Overview
overview
6Static
static
3win-airplay.zip
windows7-x64
1win-airplay.zip
windows10-2004-x64
1win-airpla...be.exe
windows7-x64
3win-airpla...be.exe
windows10-2004-x64
3win-airpla...ay.exe
windows7-x64
3win-airpla...ay.exe
windows10-2004-x64
3win-airpla...ur.msi
windows7-x64
6win-airpla...ur.msi
windows10-2004-x64
6win-airpla...64.msi
windows7-x64
6win-airpla...64.msi
windows10-2004-x64
6win-airplay/SDL2.dll
windows7-x64
3win-airplay/SDL2.dll
windows10-2004-x64
3win-airpla...ay.exe
windows7-x64
3win-airpla...ay.exe
windows10-2004-x64
3win-airpla...58.dll
windows7-x64
3win-airpla...58.dll
windows10-2004-x64
3win-airpla...58.dll
windows7-x64
3win-airpla...58.dll
windows10-2004-x64
3win-airpla...56.dll
windows7-x64
3win-airpla...56.dll
windows10-2004-x64
3win-airplay/cairo.dll
windows7-x64
3win-airplay/cairo.dll
windows10-2004-x64
3win-airpla...ig.dll
windows7-x64
3win-airpla...ig.dll
windows10-2004-x64
3win-airpla...pe.dll
windows7-x64
3win-airpla...pe.dll
windows10-2004-x64
3win-airpla...nv.dll
windows7-x64
3win-airpla...nv.dll
windows10-2004-x64
3win-airpla...st.dll
windows7-x64
3win-airpla...st.dll
windows10-2004-x64
3win-airpla...l2.dll
windows7-x64
3win-airpla...l2.dll
windows10-2004-x64
3Resubmissions
03-08-2024 19:46
240803-yg8nestbqr 1003-08-2024 19:44
240803-ygbcxsxhld 603-08-2024 19:41
240803-yd6pnaxgpa 6Analysis
-
max time kernel
1561s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 19:44
Static task
static1
Behavioral task
behavioral1
Sample
win-airplay.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
win-airplay.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
win-airplay/Blueberry-Airplay-Youtube.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
win-airplay/Blueberry-Airplay-Youtube.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
win-airplay/Blueberry-Airplay.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
win-airplay/Blueberry-Airplay.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
win-airplay/Bonjour.msi
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
win-airplay/Bonjour.msi
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
win-airplay/Bonjour64.msi
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
win-airplay/Bonjour64.msi
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
win-airplay/SDL2.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
win-airplay/SDL2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
win-airplay/airplay.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
win-airplay/airplay.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
win-airplay/avcodec-58.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
win-airplay/avcodec-58.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
win-airplay/avformat-58.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
win-airplay/avformat-58.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
win-airplay/avutil-56.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
win-airplay/avutil-56.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
win-airplay/cairo.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
win-airplay/cairo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
win-airplay/fontconfig.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
win-airplay/fontconfig.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
win-airplay/freetype.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
win-airplay/freetype.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
win-airplay/libiconv.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
win-airplay/libiconv.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
win-airplay/libplist.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
win-airplay/libplist.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
win-airplay/libxml2.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
win-airplay/libxml2.dll
Resource
win10v2004-20240802-en
General
-
Target
win-airplay/Bonjour64.msi
-
Size
2.6MB
-
MD5
8dcf5c9eaacdaf4568220d103f393dea
-
SHA1
27f68596398b68ba048f95752b4eeb4aa013c23f
-
SHA256
53be81cc6e2dc95a1041e8f3d8f500fad4259ab20a1aac151b5fc7a64d354a93
-
SHA512
10f8ffb6fa5e7163f0a83190ddf211479f12e16635389b49ac041eceafd7f04c040d830065adc89b1003f38d8381851c09150a5bc8edced6ecae8ee5ae801088
-
SSDEEP
49152:aXMDiLYLW8Rv5GYCRL69MXeixEEgj8HyvftiZikCTcRi3/jP/N/v08Masv8Qo2/:wwPR8YCRLVm
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
msiexec.exeflow pid process 3 3028 msiexec.exe 5 3028 msiexec.exe 7 3028 msiexec.exe 9 3028 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe -
Loads dropped DLL 1 IoCs
Processes:
MsiExec.exepid process 2056 MsiExec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msiexec.exepid process 3028 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 3028 msiexec.exe Token: SeIncreaseQuotaPrivilege 3028 msiexec.exe Token: SeRestorePrivilege 2196 msiexec.exe Token: SeTakeOwnershipPrivilege 2196 msiexec.exe Token: SeSecurityPrivilege 2196 msiexec.exe Token: SeCreateTokenPrivilege 3028 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3028 msiexec.exe Token: SeLockMemoryPrivilege 3028 msiexec.exe Token: SeIncreaseQuotaPrivilege 3028 msiexec.exe Token: SeMachineAccountPrivilege 3028 msiexec.exe Token: SeTcbPrivilege 3028 msiexec.exe Token: SeSecurityPrivilege 3028 msiexec.exe Token: SeTakeOwnershipPrivilege 3028 msiexec.exe Token: SeLoadDriverPrivilege 3028 msiexec.exe Token: SeSystemProfilePrivilege 3028 msiexec.exe Token: SeSystemtimePrivilege 3028 msiexec.exe Token: SeProfSingleProcessPrivilege 3028 msiexec.exe Token: SeIncBasePriorityPrivilege 3028 msiexec.exe Token: SeCreatePagefilePrivilege 3028 msiexec.exe Token: SeCreatePermanentPrivilege 3028 msiexec.exe Token: SeBackupPrivilege 3028 msiexec.exe Token: SeRestorePrivilege 3028 msiexec.exe Token: SeShutdownPrivilege 3028 msiexec.exe Token: SeDebugPrivilege 3028 msiexec.exe Token: SeAuditPrivilege 3028 msiexec.exe Token: SeSystemEnvironmentPrivilege 3028 msiexec.exe Token: SeChangeNotifyPrivilege 3028 msiexec.exe Token: SeRemoteShutdownPrivilege 3028 msiexec.exe Token: SeUndockPrivilege 3028 msiexec.exe Token: SeSyncAgentPrivilege 3028 msiexec.exe Token: SeEnableDelegationPrivilege 3028 msiexec.exe Token: SeManageVolumePrivilege 3028 msiexec.exe Token: SeImpersonatePrivilege 3028 msiexec.exe Token: SeCreateGlobalPrivilege 3028 msiexec.exe Token: SeCreateTokenPrivilege 3028 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3028 msiexec.exe Token: SeLockMemoryPrivilege 3028 msiexec.exe Token: SeIncreaseQuotaPrivilege 3028 msiexec.exe Token: SeMachineAccountPrivilege 3028 msiexec.exe Token: SeTcbPrivilege 3028 msiexec.exe Token: SeSecurityPrivilege 3028 msiexec.exe Token: SeTakeOwnershipPrivilege 3028 msiexec.exe Token: SeLoadDriverPrivilege 3028 msiexec.exe Token: SeSystemProfilePrivilege 3028 msiexec.exe Token: SeSystemtimePrivilege 3028 msiexec.exe Token: SeProfSingleProcessPrivilege 3028 msiexec.exe Token: SeIncBasePriorityPrivilege 3028 msiexec.exe Token: SeCreatePagefilePrivilege 3028 msiexec.exe Token: SeCreatePermanentPrivilege 3028 msiexec.exe Token: SeBackupPrivilege 3028 msiexec.exe Token: SeRestorePrivilege 3028 msiexec.exe Token: SeShutdownPrivilege 3028 msiexec.exe Token: SeDebugPrivilege 3028 msiexec.exe Token: SeAuditPrivilege 3028 msiexec.exe Token: SeSystemEnvironmentPrivilege 3028 msiexec.exe Token: SeChangeNotifyPrivilege 3028 msiexec.exe Token: SeRemoteShutdownPrivilege 3028 msiexec.exe Token: SeUndockPrivilege 3028 msiexec.exe Token: SeSyncAgentPrivilege 3028 msiexec.exe Token: SeEnableDelegationPrivilege 3028 msiexec.exe Token: SeManageVolumePrivilege 3028 msiexec.exe Token: SeImpersonatePrivilege 3028 msiexec.exe Token: SeCreateGlobalPrivilege 3028 msiexec.exe Token: SeCreateTokenPrivilege 3028 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 3028 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
msiexec.exedescription pid process target process PID 2196 wrote to memory of 2056 2196 msiexec.exe MsiExec.exe PID 2196 wrote to memory of 2056 2196 msiexec.exe MsiExec.exe PID 2196 wrote to memory of 2056 2196 msiexec.exe MsiExec.exe PID 2196 wrote to memory of 2056 2196 msiexec.exe MsiExec.exe PID 2196 wrote to memory of 2056 2196 msiexec.exe MsiExec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\win-airplay\Bonjour64.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3028
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding B1BA99868CAD538124F4A581A4D9153C C2⤵
- Loads dropped DLL
PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
75KB
MD508c031fa82a09aae1079378669678fe6
SHA1b109251d2fef08bd446be0c92369e6f11eb67093
SHA2568764d060558a9d4ef24adb43201d5178033171a649ad497f79ce3b6cc8eda98a
SHA512d133a7c02ee8e6e4a971ed4a6537c11cb58516a5ac0501672169805f7b97591d7cffd3a72133bd1df4b8d8a4f4965ddf324a83cd9be0d8af15e646a121e2ea4c
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b