Analysis
-
max time kernel
206s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-07-2022 12:37
Static task
static1
Behavioral task
behavioral1
Sample
db.msi
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
db.msi
Resource
win10v2004-20220414-en
General
-
Target
db.msi
-
Size
992KB
-
MD5
1b43d95fd338cf086f37372314aa6b62
-
SHA1
b464fe581b4411eca737a3814ad867cd3271e394
-
SHA256
3afb8aec8a275aa2e3e5f1414a5a657a1721b12d1af4d3b44763b3a4d2481051
-
SHA512
6ca5aa81954f5097fcf1c092370dd7564f611ca0d5afa3121d7903ccec8e65f022085686472d1c63410e8d2f6bdeffa5e803f8867f3055f3e773237b3c458d9b
Malware Config
Signatures
-
Matanbuchus
A loader sold as MaaS first seen in February 2021.
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 4712 regsvr32.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe -
Drops file in Windows directory 8 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\SourceHash{A4307286-F53F-4688-AE2C-4583461679F1} msiexec.exe File opened for modification C:\Windows\Installer\MSI447B.tmp msiexec.exe File created C:\Windows\Installer\e574279.msi msiexec.exe File created C:\Windows\Installer\e574277.msi msiexec.exe File opened for modification C:\Windows\Installer\e574277.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe -
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exevssvc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msiexec.exetaskmgr.exepid process 5064 msiexec.exe 5064 msiexec.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exedescription pid process Token: SeShutdownPrivilege 3764 msiexec.exe Token: SeIncreaseQuotaPrivilege 3764 msiexec.exe Token: SeSecurityPrivilege 5064 msiexec.exe Token: SeCreateTokenPrivilege 3764 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3764 msiexec.exe Token: SeLockMemoryPrivilege 3764 msiexec.exe Token: SeIncreaseQuotaPrivilege 3764 msiexec.exe Token: SeMachineAccountPrivilege 3764 msiexec.exe Token: SeTcbPrivilege 3764 msiexec.exe Token: SeSecurityPrivilege 3764 msiexec.exe Token: SeTakeOwnershipPrivilege 3764 msiexec.exe Token: SeLoadDriverPrivilege 3764 msiexec.exe Token: SeSystemProfilePrivilege 3764 msiexec.exe Token: SeSystemtimePrivilege 3764 msiexec.exe Token: SeProfSingleProcessPrivilege 3764 msiexec.exe Token: SeIncBasePriorityPrivilege 3764 msiexec.exe Token: SeCreatePagefilePrivilege 3764 msiexec.exe Token: SeCreatePermanentPrivilege 3764 msiexec.exe Token: SeBackupPrivilege 3764 msiexec.exe Token: SeRestorePrivilege 3764 msiexec.exe Token: SeShutdownPrivilege 3764 msiexec.exe Token: SeDebugPrivilege 3764 msiexec.exe Token: SeAuditPrivilege 3764 msiexec.exe Token: SeSystemEnvironmentPrivilege 3764 msiexec.exe Token: SeChangeNotifyPrivilege 3764 msiexec.exe Token: SeRemoteShutdownPrivilege 3764 msiexec.exe Token: SeUndockPrivilege 3764 msiexec.exe Token: SeSyncAgentPrivilege 3764 msiexec.exe Token: SeEnableDelegationPrivilege 3764 msiexec.exe Token: SeManageVolumePrivilege 3764 msiexec.exe Token: SeImpersonatePrivilege 3764 msiexec.exe Token: SeCreateGlobalPrivilege 3764 msiexec.exe Token: SeBackupPrivilege 1840 vssvc.exe Token: SeRestorePrivilege 1840 vssvc.exe Token: SeAuditPrivilege 1840 vssvc.exe Token: SeBackupPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe Token: SeTakeOwnershipPrivilege 5064 msiexec.exe Token: SeRestorePrivilege 5064 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msiexec.exetaskmgr.exepid process 3764 msiexec.exe 3764 msiexec.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe 4496 taskmgr.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
msiexec.exeregsvr32.exedescription pid process target process PID 5064 wrote to memory of 1660 5064 msiexec.exe srtasks.exe PID 5064 wrote to memory of 1660 5064 msiexec.exe srtasks.exe PID 5064 wrote to memory of 4396 5064 msiexec.exe regsvr32.exe PID 5064 wrote to memory of 4396 5064 msiexec.exe regsvr32.exe PID 4396 wrote to memory of 4712 4396 regsvr32.exe regsvr32.exe PID 4396 wrote to memory of 4712 4396 regsvr32.exe regsvr32.exe PID 4396 wrote to memory of 4712 4396 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\db.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3764
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:1660
-
-
\??\c:\windows\system32\regsvr32.exec:\windows\system32\regsvr32.exe -n -i:"Update Installation" "C:\Users\Admin\AppData\Local\AdobeStockClient\ado.lic"2⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\regsvr32.exe-n -i:"Update Installation" "C:\Users\Admin\AppData\Local\AdobeStockClient\ado.lic"3⤵
- Loads dropped DLL
PID:4712
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4496
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD564a2807bc1385ee99c892012ed0a62bf
SHA11d21c43b582ca6ad77714c05976fe5827f028bd0
SHA256e66c2a09074fa94390262c8b925988e7d9a085edcc97cad79e2ccc9c0e862567
SHA51278352c8643206849726ff7240d9a80faedc76f9586943dd8cdb649ff62af658a849258783fec50157b5f7118a0442ab538a475886d44a2993b2aa7be1b5b46a1
-
Filesize
2.5MB
MD564a2807bc1385ee99c892012ed0a62bf
SHA11d21c43b582ca6ad77714c05976fe5827f028bd0
SHA256e66c2a09074fa94390262c8b925988e7d9a085edcc97cad79e2ccc9c0e862567
SHA51278352c8643206849726ff7240d9a80faedc76f9586943dd8cdb649ff62af658a849258783fec50157b5f7118a0442ab538a475886d44a2993b2aa7be1b5b46a1
-
Filesize
23.0MB
MD5f267ab50774ca2882c0b1f6b0813769e
SHA1ddc6b7972a8b05dd2fbe96a3352bfea476304e59
SHA2566ebb7cbbff3f8e71842aec896e103337b52501b8c1e42fd287e0711213732d47
SHA512ff0933b191e128bfc3db7ec2049bf0b927cd12b6caacd353b4ff45a18d6c5ac9cb17c93825252f9455cc3b4a5abf6599b80e5d512e102498a29fee16b7f48064
-
\??\Volume{5acfaf36-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{54cd4090-ee3b-4651-94a5-eaf0e0b22b52}_OnDiskSnapshotProp
Filesize5KB
MD5ba9549616f034a788698241556d745b8
SHA10d06aa0d4682b46311e0a684780caecac291fb68
SHA2562e7d949d468a701f337d0c4f96e625e32cebea6e1a2b8b87089f7b5222023b76
SHA512ad7ee0db7f62d244337376b34c533ff2a1206c9fb2c7ffb21dd0a42acf8e1de085e7f24fca3e05547e0c371bb0a7a22ce6d1148be0748fd31abe76af38b7a8b5