Analysis
-
max time kernel
1794s -
max time network
1803s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-es -
resource tags
arch:x64arch:x86image:win10v2004-20240802-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
28-09-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
Eufonia-Client-windows-x86_64.msi
Resource
win7-20240903-es
windows7-x64
23 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Eufonia-Client-windows-x86_64.msi
Resource
win10v2004-20240802-es
windows10-2004-x64
4 signatures
1800 seconds
General
-
Target
Eufonia-Client-windows-x86_64.msi
-
Size
29.5MB
-
MD5
043c5c1502dc00487a1dfd99b62732b2
-
SHA1
67c284c5852bd2af91a55ec5d08f792de666e0bb
-
SHA256
bb55abbc7bb2f87fcf349d3483497c76f8c9fb2923fe54f9d8c662fdc57a8c5a
-
SHA512
8ae98e4bae3299095e9b3d668f5cea7155cc0eab471be6fbd278b15593fd79dda4de5ff45554ffeca5b5cfc0e8f4c6194acb55e12d18a2eeeb8596e4dbd8ed08
-
SSDEEP
786432:GVuXoaq7A/9YtfMYsdBV05XO7rNBGFwgNE9H6F1Ioy:GUXoaqmQzYKO7poFBk6Lc
Score
6/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 3160 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 3160 msiexec.exe Token: SeIncreaseQuotaPrivilege 3160 msiexec.exe Token: SeSecurityPrivilege 4640 msiexec.exe Token: SeCreateTokenPrivilege 3160 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3160 msiexec.exe Token: SeLockMemoryPrivilege 3160 msiexec.exe Token: SeIncreaseQuotaPrivilege 3160 msiexec.exe Token: SeMachineAccountPrivilege 3160 msiexec.exe Token: SeTcbPrivilege 3160 msiexec.exe Token: SeSecurityPrivilege 3160 msiexec.exe Token: SeTakeOwnershipPrivilege 3160 msiexec.exe Token: SeLoadDriverPrivilege 3160 msiexec.exe Token: SeSystemProfilePrivilege 3160 msiexec.exe Token: SeSystemtimePrivilege 3160 msiexec.exe Token: SeProfSingleProcessPrivilege 3160 msiexec.exe Token: SeIncBasePriorityPrivilege 3160 msiexec.exe Token: SeCreatePagefilePrivilege 3160 msiexec.exe Token: SeCreatePermanentPrivilege 3160 msiexec.exe Token: SeBackupPrivilege 3160 msiexec.exe Token: SeRestorePrivilege 3160 msiexec.exe Token: SeShutdownPrivilege 3160 msiexec.exe Token: SeDebugPrivilege 3160 msiexec.exe Token: SeAuditPrivilege 3160 msiexec.exe Token: SeSystemEnvironmentPrivilege 3160 msiexec.exe Token: SeChangeNotifyPrivilege 3160 msiexec.exe Token: SeRemoteShutdownPrivilege 3160 msiexec.exe Token: SeUndockPrivilege 3160 msiexec.exe Token: SeSyncAgentPrivilege 3160 msiexec.exe Token: SeEnableDelegationPrivilege 3160 msiexec.exe Token: SeManageVolumePrivilege 3160 msiexec.exe Token: SeImpersonatePrivilege 3160 msiexec.exe Token: SeCreateGlobalPrivilege 3160 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3160 msiexec.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Eufonia-Client-windows-x86_64.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3160
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --field-trial-handle=1304,i,15554696853514343836,10056627555468107043,262144 --variations-seed-version --mojo-platform-channel-handle=4296 /prefetch:81⤵PID:1708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --field-trial-handle=4188,i,15554696853514343836,10056627555468107043,262144 --variations-seed-version --mojo-platform-channel-handle=4024 /prefetch:81⤵PID:5096