Analysis

  • max time kernel
    128s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    11-11-2020 10:53

General

  • Target

    5c10afa23f689af55e3479480f13836b05f64dc2f3edf47b7084f297c5894539.msi

  • Size

    3.1MB

  • MD5

    56f97661a171b446d89733cb499082e4

  • SHA1

    feb03f3d2a29d27b56685954fb6b4a253e3da87f

  • SHA256

    5c10afa23f689af55e3479480f13836b05f64dc2f3edf47b7084f297c5894539

  • SHA512

    21b4ceb6ab24477722ba1d214903755eb7fdc5dfe527d690072e56a4b0e308f99e861f13f0b4c7d78fb194a58d428713bce360cb23b853f7646d87c52711107b

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://47.91.237.42:8443/blIF

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies service 2 TTPs 161 IoCs
  • Drops file in Windows directory 9 IoCs
  • Checks SCSI registry key(s) 3 TTPs 96 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\5c10afa23f689af55e3479480f13836b05f64dc2f3edf47b7084f297c5894539.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:984
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Modifies service
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:2200
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 7BCB5904F52E9E482E65C89A46ECFD96
      2⤵
      • Loads dropped DLL
      • Modifies Control Panel
      • Suspicious use of WriteProcessMemory
      PID:3496
      • C:\Windows\SysWOW64\expand.exe
        "C:\Windows\System32\expand.exe" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:3684
      • C:\Users\Admin\AppData\Local\Temp\MW-e7077978-6f68-490c-9484-5697ed985087\files\svchcst.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-e7077978-6f68-490c-9484-5697ed985087\files\svchcst.exe"
        3⤵
        • Executes dropped EXE
        PID:1404
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:2272
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
    1⤵
    • Checks SCSI registry key(s)
    • Modifies data under HKEY_USERS
    PID:2052

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MW-e7077978-6f68-490c-9484-5697ed985087\files.cab
    MD5

    b653e1dc68612a271aee9b0b3930293f

    SHA1

    fbf5da87659a05e1011eeb521eb25538f59eb406

    SHA256

    122350f455ebd60647f862ae34e15d8424517b97bd94eb12b89c2593834c601f

    SHA512

    dd1f6b5982399516d44fa0ad183ff3a40c40eec4f460054fc62a829138845633673aabb9be2c6498b61a671ce2936e9466ffa24784d5f3fcb6cee6c3f8462315

  • C:\Users\Admin\AppData\Local\Temp\MW-e7077978-6f68-490c-9484-5697ed985087\files\svchcst.exe
    MD5

    8c0c79a1d225b583724e6d6cb97d2640

    SHA1

    d86f98b0f4c965a2f5e41ebdeb54388890967450

    SHA256

    9b5063189c2dd0550c422662883b23b243a72d97a8d55e80236328aed1625a3c

    SHA512

    6029b4df1048897d941682bc1379d27017f5d0cc2b6724ee5a46c5b54f2f41cb8c2d10e7beca56ec214c77a51a2364dbf5341ef4279af707767659a95671ce18

  • C:\Users\Admin\AppData\Local\Temp\MW-e7077978-6f68-490c-9484-5697ed985087\files\svchcst.exe
    MD5

    8c0c79a1d225b583724e6d6cb97d2640

    SHA1

    d86f98b0f4c965a2f5e41ebdeb54388890967450

    SHA256

    9b5063189c2dd0550c422662883b23b243a72d97a8d55e80236328aed1625a3c

    SHA512

    6029b4df1048897d941682bc1379d27017f5d0cc2b6724ee5a46c5b54f2f41cb8c2d10e7beca56ec214c77a51a2364dbf5341ef4279af707767659a95671ce18

  • C:\Windows\Installer\MSID3FF.tmp
    MD5

    3e9d2974fd83d2c22b647d36a2ba7861

    SHA1

    3b1d50d42235439d456444f7d3b573f93ecdbe5f

    SHA256

    339ad75878735d68ccf46bd6f2a73908e4b97be2b947b913e3472dda2c35135a

    SHA512

    e97fdb1d0053d20e7d869d664662f3a845a8b64103e1876513793adff5a190b110d7c221b81102e7e1f6c902dcf0ade18ade2299d3083917d3673aa3ba4ebb9f

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
    MD5

    5b2eeed262cccb06b8d387fd31eabe00

    SHA1

    c5c3413d1a54e54e9438996d3433051840e4287a

    SHA256

    92aa68222c1e101a625f01b3ace5c626cce65567ce49f7feba316975be366b41

    SHA512

    83b484c047577b15764ab6873ff8c3de9402f251bb42e3ac35f83ab949406bb51904416c5d891b5dc6e2fde99d13547f80a9775ae06fbc4e98d912ba6684702b

  • \??\Volume{0e932f02-0000-0000-0000-500600000000}\System Volume Information\SPP\OnlineMetadataCache\{7508da2e-4cba-40dc-9c43-e74eba174f36}_OnDiskSnapshotProp
    MD5

    2f52526a3f3da08d5a6201189067ac2c

    SHA1

    4617e83fef0d2e60b979a9eb884070a296dd9634

    SHA256

    7eaf82b17a9352805590e4fe32acf1fffa0111b5523c52ac37b5460946f41c45

    SHA512

    845741ef1c8ad4f443c70ded7152f5d50a3be1db66fee23a0d4d3dbcbb35359bd51ec605186efe6c78e28afe589cb85ddcbcf47508c45a7218cad5c3876b80f8

  • \Windows\Installer\MSID3FF.tmp
    MD5

    3e9d2974fd83d2c22b647d36a2ba7861

    SHA1

    3b1d50d42235439d456444f7d3b573f93ecdbe5f

    SHA256

    339ad75878735d68ccf46bd6f2a73908e4b97be2b947b913e3472dda2c35135a

    SHA512

    e97fdb1d0053d20e7d869d664662f3a845a8b64103e1876513793adff5a190b110d7c221b81102e7e1f6c902dcf0ade18ade2299d3083917d3673aa3ba4ebb9f

  • memory/1404-9-0x0000000000000000-mapping.dmp
  • memory/1404-11-0x0000000000400000-0x0000000000A0E000-memory.dmp
    Filesize

    6.1MB

  • memory/2200-0-0x0000000000000000-mapping.dmp
  • memory/3496-1-0x0000000000000000-mapping.dmp
  • memory/3684-6-0x0000000000000000-mapping.dmp