Resubmissions

22/09/2023, 01:31

230922-bxdfwsdf43 7

21/09/2023, 06:53

230921-hnmrjaea4z 6

Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2023, 01:31

General

  • Target

    ws400eval.msi

  • Size

    3.5MB

  • MD5

    90cb0a3346b88eabcdbdfb31de144867

  • SHA1

    1ea3b6246a0f0ee23fbe371368f40c9abb1d60f6

  • SHA256

    2b5d121af33ed02c634fe39d3d178f7263d923640a9d9125a62fe6a612642122

  • SHA512

    4cc61074cd286060a29fb7d597d7aa14c5618fc8c805a3f32949fe3d166fae258bbb10f9a6de1b87f39ad944bf87b8b617cd3e17dee435a32c948a1334185410

  • SSDEEP

    98304:u7RMkgMPxvzDTU/goe6kEMyV1i4c7iTiVg1dGCp:uVMJMPdDTUR1MyfXTiVgV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 11 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ws400eval.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2488
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2808
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2628
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005B0" "00000000000003F8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:484
  • C:\Program Files (x86)\WinSolve\WinSolve\ws4eval.exe
    "C:\Program Files (x86)\WinSolve\WinSolve\ws4eval.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1320

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f76a7f5.rbs

      Filesize

      14KB

      MD5

      34367672ae025ae5e668e9f8183a8856

      SHA1

      48dc451cae9a36e67ee6674ac004f61e4521fb8b

      SHA256

      59198f13abf73e6c10774e36b56753997d43f85f43892c6b9e381233543d2fe9

      SHA512

      051fc4ce9b51bd0b3e51c84a7689ab2a278877be468ff1249c8be2385748107e9b4bf672a159280ef05c1891e4ad12c93964569fd0db0cffdb96eb8305a2eb1b

    • C:\Program Files (x86)\WinSolve\WinSolve\ws4eval.exe

      Filesize

      1.5MB

      MD5

      59ded6806112e6861ca451a277564859

      SHA1

      7722e59fe481379a33e7edfde6ce7b0e316cf622

      SHA256

      5c6f9a4838f1916ff29d75353f933d13ff4a9ff1504a7a89db800a3511dc2cc9

      SHA512

      7330226301ef10dfb2bd5d24ac2ae9eaaa008270f5f9e7a24146c2be8f62642eb0b42d20d992d869ba503598647c7b0dbab470de98a4efa0a5364ad856899571

    • C:\Windows\Installer\f76a7f3.msi

      Filesize

      3.5MB

      MD5

      90cb0a3346b88eabcdbdfb31de144867

      SHA1

      1ea3b6246a0f0ee23fbe371368f40c9abb1d60f6

      SHA256

      2b5d121af33ed02c634fe39d3d178f7263d923640a9d9125a62fe6a612642122

      SHA512

      4cc61074cd286060a29fb7d597d7aa14c5618fc8c805a3f32949fe3d166fae258bbb10f9a6de1b87f39ad944bf87b8b617cd3e17dee435a32c948a1334185410

    • C:\Windows\winsolve.ini

      Filesize

      16B

      MD5

      4cf8ad872352c1d18bdf2e1553e8dc1a

      SHA1

      1dcbcc107f537396c7dfbd3b8f9e41ccd5d43657

      SHA256

      c57df93830db1e5d4f3ad79101341dc70870058a5b946bdfd1e5fd2493a8a8f5

      SHA512

      2d4bc4a718ae0a149d0e97c1d0cba05a34a0287bd1add597b3135c8dda0020d1fa425a8fbe6491a0aad70f190a04d061c797d2bc289fb55d7e5e1ed6e161d0d9

    • memory/1264-112-0x0000000000400000-0x000000000058C000-memory.dmp

      Filesize

      1.5MB

    • memory/1264-120-0x0000000000400000-0x000000000058C000-memory.dmp

      Filesize

      1.5MB