Resubmissions

11/07/2023, 09:10

230711-k5j33sfh98 7

11/07/2023, 09:02

230711-kzn5vafh74 7

Analysis

  • max time kernel
    721s
  • max time network
    728s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2023, 09:10

General

  • Target

    T-G中文.msi

  • Size

    38.2MB

  • MD5

    79c85baf08ad6c4764d17ff58bf3f94b

  • SHA1

    23af9d248019e60637d663f5269ccf6803dc6844

  • SHA256

    22bcaefdcd36c9cf937c146dd750376bebfd365c143373d097ff4cfff37d28f2

  • SHA512

    629446142c0a34aeedaf03445c385c33432d002a9199e29747657db4d453f3ceee292be2d85d3c43526753e5377e84fb68de5a61a983385ca0604f0937dcb7fe

  • SSDEEP

    786432:wokxQ0yHjoDFDG6XFBa7u4/unK9OIttey4XglRjJKWbb:wRQ9oQvaODtteyjlP3

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 10 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\T-G中文.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3872
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4564
      • C:\Program Files\T中文版\T中文版\4.exe
        "C:\Program Files\T中文版\T中文版\4.exe" /Commit
        2⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        • Suspicious use of SetWindowsHookEx
        PID:2332
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2652

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\T中文版\T中文版\4.exe

      Filesize

      2.2MB

      MD5

      a561affc2dce69e546efbe7217ebbaa4

      SHA1

      95910e2539b4b2dd0d0f42a5f01281e59e68a75e

      SHA256

      305db789e93397b1f504ded31149eb4125d204eda5b5a754e9eaf233e5f1dc7f

      SHA512

      cdbc0ab9d260e0157258663d36428bacedcf0fd257d4a15ba911e5d7acec2097a915fcc3e896fbed47cf5ddc2cc0b510db9a830abffa9b73c9e3b6ec0f59e786

    • C:\Program Files\T中文版\T中文版\4.exe

      Filesize

      2.2MB

      MD5

      a561affc2dce69e546efbe7217ebbaa4

      SHA1

      95910e2539b4b2dd0d0f42a5f01281e59e68a75e

      SHA256

      305db789e93397b1f504ded31149eb4125d204eda5b5a754e9eaf233e5f1dc7f

      SHA512

      cdbc0ab9d260e0157258663d36428bacedcf0fd257d4a15ba911e5d7acec2097a915fcc3e896fbed47cf5ddc2cc0b510db9a830abffa9b73c9e3b6ec0f59e786

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KADOH4CO.htm

      Filesize

      377KB

      MD5

      a980f2dd67bc66435619cb88ecafdffc

      SHA1

      47fd7eaebfc80b4c967397f475a1dc650e1c2d38

      SHA256

      e441d44ae9f03b05672ffefece35bf714b206a6ce25601ad0d49804e2f242c65

      SHA512

      b8dae8aa51aa69339bc37d72ce27ceb52c0c149373543844810387d760002a2fe888e10acc013f6d78d4c6de622dd11a399d8186a0f66662bc02d7e3cca68e85

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.0MB

      MD5

      7b02ad00301248ffe58b99d96c586f00

      SHA1

      1606676c5066d8168563295662d17b11cfe4bf2a

      SHA256

      80c203343e36da6b5fa5570265d0a86b5dc8b734e102efab59ce731ac4ebb040

      SHA512

      0f23b18d6f9e51f43da6d6692921e9328209d452bb60b181b2e3478f76e8f5b547b3cbc4c7236f202167513b0e7b46846c8ad68c0639fdc02742ef867d778b8c

    • \??\Volume{dca10565-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{2c389be1-2b9c-4a4e-be3d-63627818ea63}_OnDiskSnapshotProp

      Filesize

      5KB

      MD5

      61afdc9a72cb050a286f5fb574cd7b9f

      SHA1

      ae7b6d2c8fdd0c807624e69f2d1a3a61f80c89bb

      SHA256

      a1edc6841142313fbd6da9c1041a18849c0dd04273a9f314f1deeaab494417d3

      SHA512

      bbc990e6261f8720c351e77302c0991f0a9c7c0ae7fae6422d77f102ceabfdd9c5f188c244851f2d6bc8e2662311a5336023bbdde599756c2180307a8bf8530f

    • memory/2332-172-0x0000000000400000-0x00000000006A5000-memory.dmp

      Filesize

      2.6MB

    • memory/2332-183-0x0000000000400000-0x00000000006A5000-memory.dmp

      Filesize

      2.6MB