Analysis

  • max time kernel
    134s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 03:14

General

  • Target

    BaZiShare.msi

  • Size

    10.0MB

  • MD5

    09f211aebd16341977709857bf4bbf8e

  • SHA1

    0671f642a4de089568a1e0cf2af9db652fd6de35

  • SHA256

    3e9c26b5cbad549d385bf61b1cb57e2e1982b59d676b4a6ea694e8b3a2e10cd0

  • SHA512

    d73518cc5de006dcad04e95be4699c4aaabedbc5ed3bd0efa9055e1c3cd3e344906506482adb835dd4dda06b460574122e1e3e857cb3667fb765e525bfe27ca8

  • SSDEEP

    196608:z/0BW30A29LpkxX4vMeSP2zbT748D4TARcnwQxqjPAGaX2hhDK32Lk9+5BBCu:zsBW3CKIf1b/JcnwQnGaGhdlDPCu

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\BaZiShare.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1380
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 1D8B43973C14C47E7DAB07E7B9FDCC03 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI9B27.tmp

    Filesize

    14KB

    MD5

    501bd70081bb1b9d52a3c5add8cf7dbc

    SHA1

    d1e4aec6344a9e59eb1dba19c86a0de5b89149b1

    SHA256

    981241a06e2633f07dde24bc3a8fa2eb4bc87b9261bbb4be2453e31a820868a0

    SHA512

    cf68e064acd3af314b0f50c45dfad92227550ab7c57e065ced68fa83c6937262cc9538c1cf6198ec960bb0fa800d0308a92acd41fe5642ba22e6ce560c1de891