Analysis

  • max time kernel
    66s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2023 20:27

General

  • Target

    Pizza.Tower.v1.0.311/_Redist/_Redist/vcredist2005_x86.exe

  • Size

    2.6MB

  • MD5

    6402438591b548121f54b0706a2c6423

  • SHA1

    e052789ebad7dc8d6f8505a9295b0576babd125e

  • SHA256

    d6832398e3bc9156a660745f427dc1c2392ce4e9a872e04f41f62d0c6bae07a8

  • SHA512

    c615e6337a9507bfaaff14e23043e206351d48bf7ba1d0c244c4bc8a08f411b4aa27f9a9074a87b320007b3cfca448306752fd343392bdde83b851b0e7daadef

  • SSDEEP

    49152:OW6IfKsucUSdXRc8jfi8sH9LyrgSnem02SIi7oOBX4twfDI4OzLbT3:RxucUkGwoBrSn9hFi73BV7xO33

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 57 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pizza.Tower.v1.0.311\_Redist\_Redist\vcredist2005_x86.exe
    "C:\Users\Admin\AppData\Local\Temp\Pizza.Tower.v1.0.311\_Redist\_Redist\vcredist2005_x86.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~3.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~3.EXE
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4140
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec /i vcredist.msi
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:3756
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2172
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 09D4385BD0FD2D315E148043FE3EB256
        2⤵
        • Loads dropped DLL
        PID:4488
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3864

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e5766ea.rbs

      Filesize

      66KB

      MD5

      67ec63cafdd4f4ea7ffb5fbafe871448

      SHA1

      bcc99d043e74b40482cf9050eecfe73f5544030b

      SHA256

      863b566ca65fd5ed7f256696865ff457111f2d8308d595dfb2d423f88951ec47

      SHA512

      e7257852e055b1d97a9e4c372e970eaab97934d7f6a3564e0f2b23a27ff72ff017fc7076938c3415549deceb09aae78dd76f2aebfed479090c279fa97fd443ea

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~3.EXE

      Filesize

      2.6MB

      MD5

      c5c698758bd9da02cc2ef94dcf1b4637

      SHA1

      1d6773537b0baba779090c7fa29be43d2130c3dd

      SHA256

      e1df4fda1f4f6a5d9faa94cc53e77458a53c56a87df4f1062708095150c86dbf

      SHA512

      c238860204de3933c7c41ba5f621f957d602286fa3a19a1bf4b6b272d8b417a20f5351ccf6ae5b46dde6ae938c7158e0f11d610e7a76a3530ba6825a96c9196b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~3.EXE

      Filesize

      2.6MB

      MD5

      c5c698758bd9da02cc2ef94dcf1b4637

      SHA1

      1d6773537b0baba779090c7fa29be43d2130c3dd

      SHA256

      e1df4fda1f4f6a5d9faa94cc53e77458a53c56a87df4f1062708095150c86dbf

      SHA512

      c238860204de3933c7c41ba5f621f957d602286fa3a19a1bf4b6b272d8b417a20f5351ccf6ae5b46dde6ae938c7158e0f11d610e7a76a3530ba6825a96c9196b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vcredis1.cab

      Filesize

      247KB

      MD5

      d5dd8a90812067e0ccb23a7299f82562

      SHA1

      5787391891cef8295666bce637d10e992d021d81

      SHA256

      71a4560b0eb5e45c385ce3aef154d97fa944b762f9aff3b3b9364d42bd1d5afd

      SHA512

      d38d3bcb8a640538a3a1b4052727d8d291d8d17218ba1abcaab1dca615bd83d3317a4bed89e495fadfbe6d20791562e5a8032284ae1cfeadc0020337ea0fe673

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vcredist.msi

      Filesize

      2.6MB

      MD5

      f194e681c552647c95441877b5552415

      SHA1

      285c6b1dbbc2d1525c9b1c276a4901b98d49b202

      SHA256

      6d4f42d5856384c2566ed79bdc587993208013640b035b04540de9f05ee597d6

      SHA512

      8ed21ce7829a1cb6c2dd4eff2e3701171aeba5b7e4337eaf0ddff86ea3fda812198a2e3fb4f1873b129944bdc8ddb09ebbd78e5c2b9811900cb853ef2afdab8c

    • C:\Windows\Installer\MSI69E5.tmp

      Filesize

      28KB

      MD5

      85221b3bcba8dbe4b4a46581aa49f760

      SHA1

      746645c92594bfc739f77812d67cfd85f4b92474

      SHA256

      f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f

      SHA512

      060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d

    • C:\Windows\Installer\MSI69E5.tmp

      Filesize

      28KB

      MD5

      85221b3bcba8dbe4b4a46581aa49f760

      SHA1

      746645c92594bfc739f77812d67cfd85f4b92474

      SHA256

      f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f

      SHA512

      060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d

    • C:\Windows\Installer\e5766e8.msi

      Filesize

      2.6MB

      MD5

      f194e681c552647c95441877b5552415

      SHA1

      285c6b1dbbc2d1525c9b1c276a4901b98d49b202

      SHA256

      6d4f42d5856384c2566ed79bdc587993208013640b035b04540de9f05ee597d6

      SHA512

      8ed21ce7829a1cb6c2dd4eff2e3701171aeba5b7e4337eaf0ddff86ea3fda812198a2e3fb4f1873b129944bdc8ddb09ebbd78e5c2b9811900cb853ef2afdab8c

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.0MB

      MD5

      91ad4a23f25eb65d78cd8fb30dc325e9

      SHA1

      7bf0c9a9ba0a2772dde9847150a223cfe145253c

      SHA256

      cf4d6fa5e61515e14ea654fa8661d7af0ec8c4eb8d8cfea1d4967f6810f2e98c

      SHA512

      02ba57f3d0772b3ddc0bee8b31dc7724a8873bf1bb92b8cafbff60f4bc91af9af9d99ec14e50efefe5f2e10c7725e7f683ee862a685c469c6d774c4959809ebf

    • \??\Volume{93c6d6f9-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{e824e94d-ff56-4ed8-ae1e-56a9d9ad6a6c}_OnDiskSnapshotProp

      Filesize

      5KB

      MD5

      5408fd745a78f155e39ff04fdfba098b

      SHA1

      2de21c672729263763304aca849e6fb12163fe7e

      SHA256

      4f0a37310fb3a1c6ac35c0499d56ee8bcc2e154a8a4279f7d7fe00f7fc01064d

      SHA512

      7a012cc31030700276a288153db9a2a3b7398026dbcaa0d58f6b55bc48acfe71b619b94270065a02eab64383a9703e2cc908f4b78ae657cf7925dae912ffc14d