Analysis

  • max time kernel
    146s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 05:11

General

  • Target

    8b96aef3600697f94165242dc424cd98d12a68911a959021b161ba9c8500ca1f.msi

  • Size

    382KB

  • MD5

    40cd765c69ec60012bf6b4213aa35d76

  • SHA1

    8c1fe03096e612864e3300531430655316aac51a

  • SHA256

    8b96aef3600697f94165242dc424cd98d12a68911a959021b161ba9c8500ca1f

  • SHA512

    c2e3185345785c06848ca1d23ecd662749a4786b84259f421ad580bbc1a50b1d3941a11f48dd4dffec37c9b62607ef01ce99d05901aa1965a046db128c158d41

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 13 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\8b96aef3600697f94165242dc424cd98d12a68911a959021b161ba9c8500ca1f.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3832
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:3
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4032
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1312
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe b2b9e76500e2b6becdd5a2cf94d5e948 HEi96ZH5BEeV6ft6KBdI+g.0.1.0.0.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:4956
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3456
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc
    1⤵
    • Checks SCSI registry key(s)
    • Modifies data under HKEY_USERS
    PID:3212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\System Volume Information\SPP\metadata-2

    MD5

    0a03f98570921d98659da79372bad263

    SHA1

    08302ba9c1ae49232a53b97d232ad070ac8576f0

    SHA256

    475c01436d7fe137e18a55abcbc6fe34fe6bdcb1e1c326e68c781b276a2b3c78

    SHA512

    72d5008e8037849dbb1decee7b2dca6253017250f8189752ece94812b7a08b2dd551f09efc6a516a688763bf55a6b84f812050ee6a31a29dfa153575bfb4565e

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\Windows\softwaredistribution\DataStore\DataStore.edb

    MD5

    51d29f6d674e5fd8244c86194bf1c2a3

    SHA1

    a9e8999bd25e018732c5aa1927a7929d3cf715c4

    SHA256

    e6387e92f2aa7c3712dc3fcfdf99fdb9b0cf1bb489b2ac110e4d5db91755c0fe

    SHA512

    3f3c323811e760f82299b16af05f38a118f6133aa3f061f06628fe1c3f4a75772ad44c9ba28718be2502a052fdd5ddbbb20cca17cb0ae7baa458676f44c2d463

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\Windows\softwaredistribution\DataStore\DataStore.jfm

    MD5

    08973587d22e04a4903f4a7d0bd16656

    SHA1

    7a658dd76709772f11fe3a8804df22a8eb4968c1

    SHA256

    27aeaa234d593f828a1a69164b0e4eed307db95267e53c215a46008b33980cbe

    SHA512

    e2e60fa76e69c886dce9c06659a30815910df8bc9b92bd6812b10e45e6a70d8dd83a9eff5b92011d8ca66bb68d3f91e52726acc0b9af66d8c91eddeef41a9cf5

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\Windows\softwaredistribution\DataStore\Logs\edb.log

    MD5

    58991d36c8972a3ca0bddf8edc884f2e

    SHA1

    ef689a9fb62e6bff34dbe89ad5c90ccdce4d0ae7

    SHA256

    6b165ba609f636a92aad9b85470c1b6630257e5d8e720606e80c9f668307fe5f

    SHA512

    b08172e9fcd5fbc4826d0512e285affde7e092112d330218e5a9eac22a35c67da12ce312ab438a79b503c5b1b9fcf4fdfdac1271cc174be88b8b8e39d992725a

  • \??\PIPE\lsarpc

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \??\Volume{1385018a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{e13e4a75-7114-4734-afe6-9bbef765a713}_OnDiskSnapshotProp

    MD5

    d0c09d9f882b50218f7f35eba6ad700f

    SHA1

    8945ad33ab3ef43e091260d78395f2d46a4dbc29

    SHA256

    050b3ce6043556f7922f0c26e528a424c28684501199c7c4535eb53e178d21da

    SHA512

    0d68a48d71a8f233eda0d5534edce2ac73bb16405f0853a5487d348ac53b9092a0c379dae0a668b43b199f8d8018825e49dd5dfbee576a899772ed2f15bb1792

  • memory/3456-142-0x0000016B5E3B0000-0x0000016B5E3B4000-memory.dmp

    Filesize

    16KB