Analysis

  • max time kernel
    92s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 03:07

General

  • Target

    Setup.msi

  • Size

    7.3MB

  • MD5

    560a8e2842ffbdcb9c438ed98c3c7ea2

  • SHA1

    ab0ec461c63a755c81fa3a1ccc534205a3292d74

  • SHA256

    88c3274ceb62c11ee714fcb93e1e43d15ec00f7d2fef0098f2099143b7c7b4a1

  • SHA512

    4f345ff29fb1d7d21ec453e4cf6d1cb58804730ae55eac7372c2ccb3d82faaba42b4158b724b0066c04b39ada94dcfd3c6bffc169148d955e9755e02e938e625

  • SSDEEP

    196608:WQLJ4AtkYDsrLGPlpI0NRqw+ArPcqAcF3Ms2g6me:WQLJ4H6srLx0NRqwrPcqZ8fm

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Setup.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3228
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads