Analysis

  • max time kernel
    101s
  • max time network
    103s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    07-10-2021 13:51

General

  • Target

    trehjugdr4et6u.msi

  • Size

    548KB

  • MD5

    065e70c3b1e6841074a25aafa95e20bd

  • SHA1

    0a230bdb9e7baf228a63deefa489e2263e879eaa

  • SHA256

    a69d27abd043cc676095f71300bf6b2368167536fcd4fe5342cf79a7e94fc2fe

  • SHA512

    3daf1be9ab90707cc706f58d3598f59f1f0fec4820eb8838041d9c3454b5daf12765005fb663f8501ab873ccfe8f67d02f8af87ea2e22389d9724e5a3d9c0f77

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\trehjugdr4et6u.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2384
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1568
    • C:\ProgramData\Local\Google\rebol-view-278-3-1.exe
      "C:\ProgramData\Local\Google\rebol-view-278-3-1.exe" -w -i -s C:\ProgramData\Local\Google\exemple.rb
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c echo %USERDOMAIN%\%USERNAME% > name && for /f "tokens=4-5 delims=. " %i in ('ver') do echo %i.%j > os && echo %PROCESSOR_ARCHITECTURE% > arch
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3116
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ver
          4⤵
            PID:3120
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2928
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
      1⤵
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:940

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    2
    T1120

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Local\Google\arch
      MD5

      8a882b4a938846d19520af8484f09012

      SHA1

      4ba6aa85fc2d9c1f087fd0573ed818af71c4b6fe

      SHA256

      1009573fa6f897afcc5055f52a2216bfe7fcb308d6cab15922a5b3668df7f34b

      SHA512

      299aa6f6d42b8be1a827b8a2543b89de4c324a050d3aa34cf74b7550774586aeec60cccf83782c69569a0fb81a171e3ea6de0c56c11ec6f563b1fe1864452543

    • C:\ProgramData\Local\Google\exemple.rb
      MD5

      ff4a24c83564f1a01d5a815eaa8a2bf9

      SHA1

      2e713f9fc72db1ed0cd5088172c3b24906e8be13

      SHA256

      9c109c41d497cbe752edf56c1ac0e1ffb06357160b12100cc84eb2d4ddcb7b13

      SHA512

      e628d20c9bc728709d0f46557e5fd017e4594dcbd680486acd6ed1e1721a8692644f2cf0f323b30e74d03230b8320d2f6e1b0f5fd073192e1a28aa7e8ac2c7e1

    • C:\ProgramData\Local\Google\name
      MD5

      b479b5627be101e1e90c21c8191ce298

      SHA1

      50992a957ea42c50bbac6944c817a0bf13b2d24d

      SHA256

      b2829817e04f37d0f944b3c7f5d6926d772e246d8153fc2d36093883407b2336

      SHA512

      3d7f0e2d76251c510aa067e497b5e512d9a9fa86c68a7d2ed6584b2df28320458aa661752f14ff7384a954f597a6e100da57eab61cde048a90a1713e5c1d59f8

    • C:\ProgramData\Local\Google\os
      MD5

      83228b44ffe10b0d443969580b022f44

      SHA1

      1ebe8668b8ce8d9524cc539ab9c6af022e861d60

      SHA256

      b57eac3cb43c42d7f2cc137b372a9271fe3906444bd9a9ed4b16c20ee3e9e70d

      SHA512

      cc7c82779ffce41b68bb21a48c9872c27177353eac12d9f0364d98abbefda106af05486cf8a246a6192754d077d19fed46ce4e0018b7eb1ef724b1f15b397660

    • C:\ProgramData\Local\Google\rebol-view-278-3-1.exe
      MD5

      aa2f4fd92fe00de85428f39a6e0e9cfd

      SHA1

      1def65dde53ab24c122da6c76646a36d7d910790

      SHA256

      215e28f9660472b6271a9902573c9d190e4d7ccca33fcf8d6054941d52a3ab85

      SHA512

      952b500e4a291a8bd58810529c1fcc17d969b082d29f00460aba6ada44a30ddc41595f8b0fe71e568ecba803df69985840f10f0a9e478c796c73dc5659ce314e

    • C:\ProgramData\Local\Google\rebol-view-278-3-1.exe
      MD5

      aa2f4fd92fe00de85428f39a6e0e9cfd

      SHA1

      1def65dde53ab24c122da6c76646a36d7d910790

      SHA256

      215e28f9660472b6271a9902573c9d190e4d7ccca33fcf8d6054941d52a3ab85

      SHA512

      952b500e4a291a8bd58810529c1fcc17d969b082d29f00460aba6ada44a30ddc41595f8b0fe71e568ecba803df69985840f10f0a9e478c796c73dc5659ce314e

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
      MD5

      5bf3c8ae355adc1c7d0024e0bd5e6ee7

      SHA1

      4d61ac606e8a52c8840f884a0743d65d60b05088

      SHA256

      a8eae5d8f4dba0415550a60f418514a0b78e26fb46dd4f63c64289d31f096c39

      SHA512

      337deab2a94d3f5542b77e6fc05f2ab36e3d9348805bea8c4bbf3c0d417e3787449f61d177bea7e273cc129e87c3135498831fb7089b6e62fa2758d353c13754

    • \??\Volume{5ad12640-0000-0000-0000-500600000000}\System Volume Information\SPP\OnlineMetadataCache\{942072e2-84f1-4e5d-9235-7655608bc2e7}_OnDiskSnapshotProp
      MD5

      e4595166acc7a9088a67eed8052cb0aa

      SHA1

      2a2ebff8a1d0c25298dfbcd7c0ad6d9839420ce6

      SHA256

      908248ba7170d1f11a6aba7e24eaf294101bbc610f105ba4f68f125d82ddb244

      SHA512

      98454708d53edf85f365cd2bfe191c9aebf6182a994cd4454d67d6338c9bab5ddcd75cd6555d6c13ec725f48e0d70521a3af65b05ef2dc8fc8fcef6b298dead6

    • memory/1568-119-0x0000000000000000-mapping.dmp
    • memory/2136-120-0x0000000000000000-mapping.dmp
    • memory/2384-115-0x00000233CEC20000-0x00000233CEC22000-memory.dmp
      Filesize

      8KB

    • memory/2384-116-0x00000233CEC20000-0x00000233CEC22000-memory.dmp
      Filesize

      8KB

    • memory/3116-126-0x0000000000000000-mapping.dmp
    • memory/3120-127-0x0000000000000000-mapping.dmp
    • memory/4024-118-0x0000019EF3E00000-0x0000019EF3E02000-memory.dmp
      Filesize

      8KB

    • memory/4024-117-0x0000019EF3E00000-0x0000019EF3E02000-memory.dmp
      Filesize

      8KB