Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2023, 20:47

General

  • Target

    exec_payload.msi

  • Size

    15KB

  • MD5

    511f2dbcef2ef0bc4f02f60e724466f1

  • SHA1

    85c1c51b36e9ee7cb94edcd71a078cc5da744c5b

  • SHA256

    4cc81933e786d546b1059f618bcf41fd20620be354b9600c044f5d8ffe3e70cf

  • SHA512

    ce761a2bdd9557cdb6dff1817adcae3f26a136c59aacf95d496031b6a41b90c3d395afad12cd951d3da02d66f9116e456ab13a1a81ab2b5aeb1ad4b8c857ca9e

  • SSDEEP

    384:uZ+cUF43zYWN1oXg2srCCqgXey3M5BCqPm:QRUPEGCTeWMDC1

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\exec_payload.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3780
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5024
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1140
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4588

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

            Filesize

            23.0MB

            MD5

            83490074e4e89343196325a4172b5dec

            SHA1

            73171e82f4042672a4af7ab5f8ad2d628aa48f07

            SHA256

            08df92b4ed272eb8aa1a8c7f080de24fa378caa485d381f6114ee5f6def96e11

            SHA512

            43d3d66b16080597d4225b2e0972870194c8988af70b79b19afe9cf07408be04cd4892735178cf298beb339e2581e2fa8ee840e3d530994f36fad329727fa0d8

          • \??\Volume{6ada271e-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c0c1b011-93dc-4a54-b1e4-753cd26d0e17}_OnDiskSnapshotProp

            Filesize

            5KB

            MD5

            fa1f84ce14a298142391a21b71efa32b

            SHA1

            b47d7bfd1fc8272b7617f742ff1292911fa3dad9

            SHA256

            1ba18b408c9a63d4665023963df4693ff13bf46b108bea9493d1d4f2f51e9031

            SHA512

            0c4f387e17749890d94fedcf86b4f177692f7b56fe6e18df81d6288d4b361c10f55ab2061c6f89f118a6dcfff507bdf3ec64baa4a8c885a4962d7b03842b0ae6