Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/01/2023, 05:11

General

  • Target

    AsusSetup.exe

  • Size

    4.5MB

  • MD5

    f7fb56068b8070f3c68ddfbfd52983ad

  • SHA1

    fb8395c271a8a7b14655d57d3270684515ca828d

  • SHA256

    93fc1c1b990f8cabf405cf4910c9879eefd53ace9423e10434d59410c5bde5ab

  • SHA512

    63a9a62f9e588f63e15a938b2f42663fb64d66b7ac2340f543c98f6727bf7dc621cc1b35b480c4edfe2788b265e14d5a17fa49846c57984ac0a8ef1307670baf

  • SSDEEP

    98304:UmuSFdw5ujhIMdcbJFLOAkGkzdnEVomFHKnPM:Th6MdcNFLOyomFHKnPM

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 15 IoCs
  • Drops file in Windows directory 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AsusSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\AsusSetup.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Windows\system32\cmd.exe
      /C "C:\Users\Admin\AppData\Local\Temp\Install.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Windows\System32\pnputil.exe
        .\pnputil /add-driver "C:\Users\Admin\AppData\Local\Temp\ibtusb.inf" /install
        3⤵
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        PID:2036
      • C:\Windows\system32\pnputil.exe
        C:\Windows/system32/pnputil /add-driver ibtusb.inf /install
        3⤵
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        PID:2728
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{ffeeece4-0e75-3143-b83b-83f82d18c260}\ibtusb.inf" "9" "4873f9b9b" "000000000000014C" "WinSta0\Default" "0000000000000164" "208" "C:\Users\Admin\AppData\Local\Temp"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:376

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{FFEEE~1\ibtusb.cat

    Filesize

    11KB

    MD5

    0db4de032357484ccb341e63508d0550

    SHA1

    43560859a2cd9d42c847da98f7aa8690bfd1ff77

    SHA256

    1adfe363507187084bf4eff10c77c2ee8a5cf6c2761ee4f65762bfef224bb0b0

    SHA512

    3ace2fe93f241f7f6a7700019c45ef23c964b81d300467085ae57710f3c8a37110a42b944680ed67626e77117dfc074ac6d6ee6292c6fdc4050d95781bad7b3b

  • C:\Users\Admin\AppData\Local\Temp\{FFEEE~1\ibtusb.sys

    Filesize

    6.3MB

    MD5

    b5d96421a2bb00864c5865782ab76566

    SHA1

    572c5a2f03c60d58cd4eb2eafa9af648590a76e5

    SHA256

    15c52142638e99828fe4dc537fca15425c97a33262faf3fbc43d4eee44f45259

    SHA512

    25ae4f539e808c78b62f270eb4cc668ce97635577300f0844950d26249f7808b61ad6a0e9aed7f84a09911582cca14f17b112831f4d20911d670b6ca1e22a839

  • C:\Users\Admin\AppData\Local\Temp\{ffeeece4-0e75-3143-b83b-83f82d18c260}\ibtusb.inf

    Filesize

    35KB

    MD5

    7be782b39efc950f66bfacf722649f63

    SHA1

    eb313722e8fde13b7bdac599213736ae6450676d

    SHA256

    b05b1f42c4fc01079bf1ab334bf281247b65b7c54c568fc9388d3ab7c6a657b0

    SHA512

    e93bde2e05ba9737b5ecaa523b225cd1e8c9052414aea0d95b2acebdbcd8b6f9a1b90812770f2524c0977e16e711f49c72d23f3211aae13fb0d97e795d7c1cba

  • C:\Windows\INF\oem2.inf

    Filesize

    35KB

    MD5

    7be782b39efc950f66bfacf722649f63

    SHA1

    eb313722e8fde13b7bdac599213736ae6450676d

    SHA256

    b05b1f42c4fc01079bf1ab334bf281247b65b7c54c568fc9388d3ab7c6a657b0

    SHA512

    e93bde2e05ba9737b5ecaa523b225cd1e8c9052414aea0d95b2acebdbcd8b6f9a1b90812770f2524c0977e16e711f49c72d23f3211aae13fb0d97e795d7c1cba

  • C:\Windows\System32\DriverStore\FileRepository\ibtusb.inf_amd64_615ca03970ce1e94\ibtusb.inf

    Filesize

    35KB

    MD5

    7be782b39efc950f66bfacf722649f63

    SHA1

    eb313722e8fde13b7bdac599213736ae6450676d

    SHA256

    b05b1f42c4fc01079bf1ab334bf281247b65b7c54c568fc9388d3ab7c6a657b0

    SHA512

    e93bde2e05ba9737b5ecaa523b225cd1e8c9052414aea0d95b2acebdbcd8b6f9a1b90812770f2524c0977e16e711f49c72d23f3211aae13fb0d97e795d7c1cba