Overview
overview
6Static
static
3win-airplay.zip
windows7-x64
1win-airplay.zip
windows10-2004-x64
1win-airpla...be.exe
windows7-x64
3win-airpla...be.exe
windows10-2004-x64
3win-airpla...ay.exe
windows7-x64
3win-airpla...ay.exe
windows10-2004-x64
3win-airpla...ur.msi
windows7-x64
6win-airpla...ur.msi
windows10-2004-x64
6win-airpla...64.msi
windows7-x64
6win-airpla...64.msi
windows10-2004-x64
6win-airplay/SDL2.dll
windows7-x64
3win-airplay/SDL2.dll
windows10-2004-x64
3win-airpla...ay.exe
windows7-x64
3win-airpla...ay.exe
windows10-2004-x64
3win-airpla...58.dll
windows7-x64
3win-airpla...58.dll
windows10-2004-x64
3win-airpla...58.dll
windows7-x64
3win-airpla...58.dll
windows10-2004-x64
3win-airpla...56.dll
windows7-x64
3win-airpla...56.dll
windows10-2004-x64
3win-airplay/cairo.dll
windows7-x64
3win-airplay/cairo.dll
windows10-2004-x64
3win-airpla...ig.dll
windows7-x64
3win-airpla...ig.dll
windows10-2004-x64
3win-airpla...pe.dll
windows7-x64
3win-airpla...pe.dll
windows10-2004-x64
3win-airpla...nv.dll
windows7-x64
3win-airpla...nv.dll
windows10-2004-x64
3win-airpla...st.dll
windows7-x64
3win-airpla...st.dll
windows10-2004-x64
3win-airpla...l2.dll
windows7-x64
3win-airpla...l2.dll
windows10-2004-x64
3Resubmissions
03-08-2024 19:46
240803-yg8nestbqr 1003-08-2024 19:44
240803-ygbcxsxhld 603-08-2024 19:41
240803-yd6pnaxgpa 6Analysis
-
max time kernel
1440s -
max time network
1446s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 19:44
Static task
static1
Behavioral task
behavioral1
Sample
win-airplay.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
win-airplay.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
win-airplay/Blueberry-Airplay-Youtube.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
win-airplay/Blueberry-Airplay-Youtube.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
win-airplay/Blueberry-Airplay.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
win-airplay/Blueberry-Airplay.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
win-airplay/Bonjour.msi
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
win-airplay/Bonjour.msi
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
win-airplay/Bonjour64.msi
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
win-airplay/Bonjour64.msi
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
win-airplay/SDL2.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
win-airplay/SDL2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
win-airplay/airplay.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
win-airplay/airplay.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
win-airplay/avcodec-58.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
win-airplay/avcodec-58.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
win-airplay/avformat-58.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
win-airplay/avformat-58.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
win-airplay/avutil-56.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
win-airplay/avutil-56.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
win-airplay/cairo.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
win-airplay/cairo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
win-airplay/fontconfig.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
win-airplay/fontconfig.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
win-airplay/freetype.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
win-airplay/freetype.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
win-airplay/libiconv.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
win-airplay/libiconv.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
win-airplay/libplist.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
win-airplay/libplist.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
win-airplay/libxml2.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
win-airplay/libxml2.dll
Resource
win10v2004-20240802-en
General
-
Target
win-airplay/Bonjour.msi
-
Size
2.2MB
-
MD5
e14a6762e68472c648ea0eea0ebe01a0
-
SHA1
a854475b22a934ff977edc23e110ebba79a010fd
-
SHA256
34b0af1165f531847b509d3d47f22bb87f3eed93344521986105350bccc2cbed
-
SHA512
cfbf3dc4b6ee58dacd1e50cfdd73a202ef2b6d0526fe657a19c0b0a05a9e879b1a275368290c7da1a1f93971c4beead53765491dc0971886521b005247a22093
-
SSDEEP
49152:Oa3PPXjym3MYPiau9KXeixE2g58HcvGtXZXECrcxiO/pP/k/vY80as686oX/:VXemcYPiarP
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
msiexec.exeflow pid process 3 1656 msiexec.exe 5 1656 msiexec.exe 7 1656 msiexec.exe 9 1656 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe -
Loads dropped DLL 1 IoCs
Processes:
MsiExec.exepid process 2148 MsiExec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MsiExec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msiexec.exepid process 1656 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 1656 msiexec.exe Token: SeIncreaseQuotaPrivilege 1656 msiexec.exe Token: SeRestorePrivilege 2204 msiexec.exe Token: SeTakeOwnershipPrivilege 2204 msiexec.exe Token: SeSecurityPrivilege 2204 msiexec.exe Token: SeCreateTokenPrivilege 1656 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1656 msiexec.exe Token: SeLockMemoryPrivilege 1656 msiexec.exe Token: SeIncreaseQuotaPrivilege 1656 msiexec.exe Token: SeMachineAccountPrivilege 1656 msiexec.exe Token: SeTcbPrivilege 1656 msiexec.exe Token: SeSecurityPrivilege 1656 msiexec.exe Token: SeTakeOwnershipPrivilege 1656 msiexec.exe Token: SeLoadDriverPrivilege 1656 msiexec.exe Token: SeSystemProfilePrivilege 1656 msiexec.exe Token: SeSystemtimePrivilege 1656 msiexec.exe Token: SeProfSingleProcessPrivilege 1656 msiexec.exe Token: SeIncBasePriorityPrivilege 1656 msiexec.exe Token: SeCreatePagefilePrivilege 1656 msiexec.exe Token: SeCreatePermanentPrivilege 1656 msiexec.exe Token: SeBackupPrivilege 1656 msiexec.exe Token: SeRestorePrivilege 1656 msiexec.exe Token: SeShutdownPrivilege 1656 msiexec.exe Token: SeDebugPrivilege 1656 msiexec.exe Token: SeAuditPrivilege 1656 msiexec.exe Token: SeSystemEnvironmentPrivilege 1656 msiexec.exe Token: SeChangeNotifyPrivilege 1656 msiexec.exe Token: SeRemoteShutdownPrivilege 1656 msiexec.exe Token: SeUndockPrivilege 1656 msiexec.exe Token: SeSyncAgentPrivilege 1656 msiexec.exe Token: SeEnableDelegationPrivilege 1656 msiexec.exe Token: SeManageVolumePrivilege 1656 msiexec.exe Token: SeImpersonatePrivilege 1656 msiexec.exe Token: SeCreateGlobalPrivilege 1656 msiexec.exe Token: SeCreateTokenPrivilege 1656 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1656 msiexec.exe Token: SeLockMemoryPrivilege 1656 msiexec.exe Token: SeIncreaseQuotaPrivilege 1656 msiexec.exe Token: SeMachineAccountPrivilege 1656 msiexec.exe Token: SeTcbPrivilege 1656 msiexec.exe Token: SeSecurityPrivilege 1656 msiexec.exe Token: SeTakeOwnershipPrivilege 1656 msiexec.exe Token: SeLoadDriverPrivilege 1656 msiexec.exe Token: SeSystemProfilePrivilege 1656 msiexec.exe Token: SeSystemtimePrivilege 1656 msiexec.exe Token: SeProfSingleProcessPrivilege 1656 msiexec.exe Token: SeIncBasePriorityPrivilege 1656 msiexec.exe Token: SeCreatePagefilePrivilege 1656 msiexec.exe Token: SeCreatePermanentPrivilege 1656 msiexec.exe Token: SeBackupPrivilege 1656 msiexec.exe Token: SeRestorePrivilege 1656 msiexec.exe Token: SeShutdownPrivilege 1656 msiexec.exe Token: SeDebugPrivilege 1656 msiexec.exe Token: SeAuditPrivilege 1656 msiexec.exe Token: SeSystemEnvironmentPrivilege 1656 msiexec.exe Token: SeChangeNotifyPrivilege 1656 msiexec.exe Token: SeRemoteShutdownPrivilege 1656 msiexec.exe Token: SeUndockPrivilege 1656 msiexec.exe Token: SeSyncAgentPrivilege 1656 msiexec.exe Token: SeEnableDelegationPrivilege 1656 msiexec.exe Token: SeManageVolumePrivilege 1656 msiexec.exe Token: SeImpersonatePrivilege 1656 msiexec.exe Token: SeCreateGlobalPrivilege 1656 msiexec.exe Token: SeCreateTokenPrivilege 1656 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 1656 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
msiexec.exedescription pid process target process PID 2204 wrote to memory of 2148 2204 msiexec.exe MsiExec.exe PID 2204 wrote to memory of 2148 2204 msiexec.exe MsiExec.exe PID 2204 wrote to memory of 2148 2204 msiexec.exe MsiExec.exe PID 2204 wrote to memory of 2148 2204 msiexec.exe MsiExec.exe PID 2204 wrote to memory of 2148 2204 msiexec.exe MsiExec.exe PID 2204 wrote to memory of 2148 2204 msiexec.exe MsiExec.exe PID 2204 wrote to memory of 2148 2204 msiexec.exe MsiExec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\win-airplay\Bonjour.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 576E3CDCDFC7034E5246247151422E73 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Cab34D8.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\MSI3B56.tmpFilesize
71KB
MD59441d63e08ee7f859bc26a19b1630bf0
SHA17b5967ede45b1e4bacb783794ead545c59a23ebf
SHA25644bafa74642b0d67e0dc831f674546ad5c637fd02c6d9a96345cc1a02a9be3b1
SHA51240dcc4d22b66d1422fbf7df94224f365f9ab9b52fd7d6147ca4e62dff3d6a542d91776707b90331ce108aeb7f95e9188d528348c7b220e5e43f90606f4f7d356
-
C:\Users\Admin\AppData\Local\Temp\Tar3519.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b