Analysis

  • max time kernel
    146s
  • max time network
    116s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    17-06-2022 06:07

General

  • Target

    7e37d028789ab2b47bcab159da6458da2e8198617b0e7760174e4a0eea07d9c9.msi

  • Size

    224KB

  • MD5

    6892679f8a4b438c582c9954e15acd19

  • SHA1

    546bae92165363acd3e0aaef964cc02ec2a2e67d

  • SHA256

    7e37d028789ab2b47bcab159da6458da2e8198617b0e7760174e4a0eea07d9c9

  • SHA512

    064ece5fe73a356d9078e13134288e144288bd9e9d8d06cdd72f3aaf4cc9d397b5443be67e2d07f78a282d875187a9679e19506ae580d84c9a44142da366f108

Score
10/10

Malware Config

Signatures

  • Matanbuchus

    A loader sold as MaaS first seen in February 2021.

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\7e37d028789ab2b47bcab159da6458da2e8198617b0e7760174e4a0eea07d9c9.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1528
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Windows\SysWOW64\regsvr32.exe
        -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
        3⤵
        • Loads dropped DLL
        PID:280
    • C:\Windows\system32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbs
      2⤵
        PID:1740
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1916
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000244" "0000000000000594"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2020

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      60KB

      MD5

      308336e7f515478969b24c13ded11ede

      SHA1

      8fb0cf42b77dbbef224a1e5fc38abc2486320775

      SHA256

      889b832323726a9f10ad03f85562048fdcfe20c9ff6f9d37412cf477b4e92ff9

      SHA512

      61ad97228cd6c3909ef3ac5e4940199971f293bdd0d5eb7916e60469573a44b6287c0fa1e0b6c1389df35eb6c9a7d2a61fdb318d4a886a3821ef5a9dab3ac24f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4

      Filesize

      1KB

      MD5

      78f2fcaa601f2fb4ebc937ba532e7549

      SHA1

      ddfb16cd4931c973a2037d3fc83a4d7d775d05e4

      SHA256

      552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac89988

      SHA512

      bcad73a7a5afb7120549dd54ba1f15c551ae24c7181f008392065d1ed006e6fa4fa5a60538d52461b15a12f5292049e929cffde15cc400dec9cdfca0b36a68dd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      92e31644129e4dc719b81741d6e8fe6d

      SHA1

      a4c481890b96220d06844706d580df8db85c490e

      SHA256

      ac6a6ff12ff451848e18cbea6424ed0cab5c54d7429171e57354658c66edf026

      SHA512

      8803bd99dfa426c209d3dec194ffb1ad21910171e43b2ef7fec2111985057cc97b198bb3e0af9937988408bcaa6570efe576f334372b5b9d2b6dbba97c440361

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4

      Filesize

      254B

      MD5

      cc92a5d2b43a0d6822918e3621fece27

      SHA1

      1759e9888458ae4fa96bd46b84c6c31aef1fe2aa

      SHA256

      ce7ec17670d41a9b40c234e26014de0e4b097172030a8572c2f4e9aa0901e5fd

      SHA512

      20da189f1f329594c9040141facf0cffbff4ce7351c84846e5bd780f4d8f00a80cca1f98f7965ccc165cef557593e2308bf2f1638bb61fed2e06a4ffde5ea3d6

    • C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll

      Filesize

      401KB

      MD5

      8f4c28685a3373241bec9af4bf6a6a3e

      SHA1

      b17610603b063aff1f48bfcaba4f4d4a25579eef

      SHA256

      7efb8b4ac75560f1f21db9c1a77b2199921f53d74c3d4d6318852cfcdebc066a

      SHA512

      f9a3cc700320f069d7bdfd7ed49c576757974a328d254a2a28976d226354ee8bb2020d186766a1c4503e3f1a1a6e10fc8ff59995fe97cbc3abbd1ed868a1d4a6

    • C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbs

      Filesize

      68B

      MD5

      0308aa2c8dab8a69de41f5d16679bb9b

      SHA1

      c6827bf44a433ff086e787653361859d6f6e2fb3

      SHA256

      0a7e8fd68575db5f84c18b9a26e4058323d1357e2a29a5b12278e4bfa6939489

      SHA512

      1a1ca92e3c8d52c8b5adbb3117a88d8a2a8c33eaf2f7b0d620fe006653f57f4ba0b803884616594ca31e13a1b0b59ddae52cecf044621ec44371084dac6beb72

    • \Users\Admin\AppData\Local\AdobeFontPack\main.dll

      Filesize

      401KB

      MD5

      8f4c28685a3373241bec9af4bf6a6a3e

      SHA1

      b17610603b063aff1f48bfcaba4f4d4a25579eef

      SHA256

      7efb8b4ac75560f1f21db9c1a77b2199921f53d74c3d4d6318852cfcdebc066a

      SHA512

      f9a3cc700320f069d7bdfd7ed49c576757974a328d254a2a28976d226354ee8bb2020d186766a1c4503e3f1a1a6e10fc8ff59995fe97cbc3abbd1ed868a1d4a6

    • memory/280-66-0x0000000074DC1000-0x0000000074DC3000-memory.dmp

      Filesize

      8KB

    • memory/1528-54-0x000007FEFBB81000-0x000007FEFBB83000-memory.dmp

      Filesize

      8KB