Overview
overview
7Static
static
3SuperViewe...th.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...rl.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...TE.msi
windows11-21h2-x64
6SuperViewe...XT.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...rt.msi
windows11-21h2-x64
6SuperViewe...or.exe
windows11-21h2-x64
3SuperViewe...er.msi
windows11-21h2-x64
6SuperViewe...er.msi
windows11-21h2-x64
6SuperViewe...re.msi
windows11-21h2-x64
6SuperViewe...er.exe
windows11-21h2-x64
3SuperViewe...64.exe
windows11-21h2-x64
7SuperViewe...86.exe
windows11-21h2-x64
7SuperViewe...ex.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...kl.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...os.msi
windows11-21h2-x64
SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...es.msi
windows11-21h2-x64
6SuperViewe...et.msi
windows11-21h2-x64
6SuperViewe...me.msi
windows11-21h2-x64
SuperViewe...ph.msi
windows11-21h2-x64
6SuperViewe...ls.msi
windows11-21h2-x64
6SuperViewe...pp.msi
windows11-21h2-x64
6SuperViewe...rk.msi
windows11-21h2-x64
6SuperViewe...it.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...ne.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6Analysis
-
max time kernel
229s -
max time network
290s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/03/2025, 13:52
Behavioral task
behavioral1
Sample
SuperViewer Installer/Volume/bin/p15/niauth.msi
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
SuperViewer Installer/Volume/bin/p15/niauth64.msi
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
SuperViewer Installer/Volume/bin/p16/nicurl.msi
Resource
win11-20250313-en
Behavioral task
behavioral4
Sample
SuperViewer Installer/Volume/bin/p16/nicurl64.msi
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
SuperViewer Installer/Volume/bin/p17/LabVI00/NIWebServer_LVRTE.msi
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
SuperViewer Installer/Volume/bin/p18/LogosXT.msi
Resource
win11-20250313-en
Behavioral task
behavioral7
Sample
SuperViewer Installer/Volume/bin/p18/LogosXT64.msi
Resource
win11-20250313-en
Behavioral task
behavioral8
Sample
SuperViewer Installer/Volume/bin/p19/ni_error/ni_error_report.msi
Resource
win11-20250313-en
Behavioral task
behavioral9
Sample
SuperViewer Installer/Volume/bin/p2/SystemRequirementsError.exe
Resource
win11-20250313-en
Behavioral task
behavioral10
Sample
SuperViewer Installer/Volume/bin/p2/VC2015-32Wrapper.msi
Resource
win11-20250313-en
Behavioral task
behavioral11
Sample
SuperViewer Installer/Volume/bin/p2/VC2015-64Wrapper.msi
Resource
win11-20250313-en
Behavioral task
behavioral12
Sample
SuperViewer Installer/Volume/bin/p2/VC2015Core.msi
Resource
win11-20250313-en
Behavioral task
behavioral13
Sample
SuperViewer Installer/Volume/bin/p2/VCRunTimeInstaller.exe
Resource
win11-20250314-en
Behavioral task
behavioral14
Sample
SuperViewer Installer/Volume/bin/p2/vc_redist.x64.exe
Resource
win11-20250313-en
Behavioral task
behavioral15
Sample
SuperViewer Installer/Volume/bin/p2/vc_redist.x86.exe
Resource
win11-20250313-en
Behavioral task
behavioral16
Sample
SuperViewer Installer/Volume/bin/p20/activex.msi
Resource
win11-20250313-en
Behavioral task
behavioral17
Sample
SuperViewer Installer/Volume/bin/p20/activex64.msi
Resource
win11-20250313-en
Behavioral task
behavioral18
Sample
SuperViewer Installer/Volume/bin/p25/mkl.msi
Resource
win11-20250313-en
Behavioral task
behavioral19
Sample
SuperViewer Installer/Volume/bin/p25/mkl64.msi
Resource
win11-20250313-en
Behavioral task
behavioral20
Sample
SuperViewer Installer/Volume/bin/p26/logos.msi
Resource
win11-20250313-en
Behavioral task
behavioral21
Sample
SuperViewer Installer/Volume/bin/p26/logos64.msi
Resource
win11-20250314-en
Behavioral task
behavioral22
Sample
SuperViewer Installer/Volume/bin/p27/lvrteres/LV2019rteres.msi
Resource
win11-20250313-en
Behavioral task
behavioral23
Sample
SuperViewer Installer/Volume/bin/p28/LV2019rtdnet.msi
Resource
win11-20250313-en
Behavioral task
behavioral24
Sample
SuperViewer Installer/Volume/bin/p28/LV2019runtime.msi
Resource
win11-20250313-en
Behavioral task
behavioral25
Sample
SuperViewer Installer/Volume/bin/p29/MStudioCW3DGraph.msi
Resource
win11-20250313-en
Behavioral task
behavioral26
Sample
SuperViewer Installer/Volume/bin/p3/NISys00/NISysLogUtils.msi
Resource
win11-20250313-en
Behavioral task
behavioral27
Sample
SuperViewer Installer/Volume/bin/p4/sslLVRTE/ssl_LVRTEsupp.msi
Resource
win11-20250313-en
Behavioral task
behavioral28
Sample
SuperViewer Installer/Volume/bin/p5/NI_De00/dep_framework.msi
Resource
win11-20250313-en
Behavioral task
behavioral29
Sample
SuperViewer Installer/Volume/bin/p6/KillBit.msi
Resource
win11-20250313-en
Behavioral task
behavioral30
Sample
SuperViewer Installer/Volume/bin/p6/KillBit64.msi
Resource
win11-20250313-en
Behavioral task
behavioral31
Sample
SuperViewer Installer/Volume/bin/p7/NITraceEngine.msi
Resource
win11-20250314-en
Behavioral task
behavioral32
Sample
SuperViewer Installer/Volume/bin/p7/NITraceEngine64.msi
Resource
win11-20250314-en
General
-
Target
SuperViewer Installer/Volume/bin/p25/mkl64.msi
-
Size
1.1MB
-
MD5
13a5f0b1864ed36a5bd09b4d3b364dd3
-
SHA1
987ef2579f446fb0756c42cca92130619431cf2a
-
SHA256
1f18b174d921e9b745919e13f6f5c14caec276c5b1869be50419c2ddf07bbbc8
-
SHA512
a2e645eb54193b172205dd34c4aca55dddcb351011ec0abe9ed80af9a8b745bae2ceaaf95223d0eac320bf33ff573df06b46d00dabf3d8e28624cddc8bb265e5
-
SSDEEP
24576:tFatvZo/3G1L4U+TQNxshTK+63S3ZgTqGgeSZUf/:tFatvF+C2PJg6Uf
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\National Instruments\Shared\MKL\LV170000_BLASLAPACK\LV170000_BLASLAPACK.dll msiexec.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI43E0.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF765CEF49F39FE916.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI4322.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C8AE1FF1-C898-4171-B03B-94D5E487C2D8} msiexec.exe File opened for modification C:\Windows\Installer\MSI44DB.tmp msiexec.exe File opened for modification C:\Windows\Installer\e58413a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI4293.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI4332.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4391.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DF9E6F646B09AE8229.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFA1BF619CA492CDBC.TMP msiexec.exe File created C:\Windows\Installer\e58413c.msi msiexec.exe File created C:\Windows\SystemTemp\~DFAAC7AB491362A04F.TMP msiexec.exe File created C:\Windows\Installer\e58413a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI4188.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI42A4.tmp msiexec.exe -
Loads dropped DLL 11 IoCs
pid Process 4676 MsiExec.exe 4676 MsiExec.exe 4676 MsiExec.exe 4676 MsiExec.exe 4532 MsiExec.exe 4532 MsiExec.exe 4532 MsiExec.exe 4532 MsiExec.exe 4532 MsiExec.exe 4532 MsiExec.exe 4532 MsiExec.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\SourceList\Net msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\SuperViewer Installer\\Volume\\bin\\p25\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1FF1EA8C898C17140BB3495D4E782C8D\MKL64.LV64.MKL2017 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\ProductName = "Math Kernel Libraries (64-bit)" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\Language = "9" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\708E69CB4DDE4FC47AC96FB2F696A044\1FF1EA8C898C17140BB3495D4E782C8D msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1FF1EA8C898C17140BB3495D4E782C8D msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1FF1EA8C898C17140BB3495D4E782C8D\NIMUFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\Version = "285327360" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\708E69CB4DDE4FC47AC96FB2F696A044 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\SourceList\PackageName = "mkl64.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SuperViewer Installer\\Volume\\bin\\p25\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\SourceList\Media msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1FF1EA8C898C17140BB3495D4E782C8D\PackageCode = "583D6B20305DB3E44A046DE5DE5E1207" msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5500 msiexec.exe Token: SeIncreaseQuotaPrivilege 5500 msiexec.exe Token: SeSecurityPrivilege 2076 msiexec.exe Token: SeCreateTokenPrivilege 5500 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 5500 msiexec.exe Token: SeLockMemoryPrivilege 5500 msiexec.exe Token: SeIncreaseQuotaPrivilege 5500 msiexec.exe Token: SeMachineAccountPrivilege 5500 msiexec.exe Token: SeTcbPrivilege 5500 msiexec.exe Token: SeSecurityPrivilege 5500 msiexec.exe Token: SeTakeOwnershipPrivilege 5500 msiexec.exe Token: SeLoadDriverPrivilege 5500 msiexec.exe Token: SeSystemProfilePrivilege 5500 msiexec.exe Token: SeSystemtimePrivilege 5500 msiexec.exe Token: SeProfSingleProcessPrivilege 5500 msiexec.exe Token: SeIncBasePriorityPrivilege 5500 msiexec.exe Token: SeCreatePagefilePrivilege 5500 msiexec.exe Token: SeCreatePermanentPrivilege 5500 msiexec.exe Token: SeBackupPrivilege 5500 msiexec.exe Token: SeRestorePrivilege 5500 msiexec.exe Token: SeShutdownPrivilege 5500 msiexec.exe Token: SeDebugPrivilege 5500 msiexec.exe Token: SeAuditPrivilege 5500 msiexec.exe Token: SeSystemEnvironmentPrivilege 5500 msiexec.exe Token: SeChangeNotifyPrivilege 5500 msiexec.exe Token: SeRemoteShutdownPrivilege 5500 msiexec.exe Token: SeUndockPrivilege 5500 msiexec.exe Token: SeSyncAgentPrivilege 5500 msiexec.exe Token: SeEnableDelegationPrivilege 5500 msiexec.exe Token: SeManageVolumePrivilege 5500 msiexec.exe Token: SeImpersonatePrivilege 5500 msiexec.exe Token: SeCreateGlobalPrivilege 5500 msiexec.exe Token: SeCreateTokenPrivilege 5500 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 5500 msiexec.exe Token: SeLockMemoryPrivilege 5500 msiexec.exe Token: SeIncreaseQuotaPrivilege 5500 msiexec.exe Token: SeMachineAccountPrivilege 5500 msiexec.exe Token: SeTcbPrivilege 5500 msiexec.exe Token: SeSecurityPrivilege 5500 msiexec.exe Token: SeTakeOwnershipPrivilege 5500 msiexec.exe Token: SeLoadDriverPrivilege 5500 msiexec.exe Token: SeSystemProfilePrivilege 5500 msiexec.exe Token: SeSystemtimePrivilege 5500 msiexec.exe Token: SeProfSingleProcessPrivilege 5500 msiexec.exe Token: SeIncBasePriorityPrivilege 5500 msiexec.exe Token: SeCreatePagefilePrivilege 5500 msiexec.exe Token: SeCreatePermanentPrivilege 5500 msiexec.exe Token: SeBackupPrivilege 5500 msiexec.exe Token: SeRestorePrivilege 5500 msiexec.exe Token: SeShutdownPrivilege 5500 msiexec.exe Token: SeDebugPrivilege 5500 msiexec.exe Token: SeAuditPrivilege 5500 msiexec.exe Token: SeSystemEnvironmentPrivilege 5500 msiexec.exe Token: SeChangeNotifyPrivilege 5500 msiexec.exe Token: SeRemoteShutdownPrivilege 5500 msiexec.exe Token: SeUndockPrivilege 5500 msiexec.exe Token: SeSyncAgentPrivilege 5500 msiexec.exe Token: SeEnableDelegationPrivilege 5500 msiexec.exe Token: SeManageVolumePrivilege 5500 msiexec.exe Token: SeImpersonatePrivilege 5500 msiexec.exe Token: SeCreateGlobalPrivilege 5500 msiexec.exe Token: SeCreateTokenPrivilege 5500 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 5500 msiexec.exe Token: SeLockMemoryPrivilege 5500 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5500 msiexec.exe 5500 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2076 wrote to memory of 4676 2076 msiexec.exe 81 PID 2076 wrote to memory of 4676 2076 msiexec.exe 81 PID 2076 wrote to memory of 4676 2076 msiexec.exe 81 PID 2076 wrote to memory of 5984 2076 msiexec.exe 85 PID 2076 wrote to memory of 5984 2076 msiexec.exe 85 PID 2076 wrote to memory of 4532 2076 msiexec.exe 87 PID 2076 wrote to memory of 4532 2076 msiexec.exe 87 PID 2076 wrote to memory of 4532 2076 msiexec.exe 87 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\SuperViewer Installer\Volume\bin\p25\mkl64.msi"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5500
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3EFC41D5E03111F89BC566913CAAE818 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4676
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5984
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1FB89D83DACAA7D4CDD089A7378241A22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4532
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5fce58db63af58f79e08d1c207538d740
SHA114b3cf7dc2978010163024c3dc1d85b28f2ae167
SHA25640809216d993aed847342d6aed841e56f41a3052fde90c9df42511a734c0875d
SHA512a409cf677f42b4041be5a01d8520ed5be3a50ddd9358309eca04cf4cbcc6f1556db9392bed53db9e4bc0d72177efb2ba22f3a582dd980068ffd5b04997f353de
-
Filesize
639KB
MD5c6417930af8969f9f2cb431acd76ec89
SHA1d2f2dc9b44f5f79348f7f36091b26a5465ad4f2b
SHA2561b89704532113150fc7a8a06b5367ee26937c346635a860e93662e1fbb5cd79b
SHA512f30d7a5b51f5d866ccabf3e15a45d3b4013e28a9bdaaf2176e8b121fbd4ab41a8e67c059b2ece8db5bc7a0ce043e76bbc4e3f6400fb9cd2886e1ffcd9e65d79b
-
Filesize
24.6MB
MD58961ac8d22390d57a3abfe3ab53c6f31
SHA10ce40c497f8ea7042acc10449934cbf889f6ff20
SHA256f1321fed11100ef3b837f8c0759363945fd2e57c38b135d636f2278831329349
SHA512f7063cb0b20c78b31d334f282b11d510bba0d3ae726c2565678df48e032dbe026579d66f3841d8c864fce0b682f8f1cd2847da6bdafe07071a7bcb39e699f96a
-
\??\Volume{365369b0-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{f431f795-3def-4636-a549-4deb0a287d37}_OnDiskSnapshotProp
Filesize6KB
MD5cbc2907926c01c0a1e43855597fbee8b
SHA182140e4faeb81c093da487728fcafd16f3d02340
SHA256273b83196a1a0ef051927c208979c3517639f8038a0dd8ef8055a2e99c8adadc
SHA512bde94bf446688fbf1732760bc7d157216f9b3b1f30cb91d7a25084463519ff7bd4f3a37cf65ed08cf6d7ddc76943640302da0f238da322fa7e04b972df9363ac