Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.BankerX-gen.19615.2790.msi
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.BankerX-gen.19615.2790.msi
Resource
win10v2004-20240802-en
General
-
Target
SecuriteInfo.com.Win32.BankerX-gen.19615.2790.msi
-
Size
56.0MB
-
MD5
021cf3a2f8a6d56d2980e89146d0607f
-
SHA1
af56cbfdb1438b19c095c894f319770b5bf950bd
-
SHA256
6e1b6babc7f24dd81c7742ebe346792075f050590e06ccc329ecc27013686617
-
SHA512
84fe62ad73c09aeea685849335c7704dd5b520709b4f6a58ae504bc3c692a33711be60152bac3cb6a0d33dfe154de24916aff748eed12e7571b54aed4559ba92
-
SSDEEP
1572864:qcOAck5STQ+F2zGtdFFNuyr95RvoO0PkdjVUERjUqpDy9i5hq:qFk5qQ+2zAZAcuBPEjVUERIqpDy9i5hq
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe -
Loads dropped DLL 2 IoCs
pid Process 2836 MsiExec.exe 2836 MsiExec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 3016 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3016 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3016 msiexec.exe Token: SeIncreaseQuotaPrivilege 3016 msiexec.exe Token: SeRestorePrivilege 2216 msiexec.exe Token: SeTakeOwnershipPrivilege 2216 msiexec.exe Token: SeSecurityPrivilege 2216 msiexec.exe Token: SeCreateTokenPrivilege 3016 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3016 msiexec.exe Token: SeLockMemoryPrivilege 3016 msiexec.exe Token: SeIncreaseQuotaPrivilege 3016 msiexec.exe Token: SeMachineAccountPrivilege 3016 msiexec.exe Token: SeTcbPrivilege 3016 msiexec.exe Token: SeSecurityPrivilege 3016 msiexec.exe Token: SeTakeOwnershipPrivilege 3016 msiexec.exe Token: SeLoadDriverPrivilege 3016 msiexec.exe Token: SeSystemProfilePrivilege 3016 msiexec.exe Token: SeSystemtimePrivilege 3016 msiexec.exe Token: SeProfSingleProcessPrivilege 3016 msiexec.exe Token: SeIncBasePriorityPrivilege 3016 msiexec.exe Token: SeCreatePagefilePrivilege 3016 msiexec.exe Token: SeCreatePermanentPrivilege 3016 msiexec.exe Token: SeBackupPrivilege 3016 msiexec.exe Token: SeRestorePrivilege 3016 msiexec.exe Token: SeShutdownPrivilege 3016 msiexec.exe Token: SeDebugPrivilege 3016 msiexec.exe Token: SeAuditPrivilege 3016 msiexec.exe Token: SeSystemEnvironmentPrivilege 3016 msiexec.exe Token: SeChangeNotifyPrivilege 3016 msiexec.exe Token: SeRemoteShutdownPrivilege 3016 msiexec.exe Token: SeUndockPrivilege 3016 msiexec.exe Token: SeSyncAgentPrivilege 3016 msiexec.exe Token: SeEnableDelegationPrivilege 3016 msiexec.exe Token: SeManageVolumePrivilege 3016 msiexec.exe Token: SeImpersonatePrivilege 3016 msiexec.exe Token: SeCreateGlobalPrivilege 3016 msiexec.exe Token: SeCreateTokenPrivilege 3016 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3016 msiexec.exe Token: SeLockMemoryPrivilege 3016 msiexec.exe Token: SeIncreaseQuotaPrivilege 3016 msiexec.exe Token: SeMachineAccountPrivilege 3016 msiexec.exe Token: SeTcbPrivilege 3016 msiexec.exe Token: SeSecurityPrivilege 3016 msiexec.exe Token: SeTakeOwnershipPrivilege 3016 msiexec.exe Token: SeLoadDriverPrivilege 3016 msiexec.exe Token: SeSystemProfilePrivilege 3016 msiexec.exe Token: SeSystemtimePrivilege 3016 msiexec.exe Token: SeProfSingleProcessPrivilege 3016 msiexec.exe Token: SeIncBasePriorityPrivilege 3016 msiexec.exe Token: SeCreatePagefilePrivilege 3016 msiexec.exe Token: SeCreatePermanentPrivilege 3016 msiexec.exe Token: SeBackupPrivilege 3016 msiexec.exe Token: SeRestorePrivilege 3016 msiexec.exe Token: SeShutdownPrivilege 3016 msiexec.exe Token: SeDebugPrivilege 3016 msiexec.exe Token: SeAuditPrivilege 3016 msiexec.exe Token: SeSystemEnvironmentPrivilege 3016 msiexec.exe Token: SeChangeNotifyPrivilege 3016 msiexec.exe Token: SeRemoteShutdownPrivilege 3016 msiexec.exe Token: SeUndockPrivilege 3016 msiexec.exe Token: SeSyncAgentPrivilege 3016 msiexec.exe Token: SeEnableDelegationPrivilege 3016 msiexec.exe Token: SeManageVolumePrivilege 3016 msiexec.exe Token: SeImpersonatePrivilege 3016 msiexec.exe Token: SeCreateGlobalPrivilege 3016 msiexec.exe Token: SeCreateTokenPrivilege 3016 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2836 2216 msiexec.exe 31 PID 2216 wrote to memory of 2836 2216 msiexec.exe 31 PID 2216 wrote to memory of 2836 2216 msiexec.exe 31 PID 2216 wrote to memory of 2836 2216 msiexec.exe 31 PID 2216 wrote to memory of 2836 2216 msiexec.exe 31 PID 2216 wrote to memory of 2836 2216 msiexec.exe 31 PID 2216 wrote to memory of 2836 2216 msiexec.exe 31
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BankerX-gen.19615.2790.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3016
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 56B66E9FE9290F59A0FDA4DC8C4796B2 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD59a4968fe67c177850163deafec64d0a6
SHA115b3f837c4f066cface8b3535a88523d20e5ca5c
SHA256441d8c2ee1b434e21b7a8547f3c9e8b5b654ed7c790372d7870c8071d3a9b6ab
SHA512256d1173b794bda93adece3bf2689c6875a67a8690139587c271f5c7a45f2a397caf164a4a05f34c9710ce65c7f473243c05be35155d130406999a834fc7643f