Analysis
-
max time kernel
33s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
iTunes64Setup.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
iTunes64Setup.exe
Resource
win10v2004-20241007-en
General
-
Target
iTunes64Setup.exe
-
Size
202.0MB
-
MD5
6f5b5621639479d86dd0b3fb3e4ba12a
-
SHA1
2ca88d8561f9d4395a3cc00aeed5bae2799c2924
-
SHA256
b3d7c02032ae6ae3649914f70803e21f791b5399e2ff201fbcefad1dc059c192
-
SHA512
f1d35a246e353452806c3b00690fd4872b850238582a0178616c6100bee00b4abd1de1af06c5cb815055268a07078579831f5f570b0a82459b3992e3ca51c88c
-
SSDEEP
6291456:e8V6CMvnzMNS2K8ejC0XbllKuplC8nE4VTDd:ZMzvINS22O0XZ1nVTDd
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2836 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe -
Loads dropped DLL 1 IoCs
pid Process 3000 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2780 iTunes64Setup.exe Token: SeIncBasePriorityPrivilege 2780 iTunes64Setup.exe Token: SeShutdownPrivilege 2836 msiexec.exe Token: SeIncreaseQuotaPrivilege 2836 msiexec.exe Token: SeRestorePrivilege 344 msiexec.exe Token: SeTakeOwnershipPrivilege 344 msiexec.exe Token: SeSecurityPrivilege 344 msiexec.exe Token: SeCreateTokenPrivilege 2836 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2836 msiexec.exe Token: SeLockMemoryPrivilege 2836 msiexec.exe Token: SeIncreaseQuotaPrivilege 2836 msiexec.exe Token: SeMachineAccountPrivilege 2836 msiexec.exe Token: SeTcbPrivilege 2836 msiexec.exe Token: SeSecurityPrivilege 2836 msiexec.exe Token: SeTakeOwnershipPrivilege 2836 msiexec.exe Token: SeLoadDriverPrivilege 2836 msiexec.exe Token: SeSystemProfilePrivilege 2836 msiexec.exe Token: SeSystemtimePrivilege 2836 msiexec.exe Token: SeProfSingleProcessPrivilege 2836 msiexec.exe Token: SeIncBasePriorityPrivilege 2836 msiexec.exe Token: SeCreatePagefilePrivilege 2836 msiexec.exe Token: SeCreatePermanentPrivilege 2836 msiexec.exe Token: SeBackupPrivilege 2836 msiexec.exe Token: SeRestorePrivilege 2836 msiexec.exe Token: SeShutdownPrivilege 2836 msiexec.exe Token: SeDebugPrivilege 2836 msiexec.exe Token: SeAuditPrivilege 2836 msiexec.exe Token: SeSystemEnvironmentPrivilege 2836 msiexec.exe Token: SeChangeNotifyPrivilege 2836 msiexec.exe Token: SeRemoteShutdownPrivilege 2836 msiexec.exe Token: SeUndockPrivilege 2836 msiexec.exe Token: SeSyncAgentPrivilege 2836 msiexec.exe Token: SeEnableDelegationPrivilege 2836 msiexec.exe Token: SeManageVolumePrivilege 2836 msiexec.exe Token: SeImpersonatePrivilege 2836 msiexec.exe Token: SeCreateGlobalPrivilege 2836 msiexec.exe Token: SeCreateTokenPrivilege 2836 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2836 msiexec.exe Token: SeLockMemoryPrivilege 2836 msiexec.exe Token: SeIncreaseQuotaPrivilege 2836 msiexec.exe Token: SeMachineAccountPrivilege 2836 msiexec.exe Token: SeTcbPrivilege 2836 msiexec.exe Token: SeSecurityPrivilege 2836 msiexec.exe Token: SeTakeOwnershipPrivilege 2836 msiexec.exe Token: SeLoadDriverPrivilege 2836 msiexec.exe Token: SeSystemProfilePrivilege 2836 msiexec.exe Token: SeSystemtimePrivilege 2836 msiexec.exe Token: SeProfSingleProcessPrivilege 2836 msiexec.exe Token: SeIncBasePriorityPrivilege 2836 msiexec.exe Token: SeCreatePagefilePrivilege 2836 msiexec.exe Token: SeCreatePermanentPrivilege 2836 msiexec.exe Token: SeBackupPrivilege 2836 msiexec.exe Token: SeRestorePrivilege 2836 msiexec.exe Token: SeShutdownPrivilege 2836 msiexec.exe Token: SeDebugPrivilege 2836 msiexec.exe Token: SeAuditPrivilege 2836 msiexec.exe Token: SeSystemEnvironmentPrivilege 2836 msiexec.exe Token: SeChangeNotifyPrivilege 2836 msiexec.exe Token: SeRemoteShutdownPrivilege 2836 msiexec.exe Token: SeUndockPrivilege 2836 msiexec.exe Token: SeSyncAgentPrivilege 2836 msiexec.exe Token: SeEnableDelegationPrivilege 2836 msiexec.exe Token: SeManageVolumePrivilege 2836 msiexec.exe Token: SeImpersonatePrivilege 2836 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2836 msiexec.exe 2836 msiexec.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2836 2780 iTunes64Setup.exe 30 PID 2780 wrote to memory of 2836 2780 iTunes64Setup.exe 30 PID 2780 wrote to memory of 2836 2780 iTunes64Setup.exe 30 PID 2780 wrote to memory of 2836 2780 iTunes64Setup.exe 30 PID 2780 wrote to memory of 2836 2780 iTunes64Setup.exe 30 PID 344 wrote to memory of 3000 344 msiexec.exe 32 PID 344 wrote to memory of 3000 344 msiexec.exe 32 PID 344 wrote to memory of 3000 344 msiexec.exe 32 PID 344 wrote to memory of 3000 344 msiexec.exe 32 PID 344 wrote to memory of 3000 344 msiexec.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\iTunes64Setup.exe"C:\Users\Admin\AppData\Local\Temp\iTunes64Setup.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\IXP732.TMP\iTunes64.msi" INSTALL_SUPPORT_PACKAGES=12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2836
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding F846C7B66352494EF50E381585DCAA20 C2⤵
- Loads dropped DLL
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
205KB
MD5f1744d984e68dff3a3d163aa6fa04330
SHA12d461feb85a264e890876baa17fb784848e5a77c
SHA256ee4774ab38a39d5bbf7ad620a9b3c1b8fce11b11740566de4eb88919e10a748a
SHA512bd49847322e9ddc8c7ede601ee7f4858facd92ff255b421eee986a904da06c9219fd73e3e1cd94f4878365afa19a528bab492d813e8656060f332aa0cdd3c483
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b