Resubmissions

15-07-2022 15:30

220715-sxxcfacgcj 10

12-07-2022 18:09

220712-wrfdhsbgen 10

Analysis

  • max time kernel
    248s
  • max time network
    215s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2022 15:30

General

  • Target

    PDF_3028225.msi

  • Size

    484KB

  • MD5

    47847ac5f01e037c1a18becc0dfd4611

  • SHA1

    d6f37b18252787c2c2c31358e741d9b834440331

  • SHA256

    7d1c0c7e4cbfe49926451ab6365455e5f3889fb17e2508afa9f6e2ebeedaa2c1

  • SHA512

    7630b223cddfc31ef7afee9972ab4a5100b048d35f526211e331f4717260e2c29b0962ad35271701b00c5c379f7798004f5140abe8dbc88ddf083d8b2ee78004

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\PDF_3028225.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2076
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3432
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3724
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbs
        2⤵
          PID:4520
        • C:\Windows\system32\regsvr32.exe
          regsvr32.exe -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1596
          • C:\Windows\SysWOW64\regsvr32.exe
            -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
            3⤵
            • Loads dropped DLL
            PID:948
        • C:\Windows\system32\wscript.exe
          wscript.exe C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbs
          2⤵
            PID:4668
          • C:\Windows\system32\regsvr32.exe
            regsvr32.exe -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2632
            • C:\Windows\SysWOW64\regsvr32.exe
              -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
              3⤵
              • Loads dropped DLL
              PID:100
          • C:\Windows\system32\wscript.exe
            wscript.exe C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbs
            2⤵
            • Suspicious use of FindShellTrayWindow
            PID:3132
          • C:\Windows\system32\regsvr32.exe
            regsvr32.exe -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4456
            • C:\Windows\SysWOW64\regsvr32.exe
              -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
              3⤵
              • Loads dropped DLL
              PID:1956
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:4696
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:2932
          • C:\Windows\System32\msiexec.exe
            "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\PDF_3028225.msi"
            1⤵
            • Enumerates connected drives
            • Suspicious use of FindShellTrayWindow
            PID:5020
          • C:\Windows\System32\msiexec.exe
            "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\PDF_3028225.msi"
            1⤵
            • Enumerates connected drives
            • Suspicious use of FindShellTrayWindow
            PID:4408

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Discovery

          Query Registry

          2
          T1012

          Peripheral Device Discovery

          2
          T1120

          System Information Discovery

          2
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_32ADABCB823BA1231EA36C215C0D3FFB
            Filesize

            727B

            MD5

            0d26fcd430e8da3f1d2268e5f2c96948

            SHA1

            fde47603630d4b585d3d9d0b9c71a2d04b8d0e4f

            SHA256

            98a8204e097137c5ac750cb4154fe9579c2254180cc842f15d8344e8e2be37ee

            SHA512

            80ba38928c8d6eedfb8e0cb537f0bbab152918c2c65b917ecf33ebad22a49976783560dd963f253dd5a439ee2de695802f357cba2a8aa29b9bd5dc72eb71673a

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
            Filesize

            727B

            MD5

            a485d69614a6015dd87f332f156dbcda

            SHA1

            e173979fc219cc09b20f79a8ac9d2ee72d93668d

            SHA256

            44a294a4e02743fc51bfa36b844d2cbf5f7ee94a9476dcd01ff5300a71860c48

            SHA512

            4f7d64e45b6cb134c8676a4b1e2cc3e43bf24c15670aa8f9b7a4101ca8383d3c2bcf09dfc3856847e72168043dd8ddcf553cf5ecfe99c69032b8eb48508dad60

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_32ADABCB823BA1231EA36C215C0D3FFB
            Filesize

            408B

            MD5

            0e36baba2bff4f95b60f07398f309e91

            SHA1

            71621ae41ccf4994b220e25df353a7aeff1b4ceb

            SHA256

            fa9df9778c0053b6e553d0464c60c7ecead34642b2118c4c1a277d4236038af4

            SHA512

            082de27c17e705fb6ef00d1db682ac089e3609ee2876ed3e02a7f88fe6c87579288f93376b8fb67282763ee8a993f06b13f570dd9ab25a3138ffa635992457bf

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
            Filesize

            412B

            MD5

            59b7458d0639572cea235781e09ac281

            SHA1

            1e4ef8c7688ee13f94ca5515d7721d12662836b2

            SHA256

            7673a36ce4f1c69eecf315f25d31fc0054d27eba7e689063acd22f7ac464454c

            SHA512

            a66a67fab3520a9418ede063f52fde2572ce186c10e9ff8ee3c2eb46ee9212e5031e3ac2a07094a1a52b57f202c12fa6076968fe1e1a808a114fd37b44f900d2

          • C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
            Filesize

            777KB

            MD5

            926382093a313282f4a1639944f3fb0c

            SHA1

            851380d94deeb031aad806795d760f3982399850

            SHA256

            1ce7c87d8dc79ace14eb2a1be829f2d3b321b70717f723a61998ab3b9112eec8

            SHA512

            f315d01e8475c4bc73a9c2e18c17c462b826dec66d9900534f0ccddd08f782642828fe1c2b3a04049f82c38f24cd48f419c7d1c91200ca1de32f27642ac145d3

          • C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
            Filesize

            777KB

            MD5

            926382093a313282f4a1639944f3fb0c

            SHA1

            851380d94deeb031aad806795d760f3982399850

            SHA256

            1ce7c87d8dc79ace14eb2a1be829f2d3b321b70717f723a61998ab3b9112eec8

            SHA512

            f315d01e8475c4bc73a9c2e18c17c462b826dec66d9900534f0ccddd08f782642828fe1c2b3a04049f82c38f24cd48f419c7d1c91200ca1de32f27642ac145d3

          • C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
            Filesize

            777KB

            MD5

            926382093a313282f4a1639944f3fb0c

            SHA1

            851380d94deeb031aad806795d760f3982399850

            SHA256

            1ce7c87d8dc79ace14eb2a1be829f2d3b321b70717f723a61998ab3b9112eec8

            SHA512

            f315d01e8475c4bc73a9c2e18c17c462b826dec66d9900534f0ccddd08f782642828fe1c2b3a04049f82c38f24cd48f419c7d1c91200ca1de32f27642ac145d3

          • C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
            Filesize

            777KB

            MD5

            926382093a313282f4a1639944f3fb0c

            SHA1

            851380d94deeb031aad806795d760f3982399850

            SHA256

            1ce7c87d8dc79ace14eb2a1be829f2d3b321b70717f723a61998ab3b9112eec8

            SHA512

            f315d01e8475c4bc73a9c2e18c17c462b826dec66d9900534f0ccddd08f782642828fe1c2b3a04049f82c38f24cd48f419c7d1c91200ca1de32f27642ac145d3

          • C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbs
            Filesize

            68B

            MD5

            0308aa2c8dab8a69de41f5d16679bb9b

            SHA1

            c6827bf44a433ff086e787653361859d6f6e2fb3

            SHA256

            0a7e8fd68575db5f84c18b9a26e4058323d1357e2a29a5b12278e4bfa6939489

            SHA512

            1a1ca92e3c8d52c8b5adbb3117a88d8a2a8c33eaf2f7b0d620fe006653f57f4ba0b803884616594ca31e13a1b0b59ddae52cecf044621ec44371084dac6beb72

          • C:\Windows\Installer\e56fb3f.msi
            Filesize

            484KB

            MD5

            47847ac5f01e037c1a18becc0dfd4611

            SHA1

            d6f37b18252787c2c2c31358e741d9b834440331

            SHA256

            7d1c0c7e4cbfe49926451ab6365455e5f3889fb17e2508afa9f6e2ebeedaa2c1

            SHA512

            7630b223cddfc31ef7afee9972ab4a5100b048d35f526211e331f4717260e2c29b0962ad35271701b00c5c379f7798004f5140abe8dbc88ddf083d8b2ee78004

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
            Filesize

            23.0MB

            MD5

            3483877b3986a5f5a034114a2dc5d44b

            SHA1

            a3d2e17886299b0066f17c59cd207acfcc49abfa

            SHA256

            39367e786bd7b8d176523554529399581f2fa7083cc228a8e0df721eb5f9272f

            SHA512

            ae2cafde588de63bfff4f870f94fadc0a31a57c35720de35fa225ae18c884e95f6e97e831055776090aeca3719aaa9a81e7563a16f137eb6f5bcaa24f07803bc

          • \??\Volume{edc211e1-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{86167eba-3cdc-4083-896e-22e7398e9f18}_OnDiskSnapshotProp
            Filesize

            5KB

            MD5

            302582000777702f09694fa689c32f9f

            SHA1

            2627705d0f861da0b89dcd0cd6de23237da1b687

            SHA256

            dd299005d698bbb2fb50c82cd4b927060ce8349eca17c2e1f0aa631a78752749

            SHA512

            6aec739226401424123fe4f099a23a12b0944d52304bc7b948d43ef627d01b0247392103b2093f9ec7d785b91a7d7fabfde2bfa1fdf97bf24d788597e7bf9038

          • memory/100-146-0x0000000000000000-mapping.dmp
          • memory/948-139-0x0000000000000000-mapping.dmp
          • memory/1596-136-0x0000000000000000-mapping.dmp
          • memory/1956-150-0x0000000000000000-mapping.dmp
          • memory/2632-145-0x0000000000000000-mapping.dmp
          • memory/3132-148-0x0000000000000000-mapping.dmp
          • memory/3724-130-0x0000000000000000-mapping.dmp
          • memory/4456-149-0x0000000000000000-mapping.dmp
          • memory/4520-135-0x0000000000000000-mapping.dmp
          • memory/4668-144-0x0000000000000000-mapping.dmp