Analysis
-
max time kernel
260s -
max time network
269s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2023 20:22
Static task
static1
Behavioral task
behavioral1
Sample
Lan Adaptor/CH9152DRV/PSetup.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Lan Adaptor/CH9152DRV/PSetup.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Lan Adaptor/CH9152DRV/WCHUSBNIC.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Lan Adaptor/CH9152DRV/WCHUSBNIC.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Lan Adaptor/CH9152DRV/WCHUSBNICA64.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Lan Adaptor/CH9152DRV/WCHUSBNICA64.exe
Resource
win10v2004-20230703-en
General
-
Target
Lan Adaptor/CH9152DRV/PSetup.exe
-
Size
6KB
-
MD5
bc0b5f20a2dd4e96084d7604cdb6aec5
-
SHA1
c78246bbd5fd00ae6b0b867d9be7a76cdc70d075
-
SHA256
a290256623a01ed19f5b05f45017e3cadac2e246476f86ac08bd61d8fcc4fb2d
-
SHA512
684a765ba893a41b847c60b1cd5e2e4d6836a506af6ea8782256432065e9b509934edaa345becfb4702dbe88cfc16d8b2bbea189c264355fc5713137ea724ae0
-
SSDEEP
96:tDqqr/Z8l9fgmuTV9TexmtIAKyPtboynh0GFQ+xX+vqp:tDqeZ8l9fg/TzIALP1oynhbQ23
Malware Config
Signatures
-
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{b9c10b59-6f05-4d4c-92d7-1bdacc6f3447}\WCHUSBNIC.INF DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\wchusbnic.inf_amd64_e8f8c49c4a90f2b5\WCHUSBNIC.CAT DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{b9c10b59-6f05-4d4c-92d7-1bdacc6f3447}\SET6031.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b9c10b59-6f05-4d4c-92d7-1bdacc6f3447}\WCHUSBNICA64.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b9c10b59-6f05-4d4c-92d7-1bdacc6f3447}\SET6052.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b9c10b59-6f05-4d4c-92d7-1bdacc6f3447}\SET6031.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{b9c10b59-6f05-4d4c-92d7-1bdacc6f3447}\SET6032.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\wchusbnic.inf_amd64_e8f8c49c4a90f2b5\WCHUSBNICA64.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\wchusbnic.inf_amd64_e8f8c49c4a90f2b5\WCHUSBNIC.INF DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{b9c10b59-6f05-4d4c-92d7-1bdacc6f3447}\SET6052.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b9c10b59-6f05-4d4c-92d7-1bdacc6f3447} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b9c10b59-6f05-4d4c-92d7-1bdacc6f3447}\SET6032.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b9c10b59-6f05-4d4c-92d7-1bdacc6f3447}\WCHUSBNIC.CAT DrvInst.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log PSetup.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeAuditPrivilege 3624 svchost.exe Token: SeSecurityPrivilege 3624 svchost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3624 wrote to memory of 1976 3624 svchost.exe 84 PID 3624 wrote to memory of 1976 3624 svchost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lan Adaptor\CH9152DRV\PSetup.exe"C:\Users\Admin\AppData\Local\Temp\Lan Adaptor\CH9152DRV\PSetup.exe"1⤵
- Drops file in Windows directory
PID:4164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{a0428902-68e5-fe42-85c8-ba38313e8b5f}\WCHUSBNIC.INF" "9" "4edb606f7" "000000000000014C" "WinSta0\Default" "000000000000015C" "208" "C:\Users\Admin\AppData\Local\Temp\Lan Adaptor\CH9152DRV"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1976
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:60
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5e673c56519d4a7dacb6234355e9c017b
SHA1cf4b61c6808c11ef1d4b2d0a0f2ac4e5a50ceb51
SHA25630c19a3e7e65b79646ccc479b1a54d1b2e17058bea90a59c8e8ced4522c1f3ae
SHA5121a0867a5bfa3219da4ca5f4e6de3dd2e5a1b2435dbaf78847f62a700bf5e3dc80d1cc07e02c9856ee627817bc3a39e47e801d2293275afc11c0708d6e9426007
-
Filesize
59KB
MD5a41beaa61247e9864ab666025c820d1b
SHA157b29779767a6d7dd180514be84285489b43e42b
SHA256f7740bd11e8c6688c7142fb8ded05197f38feef249cbc33434ffbc83925ef4c5
SHA512518401a96ab52ffcc63c06a2e392ef4ba4bf516bdd43ee3de05b611b71932b33f08e24619ec8f9664fd040ce3cbdf82fe0b19800220869dfc599806b5de83c81
-
Filesize
15KB
MD5da8885e49970cb971221ac59d0234ac3
SHA1c6ab9b14d5e69aee4427d517897b66d8a5293987
SHA256b790b2442ab3a40d87247d9d70e37220f8914075d4af300afbb725159ab830ee
SHA5125dbd3f3c248f10125dec7485f796d70864bf314d52f1d2ef3438c893e6a4e5fda35aee9eede7fe6bb40107d48e037a7e14740974546f9620c0aa52478efbe5c4
-
Filesize
59KB
MD5a41beaa61247e9864ab666025c820d1b
SHA157b29779767a6d7dd180514be84285489b43e42b
SHA256f7740bd11e8c6688c7142fb8ded05197f38feef249cbc33434ffbc83925ef4c5
SHA512518401a96ab52ffcc63c06a2e392ef4ba4bf516bdd43ee3de05b611b71932b33f08e24619ec8f9664fd040ce3cbdf82fe0b19800220869dfc599806b5de83c81
-
Filesize
12KB
MD5e673c56519d4a7dacb6234355e9c017b
SHA1cf4b61c6808c11ef1d4b2d0a0f2ac4e5a50ceb51
SHA25630c19a3e7e65b79646ccc479b1a54d1b2e17058bea90a59c8e8ced4522c1f3ae
SHA5121a0867a5bfa3219da4ca5f4e6de3dd2e5a1b2435dbaf78847f62a700bf5e3dc80d1cc07e02c9856ee627817bc3a39e47e801d2293275afc11c0708d6e9426007
-
Filesize
15KB
MD5da8885e49970cb971221ac59d0234ac3
SHA1c6ab9b14d5e69aee4427d517897b66d8a5293987
SHA256b790b2442ab3a40d87247d9d70e37220f8914075d4af300afbb725159ab830ee
SHA5125dbd3f3c248f10125dec7485f796d70864bf314d52f1d2ef3438c893e6a4e5fda35aee9eede7fe6bb40107d48e037a7e14740974546f9620c0aa52478efbe5c4