Overview
overview
6Static
static
3win-airplay.zip
windows11-21h2-x64
1win-airpla...be.exe
windows11-21h2-x64
3win-airpla...ay.exe
windows11-21h2-x64
3win-airpla...ur.msi
windows11-21h2-x64
6win-airpla...64.msi
windows11-21h2-x64
6win-airplay/SDL2.dll
windows11-21h2-x64
3win-airpla...ay.exe
windows11-21h2-x64
3win-airpla...58.dll
windows11-21h2-x64
3win-airpla...58.dll
windows11-21h2-x64
3win-airpla...56.dll
windows11-21h2-x64
4win-airplay/cairo.dll
windows11-21h2-x64
3win-airpla...ig.dll
windows11-21h2-x64
3win-airpla...pe.dll
windows11-21h2-x64
3win-airpla...nv.dll
windows11-21h2-x64
3win-airpla...st.dll
windows11-21h2-x64
3win-airpla...l2.dll
windows11-21h2-x64
3win-airpla...55.dll
windows11-21h2-x64
3win-airpla...ld.ttf
windows11-21h2-x64
3win-airpla...ht.ttf
windows11-21h2-x64
3win-airpla...ar.ttf
windows11-21h2-x64
3win-airpla...ld.ttf
windows11-21h2-x64
3win-airpla...ht.ttf
windows11-21h2-x64
3win-airpla...ld.ttf
windows11-21h2-x64
3win-airpla...ht.ttf
windows11-21h2-x64
3win-airpla...um.ttf
windows11-21h2-x64
3win-airpla...ar.ttf
windows11-21h2-x64
3win-airpla...ic.ttf
windows11-21h2-x64
3win-airpla...-3.dll
windows11-21h2-x64
3win-airpla...-5.dll
windows11-21h2-x64
3win-airpla...��.url
windows11-21h2-x64
1Resubmissions
03-08-2024 19:46
240803-yg8nestbqr 1003-08-2024 19:44
240803-ygbcxsxhld 603-08-2024 19:41
240803-yd6pnaxgpa 6Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-08-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
win-airplay.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
win-airplay/Blueberry-Airplay-Youtube.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
win-airplay/Blueberry-Airplay.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
win-airplay/Bonjour.msi
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
win-airplay/Bonjour64.msi
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
win-airplay/SDL2.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
win-airplay/airplay.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
win-airplay/avcodec-58.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
win-airplay/avformat-58.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
win-airplay/avutil-56.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
win-airplay/cairo.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
win-airplay/fontconfig.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
win-airplay/freetype.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
win-airplay/libiconv.dll
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
win-airplay/libplist.dll
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
win-airplay/libxml2.dll
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
win-airplay/postproc-55.dll
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
win-airplay/resources/OpenSans-Bold.ttf
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
win-airplay/resources/OpenSans-Light.ttf
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
win-airplay/resources/OpenSans-Regular.ttf
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
win-airplay/resources/OpenSans-SemiBold.ttf
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
win-airplay/resources/OpenSansCondensed-Light.ttf
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
win-airplay/resources/Roboto-Bold.ttf
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
win-airplay/resources/Roboto-Light.ttf
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
win-airplay/resources/Roboto-Medium.ttf
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
win-airplay/resources/Roboto-Regular.ttf
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
win-airplay/resources/elements_basic.ttf
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
win-airplay/swresample-3.dll
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
win-airplay/swscale-5.dll
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
win-airplay/蓝莓投屏 官网.url
Resource
win11-20240802-en
General
-
Target
win-airplay/Bonjour.msi
-
Size
2.2MB
-
MD5
e14a6762e68472c648ea0eea0ebe01a0
-
SHA1
a854475b22a934ff977edc23e110ebba79a010fd
-
SHA256
34b0af1165f531847b509d3d47f22bb87f3eed93344521986105350bccc2cbed
-
SHA512
cfbf3dc4b6ee58dacd1e50cfdd73a202ef2b6d0526fe657a19c0b0a05a9e879b1a275368290c7da1a1f93971c4beead53765491dc0971886521b005247a22093
-
SSDEEP
49152:Oa3PPXjym3MYPiau9KXeixE2g58HcvGtXZXECrcxiO/pP/k/vY80as686oX/:VXemcYPiarP
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
msiexec.exeflow pid process 2 4540 msiexec.exe 3 4540 msiexec.exe 4 4540 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Loads dropped DLL 1 IoCs
Processes:
MsiExec.exepid process 2244 MsiExec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MsiExec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 4540 msiexec.exe Token: SeIncreaseQuotaPrivilege 4540 msiexec.exe Token: SeSecurityPrivilege 1684 msiexec.exe Token: SeCreateTokenPrivilege 4540 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4540 msiexec.exe Token: SeLockMemoryPrivilege 4540 msiexec.exe Token: SeIncreaseQuotaPrivilege 4540 msiexec.exe Token: SeMachineAccountPrivilege 4540 msiexec.exe Token: SeTcbPrivilege 4540 msiexec.exe Token: SeSecurityPrivilege 4540 msiexec.exe Token: SeTakeOwnershipPrivilege 4540 msiexec.exe Token: SeLoadDriverPrivilege 4540 msiexec.exe Token: SeSystemProfilePrivilege 4540 msiexec.exe Token: SeSystemtimePrivilege 4540 msiexec.exe Token: SeProfSingleProcessPrivilege 4540 msiexec.exe Token: SeIncBasePriorityPrivilege 4540 msiexec.exe Token: SeCreatePagefilePrivilege 4540 msiexec.exe Token: SeCreatePermanentPrivilege 4540 msiexec.exe Token: SeBackupPrivilege 4540 msiexec.exe Token: SeRestorePrivilege 4540 msiexec.exe Token: SeShutdownPrivilege 4540 msiexec.exe Token: SeDebugPrivilege 4540 msiexec.exe Token: SeAuditPrivilege 4540 msiexec.exe Token: SeSystemEnvironmentPrivilege 4540 msiexec.exe Token: SeChangeNotifyPrivilege 4540 msiexec.exe Token: SeRemoteShutdownPrivilege 4540 msiexec.exe Token: SeUndockPrivilege 4540 msiexec.exe Token: SeSyncAgentPrivilege 4540 msiexec.exe Token: SeEnableDelegationPrivilege 4540 msiexec.exe Token: SeManageVolumePrivilege 4540 msiexec.exe Token: SeImpersonatePrivilege 4540 msiexec.exe Token: SeCreateGlobalPrivilege 4540 msiexec.exe Token: SeCreateTokenPrivilege 4540 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4540 msiexec.exe Token: SeLockMemoryPrivilege 4540 msiexec.exe Token: SeIncreaseQuotaPrivilege 4540 msiexec.exe Token: SeMachineAccountPrivilege 4540 msiexec.exe Token: SeTcbPrivilege 4540 msiexec.exe Token: SeSecurityPrivilege 4540 msiexec.exe Token: SeTakeOwnershipPrivilege 4540 msiexec.exe Token: SeLoadDriverPrivilege 4540 msiexec.exe Token: SeSystemProfilePrivilege 4540 msiexec.exe Token: SeSystemtimePrivilege 4540 msiexec.exe Token: SeProfSingleProcessPrivilege 4540 msiexec.exe Token: SeIncBasePriorityPrivilege 4540 msiexec.exe Token: SeCreatePagefilePrivilege 4540 msiexec.exe Token: SeCreatePermanentPrivilege 4540 msiexec.exe Token: SeBackupPrivilege 4540 msiexec.exe Token: SeRestorePrivilege 4540 msiexec.exe Token: SeShutdownPrivilege 4540 msiexec.exe Token: SeDebugPrivilege 4540 msiexec.exe Token: SeAuditPrivilege 4540 msiexec.exe Token: SeSystemEnvironmentPrivilege 4540 msiexec.exe Token: SeChangeNotifyPrivilege 4540 msiexec.exe Token: SeRemoteShutdownPrivilege 4540 msiexec.exe Token: SeUndockPrivilege 4540 msiexec.exe Token: SeSyncAgentPrivilege 4540 msiexec.exe Token: SeEnableDelegationPrivilege 4540 msiexec.exe Token: SeManageVolumePrivilege 4540 msiexec.exe Token: SeImpersonatePrivilege 4540 msiexec.exe Token: SeCreateGlobalPrivilege 4540 msiexec.exe Token: SeCreateTokenPrivilege 4540 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4540 msiexec.exe Token: SeLockMemoryPrivilege 4540 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 4540 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
msiexec.exedescription pid process target process PID 1684 wrote to memory of 2244 1684 msiexec.exe MsiExec.exe PID 1684 wrote to memory of 2244 1684 msiexec.exe MsiExec.exe PID 1684 wrote to memory of 2244 1684 msiexec.exe MsiExec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\win-airplay\Bonjour.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4540
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1CB45911A96AA2ECCFD0DAC1AA6252C6 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD59441d63e08ee7f859bc26a19b1630bf0
SHA17b5967ede45b1e4bacb783794ead545c59a23ebf
SHA25644bafa74642b0d67e0dc831f674546ad5c637fd02c6d9a96345cc1a02a9be3b1
SHA51240dcc4d22b66d1422fbf7df94224f365f9ab9b52fd7d6147ca4e62dff3d6a542d91776707b90331ce108aeb7f95e9188d528348c7b220e5e43f90606f4f7d356