580bebea11fbe87108b08762a1bbff2cd
SHA1a7ec111a792fd9a870841be430d130a545613782
SHA256facf518f88cd67afd959c99c3ba233f78a4fbfe7fd3565489da74a585b55e9d1
SHA512a760debb2084d801b6381a0e1dcef66080df03a768cc577b20b8472be87ad8477d59c331159555de10182d87340aa68fe1f3f5d0212048fd7692d85f4da656f6
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06