Analysis

  • max time kernel
    121s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    17-11-2021 02:43

General

  • Target

    foo.msi

  • Size

    64.2MB

  • MD5

    2d070b14498b782e1fb3500ef50b0c2a

  • SHA1

    475f50ea2192809daebb5ce61aaadc2a4708af24

  • SHA256

    b5e4e29d5457654f954e4267723b05d447f311c6cf96723fdca761a8e94948ec

  • SHA512

    0e5e7611f953500603baf4cd25788e75d36525c01e45e6b886a6a3896c78e1efc30579772215b78107a47e32950a7a58a8016882608037d00097a5088e7d510c

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\foo.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3844
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1604
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\SysWOW64\cmd.exe /c "c:\opt\td-agent\td-agent-prompt.bat & fluentd --reg-winsvc i & fluentd --reg-winsvc-fluentdopt "-c C:\opt\td-agent\etc\td-agent\td-agent.conf -o C:\opt\td-agent\td-agent.log""
      2⤵
        PID:3908
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\SysWOW64\cmd.exe /c "sc config fluentdwinsvc start= delayed-auto"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Windows\SysWOW64\sc.exe
          sc config fluentdwinsvc start= delayed-auto
          3⤵
            PID:3120
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /c "sc start fluentdwinsvc"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3756
          • C:\Windows\SysWOW64\sc.exe
            sc start fluentdwinsvc
            3⤵
              PID:1028
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1124
        • \??\c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
          1⤵
          • Checks SCSI registry key(s)
          • Modifies data under HKEY_USERS
          PID:8

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

          MD5

          16593b30fe055c63e0368606ff3af68c

          SHA1

          fd4c0451c69969eed77431a70d9c038d856643d9

          SHA256

          630ad90886846fbc8782feb1bdb655a009dbd26f9a05a4889f70f8908e53f0e4

          SHA512

          0232c15e59ea27ff5a39907ba735c2e9cbddf230c59affce35f1c4787e3e67e7639f3ddcba2f683fb2368a72ce712080fadae6e7ead5f739c61f14b244ca13ee

        • \??\Volume{6a92b422-0000-0000-0000-500600000000}\System Volume Information\SPP\OnlineMetadataCache\{fffe3ec1-3e31-4a37-8a82-2e41c0ec5bfb}_OnDiskSnapshotProp

          MD5

          6699e5fe20513cf606a6c75dd9005086

          SHA1

          595a67482bf5f42aaaca942edd39417a8901f349

          SHA256

          076057804c7d78d1a70ea7e4d90f4cbe58cd53c502d862cdad2386bd873f4dfd

          SHA512

          593f78a7e0e8a7aed0a3ac115622528d7070e00f9f4cc42ce8da294cac409c64f55df681ee26978657aa4bb3845d6ea2997bcaaf3a721821ff618b1cf4d96ea6

        • memory/1028-129-0x0000000000000000-mapping.dmp

        • memory/1604-122-0x0000000000000000-mapping.dmp

        • memory/2672-126-0x0000000000000000-mapping.dmp

        • memory/3120-127-0x0000000000000000-mapping.dmp

        • memory/3568-120-0x0000020E8CC60000-0x0000020E8CC62000-memory.dmp

          Filesize

          8KB

        • memory/3568-121-0x0000020E8CC60000-0x0000020E8CC62000-memory.dmp

          Filesize

          8KB

        • memory/3756-128-0x0000000000000000-mapping.dmp

        • memory/3844-119-0x0000026DAFE10000-0x0000026DAFE12000-memory.dmp

          Filesize

          8KB

        • memory/3844-118-0x0000026DAFE10000-0x0000026DAFE12000-memory.dmp

          Filesize

          8KB

        • memory/3908-125-0x0000000000000000-mapping.dmp