Overview
overview
10Static
static
10VSNKLGuzoF...2).exe
windows7-x64
3VSNKLGuzoF...2).exe
windows10-2004-x64
3VSNKLGuzoF...5w.exe
windows7-x64
3VSNKLGuzoF...5w.exe
windows10-2004-x64
3VideoCodeCX.exe
windows7-x64
10VideoCodeCX.exe
windows10-2004-x64
10WcsPlugInS...ex.exe
windows7-x64
5WcsPlugInS...ex.exe
windows10-2004-x64
7WinLocker Builder.exe
windows7-x64
5WinLocker Builder.exe
windows10-2004-x64
5WinLocker_Builder.exe
windows7-x64
5WinLocker_Builder.exe
windows10-2004-x64
5_003E0000.exe.vir.exe
windows7-x64
9_003E0000.exe.vir.exe
windows10-2004-x64
7vmem02.exe
windows7-x64
3vmem02.exe
windows10-2004-x64
3w8i9eHkHOwWwQlX.exe
windows7-x64
3w8i9eHkHOwWwQlX.exe
windows10-2004-x64
3wpbt0.exe
windows7-x64
10wpbt0.exe
windows10-2004-x64
10xpiofrbtkzhr.exe
windows7-x64
xpiofrbtkzhr.exe
windows10-2004-x64
xxx_video (2).exe
windows7-x64
7xxx_video (2).exe
windows10-2004-x64
7xxx_video.exe
windows7-x64
5xxx_video.exe
windows10-2004-x64
5xxx_video_...vi.exe
windows7-x64
10xxx_video_...vi.exe
windows10-2004-x64
5xxx_video_...ir.exe
windows7-x64
10xxx_video_...ir.exe
windows10-2004-x64
5xxx_video_...ir.exe
windows7-x64
10xxx_video_...ir.exe
windows10-2004-x64
10Analysis
-
max time kernel
93s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 03:48
Behavioral task
behavioral1
Sample
VSNKLGuzoFJgFHyEI15w (2).exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
VSNKLGuzoFJgFHyEI15w (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
VSNKLGuzoFJgFHyEI15w.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
VSNKLGuzoFJgFHyEI15w.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
VideoCodeCX.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
VideoCodeCX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
WcsPlugInService.ex.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
WcsPlugInService.ex.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
WinLocker Builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
WinLocker Builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
WinLocker_Builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
WinLocker_Builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
_003E0000.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
_003E0000.exe.vir.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
vmem02.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
vmem02.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
w8i9eHkHOwWwQlX.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
w8i9eHkHOwWwQlX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
wpbt0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
wpbt0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
xpiofrbtkzhr.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
xpiofrbtkzhr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
xxx_video (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
xxx_video (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
xxx_video.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
xxx_video.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
xxx_video_26726.avi.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
xxx_video_26726.avi.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
xxx_video_35942.avi.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
xxx_video_35942.avi.exe.vir.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
xxx_video_35942.avi_unpacked_.exe.vir.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
xxx_video_35942.avi_unpacked_.exe.vir.exe
Resource
win10v2004-20241007-en
General
-
Target
VideoCodeCX.exe
-
Size
2.0MB
-
MD5
0701e045db5d20c93427b4bb452bc341
-
SHA1
6be9df576ebfed1b2a0b14f2352dceaa36a10c79
-
SHA256
22b1af46ce7b3db0ec037026e035b0b09a6c791e5fb5fcb5e6ee3ef8d276abe1
-
SHA512
40a542dbd44eab6c2f8f6631487be2065692489040632916aaee2d7f24810e4844291b1e6a0e5884362a7ebc534a03a44103465cd1266439107fc5c070c50dfb
-
SSDEEP
49152:EkAG2QGTC5xvMdgpdb1KRzGepUu2cGbq7oc+tuNAn:EkAjQGTCnvMmpEQqUPn
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\Video CodeC X\\Video CodeC X\\bsoderror.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\Video CodeC X\\Video CodeC X\\bsoderror.exe" msiexec.exe -
Loads dropped DLL 16 IoCs
Processes:
VideoCodeCX.exeMsiExec.exeMsiExec.exepid process 4040 VideoCodeCX.exe 4040 VideoCodeCX.exe 3668 MsiExec.exe 3668 MsiExec.exe 3668 MsiExec.exe 3668 MsiExec.exe 3668 MsiExec.exe 3668 MsiExec.exe 3668 MsiExec.exe 3668 MsiExec.exe 3668 MsiExec.exe 3668 MsiExec.exe 2788 MsiExec.exe 3668 MsiExec.exe 4040 VideoCodeCX.exe 3668 MsiExec.exe -
Blocklisted process makes network request 1 IoCs
Processes:
MsiExec.exeflow pid process 14 3668 MsiExec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exeVideoCodeCX.exedescription ioc process File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: VideoCodeCX.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\E: VideoCodeCX.exe File opened (read-only) \??\M: VideoCodeCX.exe File opened (read-only) \??\W: VideoCodeCX.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\V: VideoCodeCX.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: VideoCodeCX.exe File opened (read-only) \??\J: VideoCodeCX.exe File opened (read-only) \??\X: VideoCodeCX.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: VideoCodeCX.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\K: VideoCodeCX.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: VideoCodeCX.exe File opened (read-only) \??\O: VideoCodeCX.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\T: VideoCodeCX.exe File opened (read-only) \??\U: VideoCodeCX.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: VideoCodeCX.exe File opened (read-only) \??\L: VideoCodeCX.exe File opened (read-only) \??\Z: VideoCodeCX.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\A: VideoCodeCX.exe File opened (read-only) \??\B: VideoCodeCX.exe File opened (read-only) \??\R: VideoCodeCX.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Drops file in Program Files directory 1 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files (x86)\Video CodeC X\Video CodeC X\bsoderror.exe msiexec.exe -
Drops file in Windows directory 24 IoCs
Processes:
msiexec.exeMsiExec.exedescription ioc process File created C:\Windows\Installer\SourceHash{E0D1DECF-00EC-4661-8C58-C5079F1CBFAF} msiexec.exe File opened for modification C:\Windows\Installer\MSI8688.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI86D7.tmp msiexec.exe File opened for modification C:\Windows\Installer\{E0D1DECF-00EC-4661-8C58-C5079F1CBFAF}\_itunes.exe msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI83B0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI84CC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI84FC.tmp msiexec.exe File created C:\Windows\Installer\{E0D1DECF-00EC-4661-8C58-C5079F1CBFAF}\_itunes.exe msiexec.exe File opened for modification C:\Windows\Installer\e5f82f4.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI840F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI857B.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI886F.tmp msiexec.exe File created C:\Windows\Installer\e5f82f8.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI8618.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI87E1.tmp msiexec.exe File created C:\Windows\Tasks\you to.job MsiExec.exe File opened for modification C:\Windows\Installer\MSI88ED.tmp msiexec.exe File created C:\Windows\Installer\e5f82f4.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI847D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI853B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8638.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MsiExec.exeMsiExec.exeVideoCodeCX.exemsiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VideoCodeCX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
msiexec.exedescription ioc process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
Modifies registry class 24 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\ProductName = "Video CodeC X" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\3E0321A03BE396449BC7FFF3E123BAC2 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\ProductIcon = "C:\\Windows\\Installer\\{E0D1DECF-00EC-4661-8C58-C5079F1CBFAF}\\_itunes.exe" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\3E0321A03BE396449BC7FFF3E123BAC2\FCED1D0ECE001664C8855C70F9C1FBFA msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\FCED1D0ECE001664C8855C70F9C1FBFA msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\Version = "33554432" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\Video CodeC X\\Video CodeC X 2.0.0.0\\install\\F1CBFAF\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\PackageCode = "6363F740F6E08EF4E84656D164D38A57" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\Video CodeC X\\Video CodeC X 2.0.0.0\\install\\F1CBFAF\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\FCED1D0ECE001664C8855C70F9C1FBFA\MainFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\SourceList\PackageName = "Video CodeC X.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\FCED1D0ECE001664C8855C70F9C1FBFA\SourceList\Media\DiskPrompt = "[1]" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msiexec.exepid process 3028 msiexec.exe 3028 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exeVideoCodeCX.exemsiexec.exedescription pid process Token: SeSecurityPrivilege 3028 msiexec.exe Token: SeCreateTokenPrivilege 4040 VideoCodeCX.exe Token: SeAssignPrimaryTokenPrivilege 4040 VideoCodeCX.exe Token: SeLockMemoryPrivilege 4040 VideoCodeCX.exe Token: SeIncreaseQuotaPrivilege 4040 VideoCodeCX.exe Token: SeMachineAccountPrivilege 4040 VideoCodeCX.exe Token: SeTcbPrivilege 4040 VideoCodeCX.exe Token: SeSecurityPrivilege 4040 VideoCodeCX.exe Token: SeTakeOwnershipPrivilege 4040 VideoCodeCX.exe Token: SeLoadDriverPrivilege 4040 VideoCodeCX.exe Token: SeSystemProfilePrivilege 4040 VideoCodeCX.exe Token: SeSystemtimePrivilege 4040 VideoCodeCX.exe Token: SeProfSingleProcessPrivilege 4040 VideoCodeCX.exe Token: SeIncBasePriorityPrivilege 4040 VideoCodeCX.exe Token: SeCreatePagefilePrivilege 4040 VideoCodeCX.exe Token: SeCreatePermanentPrivilege 4040 VideoCodeCX.exe Token: SeBackupPrivilege 4040 VideoCodeCX.exe Token: SeRestorePrivilege 4040 VideoCodeCX.exe Token: SeShutdownPrivilege 4040 VideoCodeCX.exe Token: SeDebugPrivilege 4040 VideoCodeCX.exe Token: SeAuditPrivilege 4040 VideoCodeCX.exe Token: SeSystemEnvironmentPrivilege 4040 VideoCodeCX.exe Token: SeChangeNotifyPrivilege 4040 VideoCodeCX.exe Token: SeRemoteShutdownPrivilege 4040 VideoCodeCX.exe Token: SeUndockPrivilege 4040 VideoCodeCX.exe Token: SeSyncAgentPrivilege 4040 VideoCodeCX.exe Token: SeEnableDelegationPrivilege 4040 VideoCodeCX.exe Token: SeManageVolumePrivilege 4040 VideoCodeCX.exe Token: SeImpersonatePrivilege 4040 VideoCodeCX.exe Token: SeCreateGlobalPrivilege 4040 VideoCodeCX.exe Token: SeShutdownPrivilege 4540 msiexec.exe Token: SeIncreaseQuotaPrivilege 4540 msiexec.exe Token: SeCreateTokenPrivilege 4540 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4540 msiexec.exe Token: SeLockMemoryPrivilege 4540 msiexec.exe Token: SeIncreaseQuotaPrivilege 4540 msiexec.exe Token: SeMachineAccountPrivilege 4540 msiexec.exe Token: SeTcbPrivilege 4540 msiexec.exe Token: SeSecurityPrivilege 4540 msiexec.exe Token: SeTakeOwnershipPrivilege 4540 msiexec.exe Token: SeLoadDriverPrivilege 4540 msiexec.exe Token: SeSystemProfilePrivilege 4540 msiexec.exe Token: SeSystemtimePrivilege 4540 msiexec.exe Token: SeProfSingleProcessPrivilege 4540 msiexec.exe Token: SeIncBasePriorityPrivilege 4540 msiexec.exe Token: SeCreatePagefilePrivilege 4540 msiexec.exe Token: SeCreatePermanentPrivilege 4540 msiexec.exe Token: SeBackupPrivilege 4540 msiexec.exe Token: SeRestorePrivilege 4540 msiexec.exe Token: SeShutdownPrivilege 4540 msiexec.exe Token: SeDebugPrivilege 4540 msiexec.exe Token: SeAuditPrivilege 4540 msiexec.exe Token: SeSystemEnvironmentPrivilege 4540 msiexec.exe Token: SeChangeNotifyPrivilege 4540 msiexec.exe Token: SeRemoteShutdownPrivilege 4540 msiexec.exe Token: SeUndockPrivilege 4540 msiexec.exe Token: SeSyncAgentPrivilege 4540 msiexec.exe Token: SeEnableDelegationPrivilege 4540 msiexec.exe Token: SeManageVolumePrivilege 4540 msiexec.exe Token: SeImpersonatePrivilege 4540 msiexec.exe Token: SeCreateGlobalPrivilege 4540 msiexec.exe Token: SeRestorePrivilege 3028 msiexec.exe Token: SeTakeOwnershipPrivilege 3028 msiexec.exe Token: SeRestorePrivilege 3028 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 4540 msiexec.exe 4540 msiexec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
VideoCodeCX.exemsiexec.exedescription pid process target process PID 4040 wrote to memory of 4540 4040 VideoCodeCX.exe msiexec.exe PID 4040 wrote to memory of 4540 4040 VideoCodeCX.exe msiexec.exe PID 4040 wrote to memory of 4540 4040 VideoCodeCX.exe msiexec.exe PID 3028 wrote to memory of 3668 3028 msiexec.exe MsiExec.exe PID 3028 wrote to memory of 3668 3028 msiexec.exe MsiExec.exe PID 3028 wrote to memory of 3668 3028 msiexec.exe MsiExec.exe PID 3028 wrote to memory of 2788 3028 msiexec.exe MsiExec.exe PID 3028 wrote to memory of 2788 3028 msiexec.exe MsiExec.exe PID 3028 wrote to memory of 2788 3028 msiexec.exe MsiExec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\VideoCodeCX.exe"C:\Users\Admin\AppData\Local\Temp\VideoCodeCX.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Video CodeC X\Video CodeC X 2.0.0.0\install\F1CBFAF\Video CodeC X.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\VideoCodeCX.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4540
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Modifies WinLogon for persistence
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0BB8B8EB267849856B4B119C0B1B06B72⤵
- Loads dropped DLL
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 89638F01A24B98B62329D46935105515 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD59cac17273658439b3dc92b8a64ce417c
SHA1768b13ea4dcfa4b436aebcfa1c1578bb4811b687
SHA2565131f7ff9941787015cde7c71292b47a30652e092e274d7b9de8be296ba2f8b1
SHA5127ceb234e45952698dc878eb38971670779b4928365cf11f31648474a66f704138ca3070b0f6016c1be04314edc99d6e46c29819e77cb40737ad75c28e5083a3b
-
Filesize
84B
MD54bba3dd86d894af26b3297b57b0b5f4c
SHA1ce4754a670bb7d328aaa0e5413f092cbcf347974
SHA2564d73987d5f3b0d7fd4ff4858aa36d560cbc4557cefa97cd0e01f5f89a100de31
SHA512064b50c6335238e3efab5cb63579b8d96a97270c2eafc80c407caf79ffb1a279335b728e01096f3f6ef144d63d035dac4a26a53f429b7a0272a35cf887ddd13f
-
Filesize
84B
MD530be5764b3a04f2a4e2b33ccfb2dbea3
SHA15a724b3325e3dc5d66ab3b0e7c03b55f5184a741
SHA256d1e026846532605cb1f9a1104389cde38a28860145accdba48ee6bcd5e9d2541
SHA512ce22de370ca513301fab5f708878a651be5bc0f33a25c61a8cb3555e180c99932205af8c7561da438e23eec95033d0241c2aff69b857eb99de0dc37656319756
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Video CodeC X\2.0.0.0\{478BFC75-0CD1-4B9B-BDB9-69ABE01EA334}.session
Filesize5KB
MD58d22028b170b86ae5d0cd9a37894dfa5
SHA13378a6884868c07bbb89795b2e64cf2e0e3f6636
SHA2562e16465352cd5d711625963250d19eb29f61af0fea7afc82e4a985ae2e269aa1
SHA512d71e0d8ada53de2fa4ec4f9b92b3d22d2b1e7e95eead48b7e46c8c27561962e449e90a2e56aee3efbba659c6bdf04b8ce04b60eac47d5b17002bfe2257598a32
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Video CodeC X\2.0.0.0\{478BFC75-0CD1-4B9B-BDB9-69ABE01EA334}.session
Filesize3KB
MD5bdf62265f7e837a1ba38416b3a92ad57
SHA11d2dcb75d756225bbb78445e94fee31a3bf9c188
SHA256a1ad239b9cac3d85badc0d277fa01a6938b36166b3d9e691ece41552118c7838
SHA5120733176280b17b49ed1de8b2ddb4e5d9586ec308ef526b50b1e2beb767a846f2fbbc7bb442f2273cd2c6d9af47f85a3dee6bfb3384e942e4aadc1ef2465b2c7a
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Video CodeC X\2.0.0.0\{478BFC75-0CD1-4B9B-BDB9-69ABE01EA334}.session
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Video CodeC X\Video CodeC X 2.0.0.0\install\F1CBFAF\Video CodeC X.msi
Filesize1.1MB
MD55a62fc6cb914c167550b337e86e8a933
SHA17a6bf8f179aed33057a694966b45a7928f1698b7
SHA256f32c666abd8d50bce93391840de7c8d9969b75d42aea3bee61d68be411e3ffe3
SHA5126a64db837e86eed6b2227b6e3df35a1f9f761cac890ea1475a1c42ec4c511bd3a622737ccfd133a5682c0ca226d046dfb60140c7001be40c574e41f10df396b9
-
Filesize
84KB
MD5ea3ad4540a9411f051d52788dde2cb53
SHA1641e87b35a4d31d41a1bb842190e6cd830ddea63
SHA2563b5d9aadfdb9c1257ef84e33cdad67cd818334ec8fd40e0968b8b71e2a0eef95
SHA5122f39c3caaf28b2ca592f6268ae0750fa36ecf9eeceaf3a1846162914129a794c0c0224cc7e6c6e55cc2f0b65a18d3e2c1c9bc86252799635e22f4c50ce196c33
-
Filesize
126KB
MD53531cf7755b16d38d5e9e3c43280e7d2
SHA119981b17ae35b6e9a0007551e69d3e50aa1afffe
SHA25676133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089
SHA5127b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd
-
Filesize
88KB
MD54083cb0f45a747d8e8ab0d3e060616f2
SHA1dcec8efa7a15fa432af2ea0445c4b346fef2a4d6
SHA256252b7423b01ff81aea6fe7b40de91abf49f515e9c0c7b95aa982756889f8ac1a
SHA51226f8949cad02334f9942fda8509579303b81b11bc052a962c5c31a7c6c54a1c96957f30ee241c2206d496d2c519d750d7f6a12b52afdb282fa706f9fee385133
-
Filesize
180KB
MD5d552dd4108b5665d306b4a8bd6083dde
SHA1dae55ccba7adb6690b27fa9623eeeed7a57f8da1
SHA256a0367875b68b1699d2647a748278ebce64d5be633598580977aa126a81cf57c5
SHA512e5545a97014b5952e15bb321135f65c0e24414f8dd606fe454fd2d048d3f769b9318df7cfb2a6bf932eb2bf6d79811b93cb2008115deb0f0fa9db07f32a70969
-
Filesize
96KB
MD53cab78d0dc84883be2335788d387601e
SHA114745df9595f190008c7e5c190660361f998d824
SHA256604e79fe970c5ed044517a9a35e4690ea6f7d959d21173ebef45cdd3d3a22bdd
SHA512df6b49f2b5cddebd7e23e81b0f89e4883fc12d95735a9b3f84d2f402f4996c54b5fdea8adb9eaa98e8c973b089656d18d6b322bd71cb42d7807f7fa8a7348820
-
Filesize
128KB
MD57e6b88f7bb59ec4573711255f60656b5
SHA15e7a159825a2d2cb263a161e247e9db93454d4f6
SHA25659ff5bc12b155cc2e666bd8bc34195c3750eb742542374fc5e53fb22d11e862f
SHA512294a379c99403f928d476e04668717cdabc7dc3e33bcf6bcad5c3d93d4268971811ff7303aa5b4b2ed2b59d59c8eba350a9a30888d4b5b3064708521ac21439c
-
Filesize
312KB
MD5aa82345a8f360804ea1d8d935f0377aa
SHA1c09cf3b1666d9192fa524c801bb2e3542c0840e2
SHA2569c155d4214cebda186647c035ada552963dcac8f88a6b38a23ea34f9ecd1d437
SHA512c051a381d87ba933ea7929c899fb01af2207cb2462dcb2b55c28cff65596b27bdb05a48207624eeea40fddb85003133ad7af09ca93cfb2426c155daea5a9a6db