Resubmissions

20/12/2022, 18:17

221220-ww6fhadf6x 8

20/12/2022, 14:06

221220-reqaqsch9y 8

Analysis

  • max time kernel
    1797s
  • max time network
    1800s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    20/12/2022, 18:17

General

  • Target

    ke.msi

  • Size

    36KB

  • MD5

    c0de445dfe49d2932cc7a55e81b06a38

  • SHA1

    96738932eceae5ca5196401c059532024fce9d56

  • SHA256

    0d604def7d8c28469c49fa5d12a8deddb56ebbdf03fb4de5b31484b6a4ace3a0

  • SHA512

    5ad5bf1ce13b6e8f9972d8801a084ad490efda8580d9b103640edbe34cf166d7ffab294f2c38e91340c30235b84e076490a01379873a3b41601e67e395ff28ba

  • SSDEEP

    384:0mcA5s8B88y+J4Hby3M5koXbGWv3m8V4x5Pey3M5sC0Loj8H:ro+uWMxGIweWMmC

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 64 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 44 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ke.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1748
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\system32\wscript.exe
      "wscript.exe" "Terminal App Service.vbs"
      2⤵
        PID:1552
      • C:\Windows\system32\wscript.exe
        "wscript.exe" "app.js"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1216
        • C:\ProgramData\Dored\i_view32.exe
          "C:\ProgramData\Dored\i_view32.exe" /capture /convert=skev.jpg
          3⤵
          • Executes dropped EXE
          PID:564
        • C:\Windows\System32\wbem\WMIC.exe
          "C:\Windows\System32\wbem\WMIC.exe" product where name='FLibrary' call uninstall /nointeractive
          3⤵
            PID:1200
        • C:\Windows\system32\wscript.exe
          "wscript.exe" "index.js"
          2⤵
            PID:684
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:524
        • C:\Windows\system32\DrvInst.exe
          DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000328" "0000000000000320"
          1⤵
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:1612

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Cis\Terminal App Service.vbs

          Filesize

          262B

          MD5

          323b8e4888440687ec3a20708b52760c

          SHA1

          aeb7051bb3bb7b1ed73d7f58fb2b279863cbc785

          SHA256

          27217d815fc504f6cb9d531028da2f058eb5ac4782e952290c19aacfaa1459da

          SHA512

          36ea0ec78b54c84a284496ac25499c41554422674bcbf093e5d489da974266441948a8dffaba9393d55cdb22544a4f67166bbebbdc788ab48e082e7588f35eb6

        • C:\ProgramData\Dored\app.js

          Filesize

          211B

          MD5

          89e320093ce9d3a9e61e58c1121b76e7

          SHA1

          a83783769a0a36d7560e4596aa53c3422c41ec88

          SHA256

          5496156c5c7d349f998d470231410b5ecfc62dd245eb686a8e77f5f40a28cac7

          SHA512

          403522e9b6a3058a12604c225f150f55a44034908b8ca32d534764717eb351db9252fab1ef7f5892d453a9c750b1b10afa8797df0c110adfb5b6ff9d5f48b9d3

        • C:\ProgramData\Dored\i_view32.exe

          Filesize

          1.9MB

          MD5

          b103655d23aab7ff124de7ea4fbc2361

          SHA1

          904bf233b9070af245f4dbcae11828615ef8715b

          SHA256

          6e53a93fc2968d90891db6059bac49e975c09546e19a54f1f93fb01a21318fdc

          SHA512

          fda0e3855522039d3b56e15b169b4c634672ca181ced78a479b6723c22ce889308db55aa1ea58fa8cb01ed1657fddc52a2c45d904c6eb5b852a171bcba310a52

        • C:\ProgramData\Dored\i_view32.exe

          Filesize

          1.9MB

          MD5

          b103655d23aab7ff124de7ea4fbc2361

          SHA1

          904bf233b9070af245f4dbcae11828615ef8715b

          SHA256

          6e53a93fc2968d90891db6059bac49e975c09546e19a54f1f93fb01a21318fdc

          SHA512

          fda0e3855522039d3b56e15b169b4c634672ca181ced78a479b6723c22ce889308db55aa1ea58fa8cb01ed1657fddc52a2c45d904c6eb5b852a171bcba310a52

        • C:\ProgramData\Dored\index.js

          Filesize

          742B

          MD5

          44839c07923d8a37f49782e6a2567950

          SHA1

          21e6e88de9b6efa47b0dc137ae942bdb6b113192

          SHA256

          ca830dabaa78487702826679e1d0caa7acb7ff2688537a2025aabb0b57fbd414

          SHA512

          d6484cf875a8970ad8826ec522acc1015233180c416c701c5b0bca71f8a29da2bd85aba9010d3e05178b898e20c2e6c76cdeae97e5a2995f53946d8c5cbb5e0b

        • C:\ProgramData\Dored\skev.jpg

          Filesize

          71KB

          MD5

          847b479cfa8370eb9a21c9bf43e978e4

          SHA1

          4c006684a7cfe4b6e88c933b92e2b59389cc39d1

          SHA256

          8374048162337e7a3927a07c07e70ac87028378f414a9bc51f45ab16b2c17dea

          SHA512

          6b33433ce2e1a8cf4f24f20fd95188bdb22971fa8293cddf246318970ddbe23bae27429a0d2ae379c745bfead25dc0bc1ea0d99822d4c2f7e3fc9f85c4364749

        • memory/564-66-0x00000000759F1000-0x00000000759F3000-memory.dmp

          Filesize

          8KB

        • memory/1748-54-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmp

          Filesize

          8KB