Analysis

  • max time kernel
    138s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    30-03-2022 22:10

General

  • Target

    eceb164a69e8f79bb08099fcdf2b75071c527b0107daebc0e7a88e246b4c7f13.msi

  • Size

    548KB

  • MD5

    dffb3d323708f624dc3469e99c3adcb3

  • SHA1

    043620bdea4fd9d48673db8081ffbd9f25d1d8ac

  • SHA256

    eceb164a69e8f79bb08099fcdf2b75071c527b0107daebc0e7a88e246b4c7f13

  • SHA512

    a30b70e5bb259410606d5e123e17b8502423912ecedf6d6ebad6b180a372c58f36231f0c85b610ad89e5328b1e63e257be932d4d3fea8971853516e31f531f84

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\eceb164a69e8f79bb08099fcdf2b75071c527b0107daebc0e7a88e246b4c7f13.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2564
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:3
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1740
    • C:\ProgramData\Local\Google\rebol-view-278-3-1.exe
      "C:\ProgramData\Local\Google\rebol-view-278-3-1.exe" -w -i -s C:\ProgramData\Local\Google\exemple.rb
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c echo %USERDOMAIN%\%USERNAME% > name && for /f "tokens=4-5 delims=. " %i in ('ver') do echo %i.%j > os && echo %PROCESSOR_ARCHITECTURE% > arch
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1092
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ver
          4⤵
            PID:2260
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4128
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc
      1⤵
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:4076

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Local\Google\arch

      Filesize

      6B

      MD5

      8a882b4a938846d19520af8484f09012

      SHA1

      4ba6aa85fc2d9c1f087fd0573ed818af71c4b6fe

      SHA256

      1009573fa6f897afcc5055f52a2216bfe7fcb308d6cab15922a5b3668df7f34b

      SHA512

      299aa6f6d42b8be1a827b8a2543b89de4c324a050d3aa34cf74b7550774586aeec60cccf83782c69569a0fb81a171e3ea6de0c56c11ec6f563b1fe1864452543

    • C:\ProgramData\Local\Google\exemple.rb

      Filesize

      1002B

      MD5

      ff4a24c83564f1a01d5a815eaa8a2bf9

      SHA1

      2e713f9fc72db1ed0cd5088172c3b24906e8be13

      SHA256

      9c109c41d497cbe752edf56c1ac0e1ffb06357160b12100cc84eb2d4ddcb7b13

      SHA512

      e628d20c9bc728709d0f46557e5fd017e4594dcbd680486acd6ed1e1721a8692644f2cf0f323b30e74d03230b8320d2f6e1b0f5fd073192e1a28aa7e8ac2c7e1

    • C:\ProgramData\Local\Google\name

      Filesize

      18B

      MD5

      0161fd069a80000e6605497ff7c37226

      SHA1

      ada451b937475f6cbc1bb5e02d5288193785a6e0

      SHA256

      008ad0e2ffb37e9f4478314f838adbf6867e3c33e996c82ba1e5ec895b1297b0

      SHA512

      019a20691135578849495d4e578a4b19b2c7f32447f4ec7ca0068f026605d32c2bda92769ab5b8091d2a3ac9b747f72bad23670ea00cf2daa5c7e880219fac27

    • C:\ProgramData\Local\Google\os

      Filesize

      8B

      MD5

      83228b44ffe10b0d443969580b022f44

      SHA1

      1ebe8668b8ce8d9524cc539ab9c6af022e861d60

      SHA256

      b57eac3cb43c42d7f2cc137b372a9271fe3906444bd9a9ed4b16c20ee3e9e70d

      SHA512

      cc7c82779ffce41b68bb21a48c9872c27177353eac12d9f0364d98abbefda106af05486cf8a246a6192754d077d19fed46ce4e0018b7eb1ef724b1f15b397660

    • C:\ProgramData\Local\Google\rebol-view-278-3-1.exe

      Filesize

      844KB

      MD5

      aa2f4fd92fe00de85428f39a6e0e9cfd

      SHA1

      1def65dde53ab24c122da6c76646a36d7d910790

      SHA256

      215e28f9660472b6271a9902573c9d190e4d7ccca33fcf8d6054941d52a3ab85

      SHA512

      952b500e4a291a8bd58810529c1fcc17d969b082d29f00460aba6ada44a30ddc41595f8b0fe71e568ecba803df69985840f10f0a9e478c796c73dc5659ce314e

    • C:\ProgramData\Local\Google\rebol-view-278-3-1.exe

      Filesize

      844KB

      MD5

      aa2f4fd92fe00de85428f39a6e0e9cfd

      SHA1

      1def65dde53ab24c122da6c76646a36d7d910790

      SHA256

      215e28f9660472b6271a9902573c9d190e4d7ccca33fcf8d6054941d52a3ab85

      SHA512

      952b500e4a291a8bd58810529c1fcc17d969b082d29f00460aba6ada44a30ddc41595f8b0fe71e568ecba803df69985840f10f0a9e478c796c73dc5659ce314e

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\System Volume Information\SPP\metadata-2

      Filesize

      21.4MB

      MD5

      1e37ddf0ab6d04f2208bd1180d81a3b8

      SHA1

      93fb7a5b281b7ff210f5ac7a9f3ba8b2169eacd4

      SHA256

      fda20e75951325d84aa3ddd9be0d21676ea0e1e4b310827e3741203d5745ab59

      SHA512

      7bbaae9962bc1746d7c377462a17c0781fcff6349a6629109f4d992fc6ec93408d4c90f3414758e1781d1dfd0956f621e3caa3b3309ada5a4e733c0d83490004

    • \??\Volume{1385018a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{5887efa5-043c-43f6-b5f0-b359869517b6}_OnDiskSnapshotProp

      Filesize

      5KB

      MD5

      453ea8f9f6344e3f39623d449bb29f90

      SHA1

      fb5a935a2a0d4ffff5359719121cb5518e393d1b

      SHA256

      ea82575315d55911b7aed291cc0405faa44ccc3faa79f31b529539a8b75c8e5b

      SHA512

      eb8140e428102a8d73992993588be9eb0b864970d6cb68edef5bcbd77461f5e92fa1589af438937d5fc0afc18b8478688cd1c14dcb599b65a4e91f949dbf3b6b

    • memory/1092-135-0x0000000000000000-mapping.dmp

    • memory/1740-130-0x0000000000000000-mapping.dmp

    • memory/2076-131-0x0000000000000000-mapping.dmp

    • memory/2260-136-0x0000000000000000-mapping.dmp