Overview
overview
6Static
static
3win-airplay.zip
windows7-x64
1win-airplay.zip
windows10-2004-x64
1win-airpla...be.exe
windows7-x64
3win-airpla...be.exe
windows10-2004-x64
3win-airpla...ay.exe
windows7-x64
3win-airpla...ay.exe
windows10-2004-x64
3win-airpla...ur.msi
windows7-x64
6win-airpla...ur.msi
windows10-2004-x64
6win-airpla...64.msi
windows7-x64
6win-airpla...64.msi
windows10-2004-x64
6win-airplay/SDL2.dll
windows7-x64
3win-airplay/SDL2.dll
windows10-2004-x64
3win-airpla...ay.exe
windows7-x64
3win-airpla...ay.exe
windows10-2004-x64
3win-airpla...58.dll
windows7-x64
3win-airpla...58.dll
windows10-2004-x64
3win-airpla...58.dll
windows7-x64
3win-airpla...58.dll
windows10-2004-x64
3win-airpla...56.dll
windows7-x64
3win-airpla...56.dll
windows10-2004-x64
3win-airplay/cairo.dll
windows7-x64
3win-airplay/cairo.dll
windows10-2004-x64
3win-airpla...ig.dll
windows7-x64
3win-airpla...ig.dll
windows10-2004-x64
3win-airpla...pe.dll
windows7-x64
3win-airpla...pe.dll
windows10-2004-x64
3win-airpla...nv.dll
windows7-x64
3win-airpla...nv.dll
windows10-2004-x64
3win-airpla...st.dll
windows7-x64
3win-airpla...st.dll
windows10-2004-x64
3win-airpla...l2.dll
windows7-x64
3win-airpla...l2.dll
windows10-2004-x64
3Resubmissions
03-08-2024 19:46
240803-yg8nestbqr 1003-08-2024 19:44
240803-ygbcxsxhld 603-08-2024 19:41
240803-yd6pnaxgpa 6Analysis
-
max time kernel
1715s -
max time network
1127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 19:44
Static task
static1
Behavioral task
behavioral1
Sample
win-airplay.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
win-airplay.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
win-airplay/Blueberry-Airplay-Youtube.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
win-airplay/Blueberry-Airplay-Youtube.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
win-airplay/Blueberry-Airplay.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
win-airplay/Blueberry-Airplay.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
win-airplay/Bonjour.msi
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
win-airplay/Bonjour.msi
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
win-airplay/Bonjour64.msi
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
win-airplay/Bonjour64.msi
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
win-airplay/SDL2.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
win-airplay/SDL2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
win-airplay/airplay.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
win-airplay/airplay.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
win-airplay/avcodec-58.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
win-airplay/avcodec-58.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
win-airplay/avformat-58.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
win-airplay/avformat-58.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
win-airplay/avutil-56.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
win-airplay/avutil-56.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
win-airplay/cairo.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
win-airplay/cairo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
win-airplay/fontconfig.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
win-airplay/fontconfig.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
win-airplay/freetype.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
win-airplay/freetype.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
win-airplay/libiconv.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
win-airplay/libiconv.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
win-airplay/libplist.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
win-airplay/libplist.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
win-airplay/libxml2.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
win-airplay/libxml2.dll
Resource
win10v2004-20240802-en
General
-
Target
win-airplay/Bonjour.msi
-
Size
2.2MB
-
MD5
e14a6762e68472c648ea0eea0ebe01a0
-
SHA1
a854475b22a934ff977edc23e110ebba79a010fd
-
SHA256
34b0af1165f531847b509d3d47f22bb87f3eed93344521986105350bccc2cbed
-
SHA512
cfbf3dc4b6ee58dacd1e50cfdd73a202ef2b6d0526fe657a19c0b0a05a9e879b1a275368290c7da1a1f93971c4beead53765491dc0971886521b005247a22093
-
SSDEEP
49152:Oa3PPXjym3MYPiau9KXeixE2g58HcvGtXZXECrcxiO/pP/k/vY80as686oX/:VXemcYPiarP
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
msiexec.exeflow pid process 3 4756 msiexec.exe 8 4756 msiexec.exe 10 4756 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Loads dropped DLL 1 IoCs
Processes:
MsiExec.exepid process 4844 MsiExec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MsiExec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 4756 msiexec.exe Token: SeIncreaseQuotaPrivilege 4756 msiexec.exe Token: SeSecurityPrivilege 5008 msiexec.exe Token: SeCreateTokenPrivilege 4756 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4756 msiexec.exe Token: SeLockMemoryPrivilege 4756 msiexec.exe Token: SeIncreaseQuotaPrivilege 4756 msiexec.exe Token: SeMachineAccountPrivilege 4756 msiexec.exe Token: SeTcbPrivilege 4756 msiexec.exe Token: SeSecurityPrivilege 4756 msiexec.exe Token: SeTakeOwnershipPrivilege 4756 msiexec.exe Token: SeLoadDriverPrivilege 4756 msiexec.exe Token: SeSystemProfilePrivilege 4756 msiexec.exe Token: SeSystemtimePrivilege 4756 msiexec.exe Token: SeProfSingleProcessPrivilege 4756 msiexec.exe Token: SeIncBasePriorityPrivilege 4756 msiexec.exe Token: SeCreatePagefilePrivilege 4756 msiexec.exe Token: SeCreatePermanentPrivilege 4756 msiexec.exe Token: SeBackupPrivilege 4756 msiexec.exe Token: SeRestorePrivilege 4756 msiexec.exe Token: SeShutdownPrivilege 4756 msiexec.exe Token: SeDebugPrivilege 4756 msiexec.exe Token: SeAuditPrivilege 4756 msiexec.exe Token: SeSystemEnvironmentPrivilege 4756 msiexec.exe Token: SeChangeNotifyPrivilege 4756 msiexec.exe Token: SeRemoteShutdownPrivilege 4756 msiexec.exe Token: SeUndockPrivilege 4756 msiexec.exe Token: SeSyncAgentPrivilege 4756 msiexec.exe Token: SeEnableDelegationPrivilege 4756 msiexec.exe Token: SeManageVolumePrivilege 4756 msiexec.exe Token: SeImpersonatePrivilege 4756 msiexec.exe Token: SeCreateGlobalPrivilege 4756 msiexec.exe Token: SeCreateTokenPrivilege 4756 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4756 msiexec.exe Token: SeLockMemoryPrivilege 4756 msiexec.exe Token: SeIncreaseQuotaPrivilege 4756 msiexec.exe Token: SeMachineAccountPrivilege 4756 msiexec.exe Token: SeTcbPrivilege 4756 msiexec.exe Token: SeSecurityPrivilege 4756 msiexec.exe Token: SeTakeOwnershipPrivilege 4756 msiexec.exe Token: SeLoadDriverPrivilege 4756 msiexec.exe Token: SeSystemProfilePrivilege 4756 msiexec.exe Token: SeSystemtimePrivilege 4756 msiexec.exe Token: SeProfSingleProcessPrivilege 4756 msiexec.exe Token: SeIncBasePriorityPrivilege 4756 msiexec.exe Token: SeCreatePagefilePrivilege 4756 msiexec.exe Token: SeCreatePermanentPrivilege 4756 msiexec.exe Token: SeBackupPrivilege 4756 msiexec.exe Token: SeRestorePrivilege 4756 msiexec.exe Token: SeShutdownPrivilege 4756 msiexec.exe Token: SeDebugPrivilege 4756 msiexec.exe Token: SeAuditPrivilege 4756 msiexec.exe Token: SeSystemEnvironmentPrivilege 4756 msiexec.exe Token: SeChangeNotifyPrivilege 4756 msiexec.exe Token: SeRemoteShutdownPrivilege 4756 msiexec.exe Token: SeUndockPrivilege 4756 msiexec.exe Token: SeSyncAgentPrivilege 4756 msiexec.exe Token: SeEnableDelegationPrivilege 4756 msiexec.exe Token: SeManageVolumePrivilege 4756 msiexec.exe Token: SeImpersonatePrivilege 4756 msiexec.exe Token: SeCreateGlobalPrivilege 4756 msiexec.exe Token: SeCreateTokenPrivilege 4756 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4756 msiexec.exe Token: SeLockMemoryPrivilege 4756 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 4756 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
msiexec.exedescription pid process target process PID 5008 wrote to memory of 4844 5008 msiexec.exe MsiExec.exe PID 5008 wrote to memory of 4844 5008 msiexec.exe MsiExec.exe PID 5008 wrote to memory of 4844 5008 msiexec.exe MsiExec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\win-airplay\Bonjour.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4756
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F32A2E83CAAA58E98EB4D753C019F20F C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD59441d63e08ee7f859bc26a19b1630bf0
SHA17b5967ede45b1e4bacb783794ead545c59a23ebf
SHA25644bafa74642b0d67e0dc831f674546ad5c637fd02c6d9a96345cc1a02a9be3b1
SHA51240dcc4d22b66d1422fbf7df94224f365f9ab9b52fd7d6147ca4e62dff3d6a542d91776707b90331ce108aeb7f95e9188d528348c7b220e5e43f90606f4f7d356