Overview
overview
7Static
static
3SuperViewe...th.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...rl.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...TE.msi
windows11-21h2-x64
6SuperViewe...XT.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...rt.msi
windows11-21h2-x64
6SuperViewe...or.exe
windows11-21h2-x64
3SuperViewe...er.msi
windows11-21h2-x64
6SuperViewe...er.msi
windows11-21h2-x64
6SuperViewe...re.msi
windows11-21h2-x64
6SuperViewe...er.exe
windows11-21h2-x64
3SuperViewe...64.exe
windows11-21h2-x64
7SuperViewe...86.exe
windows11-21h2-x64
7SuperViewe...ex.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...kl.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...os.msi
windows11-21h2-x64
SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...es.msi
windows11-21h2-x64
6SuperViewe...et.msi
windows11-21h2-x64
6SuperViewe...me.msi
windows11-21h2-x64
SuperViewe...ph.msi
windows11-21h2-x64
6SuperViewe...ls.msi
windows11-21h2-x64
6SuperViewe...pp.msi
windows11-21h2-x64
6SuperViewe...rk.msi
windows11-21h2-x64
6SuperViewe...it.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6SuperViewe...ne.msi
windows11-21h2-x64
6SuperViewe...64.msi
windows11-21h2-x64
6Analysis
-
max time kernel
228s -
max time network
215s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/03/2025, 13:52
Behavioral task
behavioral1
Sample
SuperViewer Installer/Volume/bin/p15/niauth.msi
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
SuperViewer Installer/Volume/bin/p15/niauth64.msi
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
SuperViewer Installer/Volume/bin/p16/nicurl.msi
Resource
win11-20250313-en
Behavioral task
behavioral4
Sample
SuperViewer Installer/Volume/bin/p16/nicurl64.msi
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
SuperViewer Installer/Volume/bin/p17/LabVI00/NIWebServer_LVRTE.msi
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
SuperViewer Installer/Volume/bin/p18/LogosXT.msi
Resource
win11-20250313-en
Behavioral task
behavioral7
Sample
SuperViewer Installer/Volume/bin/p18/LogosXT64.msi
Resource
win11-20250313-en
Behavioral task
behavioral8
Sample
SuperViewer Installer/Volume/bin/p19/ni_error/ni_error_report.msi
Resource
win11-20250313-en
Behavioral task
behavioral9
Sample
SuperViewer Installer/Volume/bin/p2/SystemRequirementsError.exe
Resource
win11-20250313-en
Behavioral task
behavioral10
Sample
SuperViewer Installer/Volume/bin/p2/VC2015-32Wrapper.msi
Resource
win11-20250313-en
Behavioral task
behavioral11
Sample
SuperViewer Installer/Volume/bin/p2/VC2015-64Wrapper.msi
Resource
win11-20250313-en
Behavioral task
behavioral12
Sample
SuperViewer Installer/Volume/bin/p2/VC2015Core.msi
Resource
win11-20250313-en
Behavioral task
behavioral13
Sample
SuperViewer Installer/Volume/bin/p2/VCRunTimeInstaller.exe
Resource
win11-20250314-en
Behavioral task
behavioral14
Sample
SuperViewer Installer/Volume/bin/p2/vc_redist.x64.exe
Resource
win11-20250313-en
Behavioral task
behavioral15
Sample
SuperViewer Installer/Volume/bin/p2/vc_redist.x86.exe
Resource
win11-20250313-en
Behavioral task
behavioral16
Sample
SuperViewer Installer/Volume/bin/p20/activex.msi
Resource
win11-20250313-en
Behavioral task
behavioral17
Sample
SuperViewer Installer/Volume/bin/p20/activex64.msi
Resource
win11-20250313-en
Behavioral task
behavioral18
Sample
SuperViewer Installer/Volume/bin/p25/mkl.msi
Resource
win11-20250313-en
Behavioral task
behavioral19
Sample
SuperViewer Installer/Volume/bin/p25/mkl64.msi
Resource
win11-20250313-en
Behavioral task
behavioral20
Sample
SuperViewer Installer/Volume/bin/p26/logos.msi
Resource
win11-20250313-en
Behavioral task
behavioral21
Sample
SuperViewer Installer/Volume/bin/p26/logos64.msi
Resource
win11-20250314-en
Behavioral task
behavioral22
Sample
SuperViewer Installer/Volume/bin/p27/lvrteres/LV2019rteres.msi
Resource
win11-20250313-en
Behavioral task
behavioral23
Sample
SuperViewer Installer/Volume/bin/p28/LV2019rtdnet.msi
Resource
win11-20250313-en
Behavioral task
behavioral24
Sample
SuperViewer Installer/Volume/bin/p28/LV2019runtime.msi
Resource
win11-20250313-en
Behavioral task
behavioral25
Sample
SuperViewer Installer/Volume/bin/p29/MStudioCW3DGraph.msi
Resource
win11-20250313-en
Behavioral task
behavioral26
Sample
SuperViewer Installer/Volume/bin/p3/NISys00/NISysLogUtils.msi
Resource
win11-20250313-en
Behavioral task
behavioral27
Sample
SuperViewer Installer/Volume/bin/p4/sslLVRTE/ssl_LVRTEsupp.msi
Resource
win11-20250313-en
Behavioral task
behavioral28
Sample
SuperViewer Installer/Volume/bin/p5/NI_De00/dep_framework.msi
Resource
win11-20250313-en
Behavioral task
behavioral29
Sample
SuperViewer Installer/Volume/bin/p6/KillBit.msi
Resource
win11-20250313-en
Behavioral task
behavioral30
Sample
SuperViewer Installer/Volume/bin/p6/KillBit64.msi
Resource
win11-20250313-en
Behavioral task
behavioral31
Sample
SuperViewer Installer/Volume/bin/p7/NITraceEngine.msi
Resource
win11-20250314-en
Behavioral task
behavioral32
Sample
SuperViewer Installer/Volume/bin/p7/NITraceEngine64.msi
Resource
win11-20250314-en
General
-
Target
SuperViewer Installer/Volume/bin/p28/LV2019rtdnet.msi
-
Size
1.1MB
-
MD5
c75d3967f86b71db291ab5f1833eb9af
-
SHA1
dbe39f4131036d0739c32371a586a001ee0fca3b
-
SHA256
67c974cb16536bdc8cae9648f67e6c4d714d30bd9dc1eb13917986c17f75a3bc
-
SHA512
11f752cadcb333c46df639fd29e480d3e4526de64650832c6183411302ba6ec1a78baae2d6ed01850924b3be3be6a1f95c24ff99218a969e0228857176fba860
-
SSDEEP
24576:2FXtxH+o/3G1u+TQNxshTK+63S3ZgTqGgeSZUf/:2FXthGvC2PJg6Uf
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\National Instruments\Shared\LabVIEW Run-Time\2019\NationalInstruments.LabVIEW.RefnumTypes.dll msiexec.exe File created C:\Program Files (x86)\National Instruments\Shared\LabVIEW Run-Time\2019\NationalInstruments.LabVIEW.Interop.dll msiexec.exe -
Drops file in Windows directory 22 IoCs
description ioc Process File created C:\Windows\Installer\SourceHash{F2704C4E-5764-46CE-89F2-D015C7355C84} msiexec.exe File created C:\Windows\assembly\tmp\TIP1W4GP\NationalInstruments.LabVIEW.RefnumTypes.dll msiexec.exe File opened for modification C:\Windows\Installer\MSI50A3.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF9EA50A23AA32DCE3.TMP msiexec.exe File created C:\Windows\Installer\e584d31.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI4DAE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4F17.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4F78.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\assembly\tmp\T758XB9N\NationalInstruments.LabVIEW.Interop.dll msiexec.exe File created C:\Windows\Installer\e584d33.msi msiexec.exe File opened for modification C:\Windows\Installer\e584d31.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI4EE7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4F57.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFDDE1CBE53257454A.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI4FB7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4F67.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DFCE45B05DC5F919FA.TMP msiexec.exe File created C:\Windows\assembly\GACLock.dat msiexec.exe File created C:\Windows\SystemTemp\~DF8DF5B0EA87E930BD.TMP msiexec.exe -
Loads dropped DLL 11 IoCs
pid Process 2128 MsiExec.exe 2128 MsiExec.exe 2128 MsiExec.exe 2128 MsiExec.exe 1196 MsiExec.exe 1196 MsiExec.exe 1196 MsiExec.exe 1196 MsiExec.exe 1196 MsiExec.exe 1196 MsiExec.exe 1196 MsiExec.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 000000000400000016c72ef864aebe750000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff00000000270101000008000016c72ef80000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff00000000070001000068090016c72ef8000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1d16c72ef8000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000016c72ef800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\SuperViewer Installer\\Volume\\bin\\p28\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\Language = "9" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\Version = "318816256" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\Global\NationalInstruments.LabVIEW.Interop,fileVersion="1.0.0.0",version="1.6.0.0",culture="neutral",publicKeyToken="DAEB5DC76BE4E32A",processorArchitecture="MSIL" = 7d003f003100770076004e002a00450069003d00310055007e0021002a005b004a0078005500520044006f0074004e006500740041007300730065006d0062006c006900650073002e004c0056002e0052005400450044004e004500540032003000310039003e00530058002d0069007a007000510049007b0039004b006e007100640052002600390037004200440000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\E4C4072F4675EC64982F0D517C53C548 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\E4C4072F4675EC64982F0D517C53C548\DotNetAssemblies.LV.RTEDNET2019 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\E4C4072F4675EC64982F0D517C53C548\NIMUFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\ProductName = "NI LabVIEW Runtime Interop 2019" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\PackageCode = "56FCAD0430DF6684C868E44144426EAA" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\Global msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\Global\NationalInstruments.LabVIEW.RefnumTypes,fileVersion="1.0.0.0",version="1.1.0.0",culture="neutral",publicKeyToken="DAEB5DC76BE4E32A",processorArchitecture="MSIL" = 7d003f003100770076004e002a00450069003d00310055007e0021002a005b004a0078005500520044006f0074004e006500740041007300730065006d0062006c006900650073002e004c0056002e0052005400450044004e004500540032003000310039003e007e00240041005b004a0078004a0024006b0040006d0051006c006f0031003800450042007900460000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\4EBFDA67E50114346ABF635BEAEF0A7C msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\4EBFDA67E50114346ABF635BEAEF0A7C\E4C4072F4675EC64982F0D517C53C548 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\SourceList\PackageName = "LV2019rtdnet.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SuperViewer Installer\\Volume\\bin\\p28\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E4C4072F4675EC64982F0D517C53C548\AuthorizedLUAApp = "0" msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1548 msiexec.exe Token: SeIncreaseQuotaPrivilege 1548 msiexec.exe Token: SeSecurityPrivilege 1876 msiexec.exe Token: SeCreateTokenPrivilege 1548 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1548 msiexec.exe Token: SeLockMemoryPrivilege 1548 msiexec.exe Token: SeIncreaseQuotaPrivilege 1548 msiexec.exe Token: SeMachineAccountPrivilege 1548 msiexec.exe Token: SeTcbPrivilege 1548 msiexec.exe Token: SeSecurityPrivilege 1548 msiexec.exe Token: SeTakeOwnershipPrivilege 1548 msiexec.exe Token: SeLoadDriverPrivilege 1548 msiexec.exe Token: SeSystemProfilePrivilege 1548 msiexec.exe Token: SeSystemtimePrivilege 1548 msiexec.exe Token: SeProfSingleProcessPrivilege 1548 msiexec.exe Token: SeIncBasePriorityPrivilege 1548 msiexec.exe Token: SeCreatePagefilePrivilege 1548 msiexec.exe Token: SeCreatePermanentPrivilege 1548 msiexec.exe Token: SeBackupPrivilege 1548 msiexec.exe Token: SeRestorePrivilege 1548 msiexec.exe Token: SeShutdownPrivilege 1548 msiexec.exe Token: SeDebugPrivilege 1548 msiexec.exe Token: SeAuditPrivilege 1548 msiexec.exe Token: SeSystemEnvironmentPrivilege 1548 msiexec.exe Token: SeChangeNotifyPrivilege 1548 msiexec.exe Token: SeRemoteShutdownPrivilege 1548 msiexec.exe Token: SeUndockPrivilege 1548 msiexec.exe Token: SeSyncAgentPrivilege 1548 msiexec.exe Token: SeEnableDelegationPrivilege 1548 msiexec.exe Token: SeManageVolumePrivilege 1548 msiexec.exe Token: SeImpersonatePrivilege 1548 msiexec.exe Token: SeCreateGlobalPrivilege 1548 msiexec.exe Token: SeCreateTokenPrivilege 1548 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1548 msiexec.exe Token: SeLockMemoryPrivilege 1548 msiexec.exe Token: SeIncreaseQuotaPrivilege 1548 msiexec.exe Token: SeMachineAccountPrivilege 1548 msiexec.exe Token: SeTcbPrivilege 1548 msiexec.exe Token: SeSecurityPrivilege 1548 msiexec.exe Token: SeTakeOwnershipPrivilege 1548 msiexec.exe Token: SeLoadDriverPrivilege 1548 msiexec.exe Token: SeSystemProfilePrivilege 1548 msiexec.exe Token: SeSystemtimePrivilege 1548 msiexec.exe Token: SeProfSingleProcessPrivilege 1548 msiexec.exe Token: SeIncBasePriorityPrivilege 1548 msiexec.exe Token: SeCreatePagefilePrivilege 1548 msiexec.exe Token: SeCreatePermanentPrivilege 1548 msiexec.exe Token: SeBackupPrivilege 1548 msiexec.exe Token: SeRestorePrivilege 1548 msiexec.exe Token: SeShutdownPrivilege 1548 msiexec.exe Token: SeDebugPrivilege 1548 msiexec.exe Token: SeAuditPrivilege 1548 msiexec.exe Token: SeSystemEnvironmentPrivilege 1548 msiexec.exe Token: SeChangeNotifyPrivilege 1548 msiexec.exe Token: SeRemoteShutdownPrivilege 1548 msiexec.exe Token: SeUndockPrivilege 1548 msiexec.exe Token: SeSyncAgentPrivilege 1548 msiexec.exe Token: SeEnableDelegationPrivilege 1548 msiexec.exe Token: SeManageVolumePrivilege 1548 msiexec.exe Token: SeImpersonatePrivilege 1548 msiexec.exe Token: SeCreateGlobalPrivilege 1548 msiexec.exe Token: SeCreateTokenPrivilege 1548 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1548 msiexec.exe Token: SeLockMemoryPrivilege 1548 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1548 msiexec.exe 1548 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2128 1876 msiexec.exe 81 PID 1876 wrote to memory of 2128 1876 msiexec.exe 81 PID 1876 wrote to memory of 2128 1876 msiexec.exe 81 PID 1876 wrote to memory of 2820 1876 msiexec.exe 85 PID 1876 wrote to memory of 2820 1876 msiexec.exe 85 PID 1876 wrote to memory of 1196 1876 msiexec.exe 87 PID 1876 wrote to memory of 1196 1876 msiexec.exe 87 PID 1876 wrote to memory of 1196 1876 msiexec.exe 87 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\SuperViewer Installer\Volume\bin\p28\LV2019rtdnet.msi"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1548
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DE3B0920E18C8AECA979F3D60FA1087B C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:2820
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C08662B0889258494026C6C906EF02C12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1196
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5c1b2dc7c19248c39aab67c99e4f89251
SHA1f099c31b8907670d094aa59ede2f9943e2108973
SHA2561f692df1d5b4922bb0b0ef25ff816d47a4e6d4c08f25992e4e68d08efa9759e4
SHA51203edbfaa40745933912f5b9077478f99ca921a99e81eb370bcc9a0f8e2cd23593289c9cf26acb06a6bb4c91bcbc3183b49ed14ff0740d095da4f52c9bcfc40ef
-
Filesize
639KB
MD5c6417930af8969f9f2cb431acd76ec89
SHA1d2f2dc9b44f5f79348f7f36091b26a5465ad4f2b
SHA2561b89704532113150fc7a8a06b5367ee26937c346635a860e93662e1fbb5cd79b
SHA512f30d7a5b51f5d866ccabf3e15a45d3b4013e28a9bdaaf2176e8b121fbd4ab41a8e67c059b2ece8db5bc7a0ce043e76bbc4e3f6400fb9cd2886e1ffcd9e65d79b
-
Filesize
101KB
MD5b0942e6605b68d493291e71cd2da2097
SHA1c127137aebfc29eecacab7f7bd418017be625ae6
SHA2566e7dcc3e720c904ed258501903fb7c883d468f6f269db926437b0e51e683e89f
SHA512889d33424aa767e7c049151211a1bb65eacf8bef7ce34c9be3f5a423222f3c994f4886cee823518e5df2d670d9309cb8836bf00766c49b4b51935b70cef9fa26
-
Filesize
45KB
MD53b2b9aeec1db4f5c484737965e3ee126
SHA1a1d5ae28d01abea4e19074a9bcf332a5920884a9
SHA2566e83ac92e166ec70c0a87e0e0a873a6b5f72720ce95de1df08b50b1213041c51
SHA512f2588a46d26fa40202c61b1e152d6370afcd09f8a33258957c7d00709b485b86a0d1ce6456c76e5b87b3391f0513b8639124411f16068cd4d7a47b6dac1976fa
-
Filesize
24.6MB
MD5e439c1d40450e1d7505d7858f029bcca
SHA10c4689f0e29a146161c6ae45eab7b1e44ccf097c
SHA256ba33443751e229f59b11d71ec82d778f29ed81616d05b9ebccfdeeb82c35ef63
SHA512315de12e4af8909a25b0138e78d212636afe2c1d09db8b9f5b4225581ddb591176c769234c874e8e9f994933314261d5a880fc50d03ecce7249fca882e676f8d
-
\??\Volume{f82ec716-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{2a56ebeb-58bf-4d83-9ab6-34842cfb0db4}_OnDiskSnapshotProp
Filesize6KB
MD58e03ed6f505c8bd49991dee0e67bf248
SHA1c2e3365c62d4dc5d0e8fafe9a4c650d42336e119
SHA25677cac1c864bfeaa59ef57305256fab6a17fed3241ecfa98e38b702af68917f50
SHA512f004fc1de2a05506460eb89ca7247529289eff41e738d8dd2cb4cfc8a365244b45756bb3a26e164e98bda0b5833828f5c53e5bb516f4e342cbfddcdc89be2d7d