Analysis
-
max time kernel
1314s -
max time network
1158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-es -
resource tags
arch:x64arch:x86image:win10v2004-20241007-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
17-12-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
EpicInstaller-17.2.0.msi
Resource
win7-20240708-es
Behavioral task
behavioral2
Sample
EpicInstaller-17.2.0.msi
Resource
win10v2004-20241007-es
General
-
Target
EpicInstaller-17.2.0.msi
-
Size
194.0MB
-
MD5
392f66528c31a402484379f57d0605a1
-
SHA1
40d155146d49258d3f3e3d8bacc6c919ad8c1d35
-
SHA256
bdb77e87b9d666634e182ea42482d9559125ca8e62c2399b8ad2c6b42395aaa8
-
SHA512
24924b00dc61295ff9fd8f003addaa2f56e6774d2b6e20c068d0d538f0c2b1e2af9c6ca117b9718513218734596a93540e8674294ec67ea91f4dec865b473600
-
SSDEEP
3145728:HyCHcktJLbo4ZW0AF7PPMQxSkn2XbtOk1Ne4rkq//id544fVHBo9LE5XCJuo:Tc81WtsXk2XbcPdij4cJE5XC
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 3684 msiexec.exe 6 3684 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Loads dropped DLL 1 IoCs
pid Process 4712 MsiExec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 3684 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3684 msiexec.exe Token: SeIncreaseQuotaPrivilege 3684 msiexec.exe Token: SeSecurityPrivilege 3188 msiexec.exe Token: SeCreateTokenPrivilege 3684 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3684 msiexec.exe Token: SeLockMemoryPrivilege 3684 msiexec.exe Token: SeIncreaseQuotaPrivilege 3684 msiexec.exe Token: SeMachineAccountPrivilege 3684 msiexec.exe Token: SeTcbPrivilege 3684 msiexec.exe Token: SeSecurityPrivilege 3684 msiexec.exe Token: SeTakeOwnershipPrivilege 3684 msiexec.exe Token: SeLoadDriverPrivilege 3684 msiexec.exe Token: SeSystemProfilePrivilege 3684 msiexec.exe Token: SeSystemtimePrivilege 3684 msiexec.exe Token: SeProfSingleProcessPrivilege 3684 msiexec.exe Token: SeIncBasePriorityPrivilege 3684 msiexec.exe Token: SeCreatePagefilePrivilege 3684 msiexec.exe Token: SeCreatePermanentPrivilege 3684 msiexec.exe Token: SeBackupPrivilege 3684 msiexec.exe Token: SeRestorePrivilege 3684 msiexec.exe Token: SeShutdownPrivilege 3684 msiexec.exe Token: SeDebugPrivilege 3684 msiexec.exe Token: SeAuditPrivilege 3684 msiexec.exe Token: SeSystemEnvironmentPrivilege 3684 msiexec.exe Token: SeChangeNotifyPrivilege 3684 msiexec.exe Token: SeRemoteShutdownPrivilege 3684 msiexec.exe Token: SeUndockPrivilege 3684 msiexec.exe Token: SeSyncAgentPrivilege 3684 msiexec.exe Token: SeEnableDelegationPrivilege 3684 msiexec.exe Token: SeManageVolumePrivilege 3684 msiexec.exe Token: SeImpersonatePrivilege 3684 msiexec.exe Token: SeCreateGlobalPrivilege 3684 msiexec.exe Token: SeCreateTokenPrivilege 3684 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3684 msiexec.exe Token: SeLockMemoryPrivilege 3684 msiexec.exe Token: SeIncreaseQuotaPrivilege 3684 msiexec.exe Token: SeMachineAccountPrivilege 3684 msiexec.exe Token: SeTcbPrivilege 3684 msiexec.exe Token: SeSecurityPrivilege 3684 msiexec.exe Token: SeTakeOwnershipPrivilege 3684 msiexec.exe Token: SeLoadDriverPrivilege 3684 msiexec.exe Token: SeSystemProfilePrivilege 3684 msiexec.exe Token: SeSystemtimePrivilege 3684 msiexec.exe Token: SeProfSingleProcessPrivilege 3684 msiexec.exe Token: SeIncBasePriorityPrivilege 3684 msiexec.exe Token: SeCreatePagefilePrivilege 3684 msiexec.exe Token: SeCreatePermanentPrivilege 3684 msiexec.exe Token: SeBackupPrivilege 3684 msiexec.exe Token: SeRestorePrivilege 3684 msiexec.exe Token: SeShutdownPrivilege 3684 msiexec.exe Token: SeDebugPrivilege 3684 msiexec.exe Token: SeAuditPrivilege 3684 msiexec.exe Token: SeSystemEnvironmentPrivilege 3684 msiexec.exe Token: SeChangeNotifyPrivilege 3684 msiexec.exe Token: SeRemoteShutdownPrivilege 3684 msiexec.exe Token: SeUndockPrivilege 3684 msiexec.exe Token: SeSyncAgentPrivilege 3684 msiexec.exe Token: SeEnableDelegationPrivilege 3684 msiexec.exe Token: SeManageVolumePrivilege 3684 msiexec.exe Token: SeImpersonatePrivilege 3684 msiexec.exe Token: SeCreateGlobalPrivilege 3684 msiexec.exe Token: SeCreateTokenPrivilege 3684 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3684 msiexec.exe Token: SeLockMemoryPrivilege 3684 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3684 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3188 wrote to memory of 4712 3188 msiexec.exe 87 PID 3188 wrote to memory of 4712 3188 msiexec.exe 87 PID 3188 wrote to memory of 4712 3188 msiexec.exe 87
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\EpicInstaller-17.2.0.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3684
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C4491DC18FD8326FF69A9FB2A12D5B06 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0