Analysis

  • max time kernel
    144s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2023 06:30

General

  • Target

    1.msi

  • Size

    3.5MB

  • MD5

    e1abe0b693e8ee3df8367caf14f8565c

  • SHA1

    14867c8c4bbcc57efe63a71bfcde4cf832be9b2a

  • SHA256

    6fed6902e05e825c5c600df452de46736263d58920d32a9346b50c6248384211

  • SHA512

    f51b5d36761d9e8443809056c508e43ff668a858c02c81bb95d10cf333af1eac587cbb14e6a3b98b23845aee6d6afa35999cb2540a13846ba0864bc90f2e9be6

  • SSDEEP

    98304:OnokaJXwylk5q30yI43EDhKgn8owQTJK/gQm5z/K:nH753iYgdOTmFK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\1.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1780
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\pass.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:296
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hzgcquxn.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF614.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF613.tmp"
          4⤵
            PID:1580
      • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\KeePass-Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\KeePass-Setup.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1296
        • C:\Users\Admin\AppData\Local\Temp\is-M9P5G.tmp\KeePass-Setup.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-M9P5G.tmp\KeePass-Setup.tmp" /SL5="$7014A,2170270,781312,C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\KeePass-Setup.exe"
          3⤵
          • Executes dropped EXE
          PID:1736
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1496
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004A8" "00000000000004A0"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1448

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6ce228.rbs

      Filesize

      7KB

      MD5

      b6b4d77a868c2090410bfca5ad262d84

      SHA1

      8f9e9eabc8fa02d3bee6317cf71fa321a960bf72

      SHA256

      a188bb4fba7279b38f4ee8fcd4c1c3cdaeca50db13cab1bc3475e810d4c7c992

      SHA512

      7e84d1cec06d4bb4ba43ea637d5c106395848079176640b3e4245ade6c9aababb48977adf979a73ec88f92d3374038e2ebea42720b82749836292970ab21f38d

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\KeePass-Setup.exe

      Filesize

      2.9MB

      MD5

      52afb5fab6660c027f505186d1e9ddca

      SHA1

      a57780208cc7ee4026494b077d8114152347f6b4

      SHA256

      d5cf432ac514cb5239a879a22cc3e0eef6cbc089aa40146a6a1e38c090ac79ba

      SHA512

      81e16e3f628861eb6a058bb6b4a7e41b343c09e14d230dfeaacd58135fcb1feed87cd2ee6c394f319e863c249059a69e7eff1696588b012a6bd00547cca7d54c

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\KeePass-Setup.exe

      Filesize

      2.9MB

      MD5

      52afb5fab6660c027f505186d1e9ddca

      SHA1

      a57780208cc7ee4026494b077d8114152347f6b4

      SHA256

      d5cf432ac514cb5239a879a22cc3e0eef6cbc089aa40146a6a1e38c090ac79ba

      SHA512

      81e16e3f628861eb6a058bb6b4a7e41b343c09e14d230dfeaacd58135fcb1feed87cd2ee6c394f319e863c249059a69e7eff1696588b012a6bd00547cca7d54c

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\pass.ps1

      Filesize

      2.2MB

      MD5

      4d16bd7cc13c4ac89c59d2825fc9a3c3

      SHA1

      7cc9b7bdf9a7577d2a2d592be2f2db61a118cc2b

      SHA256

      9b6125e1aa889f2027111106ee406d08a21c894a83975b785a2b82aab3e2ac52

      SHA512

      71e3c7c85866a39ecda4278762633a8dfd313779c3f3d8494453f9dd4bf92e96fa94b7880fd45444673cb84f74dc0ecd0006b7a693a2cb7f5fc776a6157cf922

    • C:\Users\Admin\AppData\Local\Temp\RESF614.tmp

      Filesize

      1KB

      MD5

      7eff7e9ddd0a7345daf0df732f58b134

      SHA1

      6b45da47ee2f89a9ae17b0e83c5995bd7354b726

      SHA256

      5e3932b52bd4b420e968664b0429005e688ecd2846291b512259143213668e53

      SHA512

      1598c027c786406a2daf015307a2422eb66b35f5c154234d4d7151a81a4ebd38cf346ff64ece8263cb6d542057da3bad048f83a9dcaa1387fd12b74caa799544

    • C:\Users\Admin\AppData\Local\Temp\hzgcquxn.dll

      Filesize

      3KB

      MD5

      99ec98ceb24c35736c343a1f4b314e26

      SHA1

      c404730c03ed1588b55cb70e2c926aa3e9cb61c1

      SHA256

      23620cac3aeeb76a4436325c83fd0546513e1191f782bf69ec138ae4416c89ef

      SHA512

      d97eb99441a9ddb715d3bc327bb5c43e8cd36b9ed4ddf7cf36fb21dd8e01b841137146d9d253723d9bda62d9e957eaf50ee7d50d292e7d20e92dd778aae706f5

    • C:\Users\Admin\AppData\Local\Temp\hzgcquxn.pdb

      Filesize

      7KB

      MD5

      edd90e59bb9af6c6f900bd72ee352f2a

      SHA1

      fd9bdeb2fcec1af47cd9fee920fc86c6b410c392

      SHA256

      40a3037ed788377a5e37b6a97082c149f286445c70ad990f9c1d299f62535240

      SHA512

      58de09399ed01eba73374fd3695643b493f3f8555e5c5e6503780256774b15f606f8200f31aa38cc6d753d00c9935c7f4ca1bee0c48e5e46e4c2f0342c357d79

    • C:\Users\Admin\AppData\Local\Temp\is-M9P5G.tmp\KeePass-Setup.tmp

      Filesize

      3.0MB

      MD5

      d1ef2c4a186f83eac96f90a68c706498

      SHA1

      e1ee6eb95a042f7094d628e1e8e26b7484cecea8

      SHA256

      8746ed5498199546babaa5d65a24f777227f3045a15ded568bbfd450f69a6861

      SHA512

      fabe2a2a3ead7f83e22dc5a12b5ea9853ef4af6b24417fe901b185eb003c2e52da22d9da9a6a295a08d16dafe82b2f3e6b716ae9438e6fcfbbca7af40e1d30fc

    • C:\Windows\Installer\6ce226.msi

      Filesize

      3.5MB

      MD5

      e1abe0b693e8ee3df8367caf14f8565c

      SHA1

      14867c8c4bbcc57efe63a71bfcde4cf832be9b2a

      SHA256

      6fed6902e05e825c5c600df452de46736263d58920d32a9346b50c6248384211

      SHA512

      f51b5d36761d9e8443809056c508e43ff668a858c02c81bb95d10cf333af1eac587cbb14e6a3b98b23845aee6d6afa35999cb2540a13846ba0864bc90f2e9be6

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCF613.tmp

      Filesize

      652B

      MD5

      83bc11a6245b4b42fe96472ee09f0500

      SHA1

      c9ac1a93dcb4509b013e399d14c47f198b25f549

      SHA256

      6f9a90b9fb2fd4359b35f01771e367a4cdd60c054146b2958592cea73de2f4e9

      SHA512

      9f6a6ff55cce14aecc7714a9da8cebe3f97d5fa0067e52ea63a559dd2afac47ed13234403c9c981d6ccf56ce749c148754a86e0ce4b613915add3073d81ec288

    • \??\c:\Users\Admin\AppData\Local\Temp\hzgcquxn.0.cs

      Filesize

      203B

      MD5

      b611be9282deb44eed731f72bcbb2b82

      SHA1

      cc1d606d853bbabd5fef87255356a0d54381c289

      SHA256

      ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

      SHA512

      63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

    • \??\c:\Users\Admin\AppData\Local\Temp\hzgcquxn.cmdline

      Filesize

      309B

      MD5

      d4ea12c30f60198dfaf5e9e46567741a

      SHA1

      9e7e1ac556903986bb98cbff3e116945e001913d

      SHA256

      31091723fc42d7eb51069a6a14c5fef6be15a390590257c6cc293201f6d97e98

      SHA512

      df25b1c9a5674ba65592f4f36dceb94fb188e73dd666112ec7df3e218c10bfbc957013b3769497c911c157ef69e9048d483ab84e9c78b559ba46c3b358370e50

    • \Users\Admin\AppData\Local\Temp\is-M9P5G.tmp\KeePass-Setup.tmp

      Filesize

      3.0MB

      MD5

      d1ef2c4a186f83eac96f90a68c706498

      SHA1

      e1ee6eb95a042f7094d628e1e8e26b7484cecea8

      SHA256

      8746ed5498199546babaa5d65a24f777227f3045a15ded568bbfd450f69a6861

      SHA512

      fabe2a2a3ead7f83e22dc5a12b5ea9853ef4af6b24417fe901b185eb003c2e52da22d9da9a6a295a08d16dafe82b2f3e6b716ae9438e6fcfbbca7af40e1d30fc

    • memory/296-114-0x0000000002830000-0x0000000002838000-memory.dmp

      Filesize

      32KB

    • memory/296-101-0x0000000002550000-0x00000000025D0000-memory.dmp

      Filesize

      512KB

    • memory/296-100-0x0000000002550000-0x00000000025D0000-memory.dmp

      Filesize

      512KB

    • memory/296-94-0x0000000002550000-0x00000000025D0000-memory.dmp

      Filesize

      512KB

    • memory/296-96-0x00000000023E0000-0x00000000023E8000-memory.dmp

      Filesize

      32KB

    • memory/296-93-0x0000000002550000-0x00000000025D0000-memory.dmp

      Filesize

      512KB

    • memory/296-95-0x000000001B130000-0x000000001B412000-memory.dmp

      Filesize

      2.9MB

    • memory/1296-81-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/1296-118-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/1736-99-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1736-119-0x0000000000400000-0x0000000000707000-memory.dmp

      Filesize

      3.0MB

    • memory/1736-120-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB