Resubmissions

07-03-2023 13:26

230307-qpnn8aab39 7

Analysis

  • max time kernel
    133s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-03-2023 13:26

General

  • Target

    HVLink PRO 11.8.exe

  • Size

    20.2MB

  • MD5

    384387b50491c9e3529266208dc71cae

  • SHA1

    c26179116c0580ee4948609cb26eae9a375a1212

  • SHA256

    4b90f2d99230bdb928785f4cc579cfc81f49a4dfaff105ef54177978568237a5

  • SHA512

    8dfefe451ab2789ea6974c9731e15703cb17b1c6fe48a423cbcd417280ead84fab50ad81e337c94204a455a45e5447bc4e9ceb84f07b9c4037e587c51a0bed40

  • SSDEEP

    393216:DC84hfEuGvUiqu1BEIuZCYHkiu5NGzuEgwQ1f8z9myu2KB6nE:mlEua1XjEAykz5NCW1kz9KNBN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HVLink PRO 11.8.exe
    "C:\Users\Admin\AppData\Local\Temp\HVLink PRO 11.8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Windows\SysWOW64\MSIEXEC.EXE
      MSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Downloaded Installations\{02BBEA84-3A94-48FB-A354-D88D746DC4DE}\HVLink PRO.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="HVLink PRO 11.8.exe"
      2⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1188
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1828

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Downloaded Installations\{02BBEA84-3A94-48FB-A354-D88D746DC4DE}\HVLink PRO.msi

    Filesize

    18.2MB

    MD5

    8ab0e73849e6fda71c6bacdfd6043c4a

    SHA1

    a90415bbf26a2bc0e228398209a2f25aed6003dd

    SHA256

    5ceadb670e7b88039f64c85163fcba7ae3f6176f71fe5ae4d8b074ac8afecf92

    SHA512

    a75d75f001e3ecea28a592729ad670e86c5fb2497f40bb13bc2ceac58098ba0fcfbf0e538f4e79f7577d7b808be2d4f4420f788e85a9c54a30e1a1c94e12a079

  • C:\Users\Admin\AppData\Local\Downloaded Installations\{02BBEA84-3A94-48FB-A354-D88D746DC4DE}\HVLink PRO.msi

    Filesize

    18.2MB

    MD5

    8ab0e73849e6fda71c6bacdfd6043c4a

    SHA1

    a90415bbf26a2bc0e228398209a2f25aed6003dd

    SHA256

    5ceadb670e7b88039f64c85163fcba7ae3f6176f71fe5ae4d8b074ac8afecf92

    SHA512

    a75d75f001e3ecea28a592729ad670e86c5fb2497f40bb13bc2ceac58098ba0fcfbf0e538f4e79f7577d7b808be2d4f4420f788e85a9c54a30e1a1c94e12a079

  • C:\Users\Admin\AppData\Local\Temp\_is1D19.tmp

    Filesize

    1KB

    MD5

    3446ed6433d6a84e8929983cc5612e8f

    SHA1

    3d49d49a6b416fccc3ef0d8f59ee982a47519d43

    SHA256

    950aa196173b8b071e4ab1cc3b7f94c518f7da03616c5753485abb9b987c72fc

    SHA512

    005cc1d731eeca47397479df739c7f8b37441f7e8c64b788ed305c27834bc373b0b292f4cb2e0078093284dcc8ab8c17ed359d25bfe871164d73f0e4a62ec202

  • C:\Users\Admin\AppData\Local\Temp\{37C6CB1C-7652-4D14-920B-5053311408AF}\0x0409.ini

    Filesize

    20KB

    MD5

    36affbd6ff77d1515cfc1c5e998fbaf9

    SHA1

    950d00ecc2e7fd2c48897814029e8eedf6397838

    SHA256

    fccc7f79d29318d8ae78850c262bac762c28858709a6e6cf3b62bcd2729a61e3

    SHA512

    2f29de86d486db783872581a43a834e5064d1488bc3f085ddc5a3287eb9ee8a4ce93d66f7b4965cafb3c4f06b38d4b0fcfdc0fcb1f99d61331a808e5d6011808

  • C:\Users\Admin\AppData\Local\Temp\~1345.tmp

    Filesize

    2KB

    MD5

    f4775c3c154bd770e214f6b8d1b754e6

    SHA1

    9a2c4e8ab8bc9ed1d8c8ff07dcacdfdb3cadb023

    SHA256

    f38d49e17d208bb74a4e83b96f465017d20ef97e3461f161bacf0265eef48d26

    SHA512

    d622d9237fa0693221244ab7aa2484bb5ddb01a861f3fd54ebd851b00d397c2b60a54a06a1fb3eedebe82126a0f8d478b7a0f629cd7e3172912f863e1d8c6400