Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
d829e97999e1fb03880dc321b0a331937e18b9aa0ee08ca3ab189ce8f410cba1.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d829e97999e1fb03880dc321b0a331937e18b9aa0ee08ca3ab189ce8f410cba1.msi
Resource
win10v2004-20241007-en
General
-
Target
d829e97999e1fb03880dc321b0a331937e18b9aa0ee08ca3ab189ce8f410cba1.msi
-
Size
88.1MB
-
MD5
35e04cd304b5cb510dd3e0ad154811bc
-
SHA1
cee9a92ad938ff9e3074356ced22c30bf3902378
-
SHA256
d829e97999e1fb03880dc321b0a331937e18b9aa0ee08ca3ab189ce8f410cba1
-
SHA512
be40162927e06e071dac23c057afbeb7c33c64b433fb1445ba73da5f656f09aa97c2e95798be4b5b19f964803fb7942a34e58222c9823a890f8e890af4538354
-
SSDEEP
1572864:gMDsZW2KfoM2J0s2nMqZ5Nhy+cWev3mZuHshbCLPyZAoOw8mMvxIQPm0MVp0:FIZW2KQWntH6+cXvjKbCLPyWol8myxh/
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0005000000019467-76.dat purplefox_rootkit behavioral1/memory/2508-84-0x00000000001F0000-0x00000000004CD000-memory.dmp purplefox_rootkit -
Purplefox family
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\GoogleUpdata_Service = "C:\\programdata\\Mylnk\\down.lnk" {A18BB0CE-F9A6-475e-AF46-4F0C298EDEE2}.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\GoogleUpdeta_Service = "C:\\Users\\Admin\\2529C59D-0E0D-4391-8E68-0000470DD342\\down.exe" {6076B8C5-7C77-4369-A384-683039AEFC75}.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\R: msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2416 set thread context of 2508 2416 down.exe 39 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\LineInstaller\LineInstaller\LineInstaller\1000417_baidusem_bianfengguandan.exe msiexec.exe File created C:\Program Files (x86)\LineInstaller\LineInstaller\LineInstaller\LineInst.exe msiexec.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI9BC3.tmp msiexec.exe File created C:\Windows\Installer\f769b28.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIA0B5.tmp msiexec.exe File opened for modification C:\Windows\Installer\f769b28.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\f769b27.msi msiexec.exe File opened for modification C:\Windows\Installer\f769b27.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI9CEC.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Executes dropped EXE 5 IoCs
pid Process 2416 down.exe 2028 down.exe 1620 {A18BB0CE-F9A6-475e-AF46-4F0C298EDEE2}.exe 2700 {6076B8C5-7C77-4369-A384-683039AEFC75}.exe 1700 LineInst.exe -
Loads dropped DLL 21 IoCs
pid Process 2600 MsiExec.exe 2600 MsiExec.exe 2600 MsiExec.exe 2600 MsiExec.exe 2600 MsiExec.exe 2840 MsiExec.exe 2864 MsiExec.exe 2864 MsiExec.exe 2864 MsiExec.exe 2864 MsiExec.exe 2416 down.exe 2416 down.exe 2416 down.exe 2416 down.exe 2416 down.exe 2028 down.exe 2028 down.exe 2028 down.exe 2028 down.exe 2028 down.exe 2600 MsiExec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2824 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A18BB0CE-F9A6-475e-AF46-4F0C298EDEE2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6076B8C5-7C77-4369-A384-683039AEFC75}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LineInst.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\EditFlags = "1732974280" {A18BB0CE-F9A6-475e-AF46-4F0C298EDEE2}.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2140 msiexec.exe 2140 msiexec.exe 2864 MsiExec.exe 2864 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2824 msiexec.exe Token: SeIncreaseQuotaPrivilege 2824 msiexec.exe Token: SeRestorePrivilege 2140 msiexec.exe Token: SeTakeOwnershipPrivilege 2140 msiexec.exe Token: SeSecurityPrivilege 2140 msiexec.exe Token: SeCreateTokenPrivilege 2824 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2824 msiexec.exe Token: SeLockMemoryPrivilege 2824 msiexec.exe Token: SeIncreaseQuotaPrivilege 2824 msiexec.exe Token: SeMachineAccountPrivilege 2824 msiexec.exe Token: SeTcbPrivilege 2824 msiexec.exe Token: SeSecurityPrivilege 2824 msiexec.exe Token: SeTakeOwnershipPrivilege 2824 msiexec.exe Token: SeLoadDriverPrivilege 2824 msiexec.exe Token: SeSystemProfilePrivilege 2824 msiexec.exe Token: SeSystemtimePrivilege 2824 msiexec.exe Token: SeProfSingleProcessPrivilege 2824 msiexec.exe Token: SeIncBasePriorityPrivilege 2824 msiexec.exe Token: SeCreatePagefilePrivilege 2824 msiexec.exe Token: SeCreatePermanentPrivilege 2824 msiexec.exe Token: SeBackupPrivilege 2824 msiexec.exe Token: SeRestorePrivilege 2824 msiexec.exe Token: SeShutdownPrivilege 2824 msiexec.exe Token: SeDebugPrivilege 2824 msiexec.exe Token: SeAuditPrivilege 2824 msiexec.exe Token: SeSystemEnvironmentPrivilege 2824 msiexec.exe Token: SeChangeNotifyPrivilege 2824 msiexec.exe Token: SeRemoteShutdownPrivilege 2824 msiexec.exe Token: SeUndockPrivilege 2824 msiexec.exe Token: SeSyncAgentPrivilege 2824 msiexec.exe Token: SeEnableDelegationPrivilege 2824 msiexec.exe Token: SeManageVolumePrivilege 2824 msiexec.exe Token: SeImpersonatePrivilege 2824 msiexec.exe Token: SeCreateGlobalPrivilege 2824 msiexec.exe Token: SeCreateTokenPrivilege 2824 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2824 msiexec.exe Token: SeLockMemoryPrivilege 2824 msiexec.exe Token: SeIncreaseQuotaPrivilege 2824 msiexec.exe Token: SeMachineAccountPrivilege 2824 msiexec.exe Token: SeTcbPrivilege 2824 msiexec.exe Token: SeSecurityPrivilege 2824 msiexec.exe Token: SeTakeOwnershipPrivilege 2824 msiexec.exe Token: SeLoadDriverPrivilege 2824 msiexec.exe Token: SeSystemProfilePrivilege 2824 msiexec.exe Token: SeSystemtimePrivilege 2824 msiexec.exe Token: SeProfSingleProcessPrivilege 2824 msiexec.exe Token: SeIncBasePriorityPrivilege 2824 msiexec.exe Token: SeCreatePagefilePrivilege 2824 msiexec.exe Token: SeCreatePermanentPrivilege 2824 msiexec.exe Token: SeBackupPrivilege 2824 msiexec.exe Token: SeRestorePrivilege 2824 msiexec.exe Token: SeShutdownPrivilege 2824 msiexec.exe Token: SeDebugPrivilege 2824 msiexec.exe Token: SeAuditPrivilege 2824 msiexec.exe Token: SeSystemEnvironmentPrivilege 2824 msiexec.exe Token: SeChangeNotifyPrivilege 2824 msiexec.exe Token: SeRemoteShutdownPrivilege 2824 msiexec.exe Token: SeUndockPrivilege 2824 msiexec.exe Token: SeSyncAgentPrivilege 2824 msiexec.exe Token: SeEnableDelegationPrivilege 2824 msiexec.exe Token: SeManageVolumePrivilege 2824 msiexec.exe Token: SeImpersonatePrivilege 2824 msiexec.exe Token: SeCreateGlobalPrivilege 2824 msiexec.exe Token: SeCreateTokenPrivilege 2824 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2824 msiexec.exe 2824 msiexec.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2600 2140 msiexec.exe 31 PID 2140 wrote to memory of 2600 2140 msiexec.exe 31 PID 2140 wrote to memory of 2600 2140 msiexec.exe 31 PID 2140 wrote to memory of 2600 2140 msiexec.exe 31 PID 2140 wrote to memory of 2600 2140 msiexec.exe 31 PID 2140 wrote to memory of 2600 2140 msiexec.exe 31 PID 2140 wrote to memory of 2600 2140 msiexec.exe 31 PID 2140 wrote to memory of 2840 2140 msiexec.exe 35 PID 2140 wrote to memory of 2840 2140 msiexec.exe 35 PID 2140 wrote to memory of 2840 2140 msiexec.exe 35 PID 2140 wrote to memory of 2840 2140 msiexec.exe 35 PID 2140 wrote to memory of 2840 2140 msiexec.exe 35 PID 2140 wrote to memory of 2840 2140 msiexec.exe 35 PID 2140 wrote to memory of 2840 2140 msiexec.exe 35 PID 2140 wrote to memory of 2864 2140 msiexec.exe 36 PID 2140 wrote to memory of 2864 2140 msiexec.exe 36 PID 2140 wrote to memory of 2864 2140 msiexec.exe 36 PID 2140 wrote to memory of 2864 2140 msiexec.exe 36 PID 2140 wrote to memory of 2864 2140 msiexec.exe 36 PID 2864 wrote to memory of 2416 2864 MsiExec.exe 37 PID 2864 wrote to memory of 2416 2864 MsiExec.exe 37 PID 2864 wrote to memory of 2416 2864 MsiExec.exe 37 PID 2416 wrote to memory of 2028 2416 down.exe 38 PID 2416 wrote to memory of 2028 2416 down.exe 38 PID 2416 wrote to memory of 2028 2416 down.exe 38 PID 2416 wrote to memory of 2508 2416 down.exe 39 PID 2416 wrote to memory of 2508 2416 down.exe 39 PID 2416 wrote to memory of 2508 2416 down.exe 39 PID 2416 wrote to memory of 2508 2416 down.exe 39 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\d829e97999e1fb03880dc321b0a331937e18b9aa0ee08ca3ab189ce8f410cba1.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2824
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 241B63D003BAFCE129188CC0CF518938 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2600
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 86F1155E816E680ED720AAF8C2B7E9512⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding 3124B627F3D032D02974275C8E96FB132⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\2529C59D-0E0D-4391-8E68-0000470DD342\down.exeC:\Users\Admin\2529C59D-0E0D-4391-8E68-0000470DD342\\down.exe3⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\2529C59D-0E0D-4391-8E68-0000470DD342\down.exeC:\Users\Admin\2529C59D-0E0D-4391-8E68-0000470DD342\down.exe /aut4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2028
-
-
C:\Windows\system32\colorcpl.execolorcpl.exe4⤵PID:2508
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2160
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000068" "0000000000000368"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1240
-
C:\Users\Admin\AppData\Local\Temp\{A18BB0CE-F9A6-475e-AF46-4F0C298EDEE2}.exe"C:\Users\Admin\AppData\Local\Temp\{A18BB0CE-F9A6-475e-AF46-4F0C298EDEE2}.exe" /s "C:\Users\Admin\AppData\Local\Temp\{93D2C883-FB88-4401-B3ED-8D2609243B40}"1⤵
- Adds Run key to start application
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1620
-
C:\Users\Admin\AppData\Local\Temp\{6076B8C5-7C77-4369-A384-683039AEFC75}.exe"C:\Users\Admin\AppData\Local\Temp\{6076B8C5-7C77-4369-A384-683039AEFC75}.exe" /s "C:\Users\Admin\AppData\Local\Temp\{1C785DE3-95D7-4150-AB46-7E93C0079B28}"1⤵
- Adds Run key to start application
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2700
-
C:\Program Files (x86)\LineInstaller\LineInstaller\LineInstaller\LineInst.exe"C:\Program Files (x86)\LineInstaller\LineInstaller\LineInstaller\LineInst.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5ee9237a585c3c2b980ce3ff29cac0ae0
SHA1a5a94398f3f1f362ec52b0a96d629d26cc7e0ba7
SHA2567979b4b994fd08c133d9317d63cb04aefa8a5a996ea0e9caabbbab3f0389f5c7
SHA51255ac1d4291984c089a55675ce927e6c58662b14afb438789ca8b96bf19e089e48263ee3700c11d6c5b3d866a3177c731f755816112dc7e2a31423438c10f96bb
-
Filesize
1004KB
MD5587e3bc21efaf428c87331decc9bfeb3
SHA1a5b8ebeab4e3968673a61a95350b7f0bf60d7459
SHA256b931c5686cc09b2183bba197dc151b8e95ca6151e39fb98954352340c0b31120
SHA512ffae2dab5caf16dc7dfd0a97a8ff6349a466bc57ee043d1ac4d53e011498e39b9a855295d10207ba578c6857abebd445d378e83aa2ff6ec247713d81b370d0ca
-
Filesize
613KB
MD5c1b066f9e3e2f3a6785161a8c7e0346a
SHA18b3b943e79c40bc81fdac1e038a276d034bbe812
SHA25699e3e25cda404283fbd96b25b7683a8d213e7954674adefa2279123a8d0701fd
SHA51236f9e6c86afbd80375295238b67e4f472eb86fcb84a590d8dba928d4e7a502d4f903971827fdc331353e5b3d06616664450759432fdc8d304a56e7dacb84b728
-
Filesize
116KB
MD5e9b690fbe5c4b96871214379659dd928
SHA1c199a4beac341abc218257080b741ada0fadecaf
SHA256a06c9ea4f815dac75d2c99684d433fbfc782010fae887837a03f085a29a217e8
SHA51200cf9b22af6ebbc20d1b9c22fc4261394b7d98ccad4823abc5ca6fdac537b43a00db5b3829c304a85738be5107927c0761c8276d6cb7f80e90f0a2c991dbcd8c
-
Filesize
48KB
MD5eb49c1d33b41eb49dfed58aafa9b9a8f
SHA161786eb9f3f996d85a5f5eea4c555093dd0daab6
SHA2566d3a6cde6fc4d3c79aabf785c04d2736a3e2fd9b0366c9b741f054a13ecd939e
SHA512d15905a3d7203b00181609f47ce6e4b9591a629f2bf26ff33bf964f320371e06d535912fda13987610b76a85c65c659adac62f6b3176dbca91a01374178cd5c6
-
Filesize
1.3MB
MD584e23f7b2db9b51553ea2a8206d70fc8
SHA158a3f8f377dbad922e36dfeebc7cc326fa3e7053
SHA2561e7d360137b895d1be8f15487f5820da68180f92e2d361b8898d0aac657ff5dd
SHA5124a7a6ea0b76c703dd7e90dfab8e6adc3be9dedbb3a36b2d8286b0d9881989e5e121af94e2ab3f7bb71abe623d8df25a0bd87fab1ff067159af020b2a211aef32
-
Filesize
2.5MB
MD583f5fa7aa542e81c5fd6ddb7f54decd9
SHA190f1a86891b0b94f4453a741ab0ab65f884980b2
SHA256d4ca48dd50757bc200f38062b7766930cfe848f3ca93bd188f5a172c5f0661fe
SHA512174d691cd475c89ecf42dc8e6a469beac6e36fd588ef307b24fc8a6ceef434d8ed8b58078ca476e496af17d680d46527f7b86d1d2a1f9dda909bd614a44784df
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
242B
MD5e5b5345f17733eb28000d4e51b0eb4a2
SHA142e1b970ac0368749ee283e6b08f37f92a764191
SHA256d56df2b66ef11da7a6fc5e74c1e9d509e3af3a82b1afcad7176c4f8104413766
SHA512e6dd4a3f819c97793d4c6afe532d8683b4ad53909cb8f1b420c6813823644bee9dd45605c590457b18d9de23a0f941dbbecbeea6017f5e0e68ce4c3d078f0a99
-
Filesize
1KB
MD5007761c9938b6312984c40ceff455fde
SHA11fbbf1ca2b627859c319543169559896059e71ca
SHA256321f7eee9d6b206f084b2036ba8b4cedf18a01ce1946dcc4b4cbd3f1bd77c434
SHA512e8931fb9f987e6baa153fccef90493b9e5e86f275a6bb2229e7d0eb33215efc54b7378afb32238c5a2f0ca9c49128e9e8c0e24f5b8c9a64b15d9d1d6ca414125
-
Filesize
2KB
MD5ff0c7c2667dff4f3ed588f40d047c642
SHA11162c83bd0bb0d81b7ab7f616cb012b790aa4adf
SHA25602af5cb061fd8075e9475c45ab20e86cf2bb4ca9511ddad348645ed5183b9fc7
SHA512539b1d443232758b6c60a287f2a40200e6e3ba7353f11f18e29ba265c9569a4610e4a80910f79660368a916576ab9c486efa248bf3257e522ef5bfb3d42ef3c3
-
Filesize
196B
MD59160ced60750520ffcfadbf6b318af3e
SHA142d4bfca6d60a3ed76b05cd11378e166c86f79d5
SHA256797853fd7053f4fd68d309a4d91c620e05a527cdf90688937e165a233f9da91f
SHA5120879ff7dc54a6e438d0430b92063cfc808394651ac3d3a68b15ab79d09ef048959f4a4b4619bd5bcb391cba0d973cc04f51b7da07272cd42ca874e11733626bd
-
Filesize
164B
MD581a71f6feec26723958f2364a4f1aefe
SHA13d4605cfd771aedb8ba51389074a60e5a38775ad
SHA256f244b12a1e911c84dcfea45a49885cf48307d2ddc4c1ac7c1aa21bc310bebd80
SHA51284f9f20e3a381f1c3cafce07bdfeffd77e19bf0007245e95a80a97fa71e16d877e12ec8d57e8a9e60d008e08b38c9fd670f5374a058980f019590ed1dafd59c5
-
Filesize
1.0MB
MD5217dc98e219a340cb09915244c992a52
SHA1a04f101ca7180955d62e4a1aaeccdcca489209da
SHA25627c8bd76150ddda5b09d6db11f67269cee2eecac345df67f93aab3e3aaabde7c
SHA512dddc15992533c8c13000163c7dd59b20e2fbdedbf611338c04f6f9209ec1a95d1f93aaeeae2778890214d333320978f5d2554348722ea6c8489320f0ef1c4c85
-
Filesize
25KB
MD581902d13c01fd8a187f3a7f2b72d5dd0
SHA10ac01518c5588eb2788730c78f0c581f79cf2ed4
SHA256eef31e9195cfacde7b4e7eb7384c8178d8811063b375fd4a28ae897cc180c6a6
SHA51204d6e2e937328477803084e0ef9da2c3636cdc9d34af74e2d1871d7190be21cbb2771ae835175e104e24eccba52add1ba6f58407bfd522ef82b81d76e977f24c
-
Filesize
2.2MB
MD5da9b9ecb94e94c9613ec172ea7007ab1
SHA1a2555d77b987bd13774af837c8298bf541089a0e
SHA25660af8c6099d8996f540b4cf125d142f57a4727f8f8f32e868e253fbd51ae3831
SHA5125f62765f66569085aab29c05a5b3d9f16805a002ac917c1a96d98f775c943f11ba8c0f66be18fb20eaea59c3fe809289dfbbbfe907b35ca9585af04570dc33f4
-
Filesize
485KB
MD56cc1f95584aaac98297fa906248af081
SHA1641c2c14a994768b6b4b6812dfb4df671af0887d
SHA2565d19450428b7fcda6100ea2c564e576141de595d41aa1508512d0bf4be9f7de6
SHA5120c4f4bc39c22f7b01fbfcf396f134ab9d4901a730980c7cbb0af22855b9af88b0fa6d23797dcbecf53c75e98d4e97b274124a1ce11963e75323d149d81eb147b