Analysis

  • max time kernel
    149s
  • max time network
    164s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    14-10-2021 02:46

General

  • Target

    eceb164a69e8f79bb08099fcdf2b75071c527b0107daebc0e7a88e246b4c7f13.msi

  • Size

    548KB

  • MD5

    dffb3d323708f624dc3469e99c3adcb3

  • SHA1

    043620bdea4fd9d48673db8081ffbd9f25d1d8ac

  • SHA256

    eceb164a69e8f79bb08099fcdf2b75071c527b0107daebc0e7a88e246b4c7f13

  • SHA512

    a30b70e5bb259410606d5e123e17b8502423912ecedf6d6ebad6b180a372c58f36231f0c85b610ad89e5328b1e63e257be932d4d3fea8971853516e31f531f84

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\eceb164a69e8f79bb08099fcdf2b75071c527b0107daebc0e7a88e246b4c7f13.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4796
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1940
    • C:\ProgramData\Local\Google\rebol-view-278-3-1.exe
      "C:\ProgramData\Local\Google\rebol-view-278-3-1.exe" -w -i -s C:\ProgramData\Local\Google\exemple.rb
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4516
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c echo %USERDOMAIN%\%USERNAME% > name && for /f "tokens=4-5 delims=. " %i in ('ver') do echo %i.%j > os && echo %PROCESSOR_ARCHITECTURE% > arch
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4608
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ver
          4⤵
            PID:4640
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:512
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
      1⤵
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:3352

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    2
    T1120

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Local\Google\arch
      MD5

      8a882b4a938846d19520af8484f09012

      SHA1

      4ba6aa85fc2d9c1f087fd0573ed818af71c4b6fe

      SHA256

      1009573fa6f897afcc5055f52a2216bfe7fcb308d6cab15922a5b3668df7f34b

      SHA512

      299aa6f6d42b8be1a827b8a2543b89de4c324a050d3aa34cf74b7550774586aeec60cccf83782c69569a0fb81a171e3ea6de0c56c11ec6f563b1fe1864452543

    • C:\ProgramData\Local\Google\exemple.rb
      MD5

      ff4a24c83564f1a01d5a815eaa8a2bf9

      SHA1

      2e713f9fc72db1ed0cd5088172c3b24906e8be13

      SHA256

      9c109c41d497cbe752edf56c1ac0e1ffb06357160b12100cc84eb2d4ddcb7b13

      SHA512

      e628d20c9bc728709d0f46557e5fd017e4594dcbd680486acd6ed1e1721a8692644f2cf0f323b30e74d03230b8320d2f6e1b0f5fd073192e1a28aa7e8ac2c7e1

    • C:\ProgramData\Local\Google\name
      MD5

      0b644b2a65c6141fc40441b708531056

      SHA1

      7cc45d2cb31329a792392bf2c5d3023fff9feb9e

      SHA256

      140cab2330a306eb882d44b6ee9881f1b7f3b699ac33d14194d56913ade18285

      SHA512

      65970af226c9113dd3aef625bbd668ece13aca1a3ebe9a9340795a5d7b51b598ec43105e9784e230c93863ab1b00eb50dc6ae2439001db12d085b7e642a8b968

    • C:\ProgramData\Local\Google\os
      MD5

      83228b44ffe10b0d443969580b022f44

      SHA1

      1ebe8668b8ce8d9524cc539ab9c6af022e861d60

      SHA256

      b57eac3cb43c42d7f2cc137b372a9271fe3906444bd9a9ed4b16c20ee3e9e70d

      SHA512

      cc7c82779ffce41b68bb21a48c9872c27177353eac12d9f0364d98abbefda106af05486cf8a246a6192754d077d19fed46ce4e0018b7eb1ef724b1f15b397660

    • C:\ProgramData\Local\Google\rebol-view-278-3-1.exe
      MD5

      aa2f4fd92fe00de85428f39a6e0e9cfd

      SHA1

      1def65dde53ab24c122da6c76646a36d7d910790

      SHA256

      215e28f9660472b6271a9902573c9d190e4d7ccca33fcf8d6054941d52a3ab85

      SHA512

      952b500e4a291a8bd58810529c1fcc17d969b082d29f00460aba6ada44a30ddc41595f8b0fe71e568ecba803df69985840f10f0a9e478c796c73dc5659ce314e

    • C:\ProgramData\Local\Google\rebol-view-278-3-1.exe
      MD5

      aa2f4fd92fe00de85428f39a6e0e9cfd

      SHA1

      1def65dde53ab24c122da6c76646a36d7d910790

      SHA256

      215e28f9660472b6271a9902573c9d190e4d7ccca33fcf8d6054941d52a3ab85

      SHA512

      952b500e4a291a8bd58810529c1fcc17d969b082d29f00460aba6ada44a30ddc41595f8b0fe71e568ecba803df69985840f10f0a9e478c796c73dc5659ce314e

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
      MD5

      e6ee3acce3198f23c0752347162348a4

      SHA1

      4c8880f0a30bd6d7155aae1e08dc60629fa421cf

      SHA256

      c8cfb14fa7d54ac81c89002fe7d99d4e4cca91a15689cd4e3b012ccf1ab2a554

      SHA512

      5f2135fc42928323df0c56a6299842782943c6354182da9d0ffeea3421e15ad63b7418cf2c9738ef3af83baceecaa2a1c73b768d8ebd66225b6a65a09ebd9b97

    • \??\Volume{d05cfc4a-0000-0000-0000-500600000000}\System Volume Information\SPP\OnlineMetadataCache\{90e2c0d0-59ee-4b47-ad91-b7656f2ea2ef}_OnDiskSnapshotProp
      MD5

      d40b647b607e5102e3626a60ec84a231

      SHA1

      cd7b7e369d181c71cf5fae75483dc7495636bc09

      SHA256

      d4d8ef4c3df659831be3ca3387a4abcb98d9ab675afd619a6db1cfe73a0c7279

      SHA512

      aeaff69435824a23914aba5fe261312031490e6d30a86133a135a0006f4a14f19da96bfaa49359f5e1f5f9b44b5eea38f5820554d08091064a652c366e213d50

    • memory/1940-118-0x0000000000000000-mapping.dmp
    • memory/2872-117-0x00000268B4850000-0x00000268B4852000-memory.dmp
      Filesize

      8KB

    • memory/2872-116-0x00000268B4850000-0x00000268B4852000-memory.dmp
      Filesize

      8KB

    • memory/4516-119-0x0000000000000000-mapping.dmp
    • memory/4608-124-0x0000000000000000-mapping.dmp
    • memory/4640-125-0x0000000000000000-mapping.dmp
    • memory/4796-114-0x0000020AF0300000-0x0000020AF0302000-memory.dmp
      Filesize

      8KB

    • memory/4796-115-0x0000020AF0300000-0x0000020AF0302000-memory.dmp
      Filesize

      8KB