Analysis

  • max time kernel
    64s
  • max time network
    101s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03/04/2023, 09:31

General

  • Target

    b3.msi

  • Size

    116.2MB

  • MD5

    d0e17863388ca516c2f400a40ed36c60

  • SHA1

    afb74843e1d4fa1308358efe54a3f55727240c03

  • SHA256

    9ab088aa97b858588bc10e9f45770515fd4e437f95b4171b6746ae55589261e9

  • SHA512

    c3226588152bbaa654c4e586bfe79e9a1b3eb8fac65cbd6042c0d252e5ccf83efe0e276de8525166bcd6b1ffd6f60826e6718075554befee5b30f88e7e137fd4

  • SSDEEP

    3145728:tcAqhqmGLNC7/Y37u2cXP26ZXSTMovMgw+MfkBgcEOE/TeSMymrZV9PC:Rqhqt8/Y/2E5JMlOE/a3TrZ

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 7 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\b3.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1744
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\3u.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pckawvl0.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESADDE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCADCD.tmp"
          4⤵
            PID:700
      • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\3utools.exe
        "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\3utools.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:928
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1984
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004A4" "0000000000000060"
      1⤵
      • Modifies data under HKEY_USERS
      PID:1380

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\6c8fd4.rbs

            Filesize

            7KB

            MD5

            330d2a3de901572c1434872c858982ad

            SHA1

            1962e3f2e2804962d0595442abd4ee4f5a44614b

            SHA256

            6d9d1c7a7f4501a203a87a6acd01eea36fe6ef9565cb0943834cd79e0e38011e

            SHA512

            370af5653efe0657d118f2909c59dd6d9f3af5b6bbdd6e1d74b3f2dd49d4bc96aef92724ffb3783fea0ce7bf8d0727c8dea9c56970f15f4d28201fa9b38f9f52

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

            Filesize

            765B

            MD5

            03bba4e6d2deb3c7e5d74676d54a6b96

            SHA1

            90625b4d62b32e763ac931ed14b68c2d88daff7b

            SHA256

            78ac0a59a1aea99ba88f561cc3c5979db21ce79ee75ff8bb40ebee6c0d083bf6

            SHA512

            f5fef2ca579e6d036aaf09b8a66497d26ab86c7d2b64c6b5ca0c2979e3eef96893c2083b44d7bcdc16962b2483f0e03572c763e46505eabe42b19c09719e7ae2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            61KB

            MD5

            e71c8443ae0bc2e282c73faead0a6dd3

            SHA1

            0c110c1b01e68edfacaeae64781a37b1995fa94b

            SHA256

            95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

            SHA512

            b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            61KB

            MD5

            e71c8443ae0bc2e282c73faead0a6dd3

            SHA1

            0c110c1b01e68edfacaeae64781a37b1995fa94b

            SHA256

            95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

            SHA512

            b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_CCB3FD273CCB7AA7C328D7725A0C2EAA

            Filesize

            637B

            MD5

            772641e6d2f7cc3ef108651a49c71145

            SHA1

            5df8298cae8fbe544bf1d174c14d7629d327cb5c

            SHA256

            fcb26f0586ba56ab1848b0aa7e022110a68be51818eb3b49dce688795095926f

            SHA512

            392c6c8fe6f264326f5e13ae5542b67c5035ca8acd2ea2b7341801f09282f919490e7475b228767fb3dc3bd247c8eda630256954806dfb72ca074a3e17c624a2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

            Filesize

            1KB

            MD5

            ca4ff574e1bdefcc998408807190d9b3

            SHA1

            5392599f4bee259e5e4f626353b4a76cfbbb0d6f

            SHA256

            e66688fd39c0ff128dfbc66ca13e37ff81a8a8372c9a01c22d95ae8bc719303b

            SHA512

            76e2437de262ec547de8061b484de75fb423f4bcb358eb2d916c7fc5f807a2681239ef5e427e5849eff7896070813b3a04c4b68e97ce9ec64f31f421d1b9848b

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

            Filesize

            484B

            MD5

            15189e90287452bfdf0efbc99f9b45e7

            SHA1

            dbf8ae78ceb23368b346a0c7d2c71997f8b9c768

            SHA256

            05a47d247075a2797be2541b6553815abcde41712b5dd0ea2e583a24b730861a

            SHA512

            d6a40f814de908a78af46cc737e058eff86bec52f891b8b2c8800319b706b5b4182f2fad323c01f7fef27e367bee1e6e78155814a62dc39c25ec6943e7f442ea

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            b721d8c7ad364be4ceff7965ac43df5d

            SHA1

            eabb52c7a48e7b47416bf67e258c0640e4f513a6

            SHA256

            ed4b397c1ec39bde477e88d7ccb65634ce19eea8a698dff736df7c26b7d63ca2

            SHA512

            92ea74ddbc849051260dd46642d92c5020e2d05346f3524f7c5e4c5a17c74b2a72db69a0fb0a57e31d4ef819e475ad1f8ca268c5db94e29080a42a667eb23c2e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_CCB3FD273CCB7AA7C328D7725A0C2EAA

            Filesize

            484B

            MD5

            c17b28466d7f0bc9e2a86820fb0e3efb

            SHA1

            92906bdf64dc1ea2b23cfee4b30fcba51d17289c

            SHA256

            5746dffe3263a48496be4aba27aab943e508b10f791599ca1a2818bdcac62847

            SHA512

            960ec6037a6c2829247a9233d7ef295e9204ea620541f243a1ff05f97a9b749ee8f050c1772700bf610cae4cbc23d8e188aec9bda7dbd13b5feb5999d4a325b8

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

            Filesize

            482B

            MD5

            497416da7509eed13b66f83662a44e1e

            SHA1

            29d62e650dac73aad7ded9914f9484d1e4fec3fe

            SHA256

            cf2bae09bebdc5323203de2f4c74c0c1d12fec527cb56f4f830937ebb571eb9b

            SHA512

            d48d01ae1734bc374fa4e61d669704763cfdf036bc261c38b2631e86a1b97647a36362fd3da15048e60f7c9449c4149f7af3ab036b38b6d88fe9e146567c11f6

          • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\3u.ps1

            Filesize

            2.2MB

            MD5

            f9400abd6228a51e8e05085eccafc313

            SHA1

            807dedf3cc9802a77885975e88027727999ab762

            SHA256

            54f28031ae6742e825a113b0437db1d0d16bec6668629bc5bbe656446ce45db1

            SHA512

            5d3413586fc066c9c006dfde4f1e8d1d8057a0cdd3024d7fdcf365c9a0b638763e3b143b9acb1f0ec2b652ab353d3d10e29ed5232f88901756697df8c7743a90

          • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\3uTools.exe

            Filesize

            115.8MB

            MD5

            a23cf91ca5adf1828ea3e8a94250adba

            SHA1

            32903059c9c5cb6aadcad3c04c7d4b98f7e5815f

            SHA256

            84f885bf443d5070412cb86c1c49b22963e65187000ba665c12b3c623ab59951

            SHA512

            81484d2ae7e6b35ddebedcdcb526d43ebbde3606635c5c1e4f299692f1c9041e7e04d56cf279b43402152533c83791fd7decad7249d298ae56969db638c8ef4f

          • C:\Users\Admin\AppData\Local\Temp\RESADDE.tmp

            Filesize

            1KB

            MD5

            034df25d5f0e32f70e21d2cd144933ee

            SHA1

            db27e34175d3cbad10d156dd12eb7a8a8aac68f2

            SHA256

            811b63486daa9654cd30c271453a3ea96118718545387e1e15fc2de8bb6d9c3e

            SHA512

            fc3ba6a0fed3847dee8049718a92955e7d21abcc53c8a501a80e0e787fde4e7a99576ab2d075af3a8c89fdd65ebf832afbcc77bb5669d0d3744f30250ccc355b

          • C:\Users\Admin\AppData\Local\Temp\Tar2AD0.tmp

            Filesize

            161KB

            MD5

            be2bec6e8c5653136d3e72fe53c98aa3

            SHA1

            a8182d6db17c14671c3d5766c72e58d87c0810de

            SHA256

            1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

            SHA512

            0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

          • C:\Users\Admin\AppData\Local\Temp\pckawvl0.dll

            Filesize

            3KB

            MD5

            dd4230a39c2e7d587aaf159da277bd55

            SHA1

            d149bab6d4182fe9dc2cefd755b2872d32918e72

            SHA256

            1e14988d44e0788101b1fcad844eb925748a5b414dda815e2d3fb79fad1df751

            SHA512

            bbe7dd9e05df5ceace7e3dfbea055f8ddca0d98a8ca4f5743b7ad09feffce8676fb4af370d0b2175bad5c6a0168a159ac223b3353ddf7971f671d2c6b66cfe71

          • C:\Users\Admin\AppData\Local\Temp\pckawvl0.pdb

            Filesize

            7KB

            MD5

            980319cc1522e5c799310babecc2dc9b

            SHA1

            a8f8b03f826f191fdc951e402bf6bd064432e5d1

            SHA256

            77d260a7011b87d0aed23d4c805702dce4d6f7c8ec5f0fb537b10c20428726fb

            SHA512

            3d5849a6e0468ad1f02985748d8153806bbeec2226e673238bb54c719066ad008654144508c9dc36178c9faea8afda14c645b7e9130be3a2604ad5bd7dc6d283

          • C:\Windows\Installer\6c8fd2.msi

            Filesize

            116.2MB

            MD5

            d0e17863388ca516c2f400a40ed36c60

            SHA1

            afb74843e1d4fa1308358efe54a3f55727240c03

            SHA256

            9ab088aa97b858588bc10e9f45770515fd4e437f95b4171b6746ae55589261e9

            SHA512

            c3226588152bbaa654c4e586bfe79e9a1b3eb8fac65cbd6042c0d252e5ccf83efe0e276de8525166bcd6b1ffd6f60826e6718075554befee5b30f88e7e137fd4

          • \??\c:\Users\Admin\AppData\Local\Temp\CSCADCD.tmp

            Filesize

            652B

            MD5

            c7589215ec9fe17dfb5f954d838a3fdc

            SHA1

            be5ed3360933ba59f26b6ffc7c82f415a4652747

            SHA256

            b9e3183d7d8ead88e9c39fe0e70cd942090675b519631aed772847dae982f104

            SHA512

            e580cafd8c29dc40ddb5d4998ef07337c4ad12d8bbf82ce3bdd83b771de490976a1110aec115c68fdb653da0bbdb254b18938ad593df7375d381d7186e89acd2

          • \??\c:\Users\Admin\AppData\Local\Temp\pckawvl0.0.cs

            Filesize

            203B

            MD5

            b611be9282deb44eed731f72bcbb2b82

            SHA1

            cc1d606d853bbabd5fef87255356a0d54381c289

            SHA256

            ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

            SHA512

            63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

          • \??\c:\Users\Admin\AppData\Local\Temp\pckawvl0.cmdline

            Filesize

            309B

            MD5

            3cd2c0836f268e96f00b02faaf87f7c7

            SHA1

            6fd4fb9d13c35c8e840df8169ef02f20f8e447fe

            SHA256

            f18771e6f662d08cd651a3fc2d0b0eee87f4df58dfd3a3415731131b0e16289f

            SHA512

            d92fe2b59fc946b0f52de7d7996640bcd4cbd184b69585bb06b4ebe56852ff672a29d3dbb94b67eaac59b5dafebf02a55efe54bc8f7da22279fd446014976f22

          • memory/1504-144-0x0000000002980000-0x0000000002A00000-memory.dmp

            Filesize

            512KB

          • memory/1504-149-0x0000000002980000-0x0000000002A00000-memory.dmp

            Filesize

            512KB

          • memory/1504-145-0x0000000002980000-0x0000000002A00000-memory.dmp

            Filesize

            512KB

          • memory/1504-142-0x0000000001ED0000-0x0000000001ED8000-memory.dmp

            Filesize

            32KB

          • memory/1504-143-0x0000000002980000-0x0000000002A00000-memory.dmp

            Filesize

            512KB

          • memory/1504-178-0x00000000028E0000-0x00000000028E8000-memory.dmp

            Filesize

            32KB

          • memory/1504-141-0x000000001B0D0000-0x000000001B3B2000-memory.dmp

            Filesize

            2.9MB

          • memory/1732-167-0x00000000020C0000-0x0000000002140000-memory.dmp

            Filesize

            512KB