Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 03:58

General

  • Target

    e4780a285befbc2419d74e2c3bcecffd0e128a8e1f8db367de072b37d59e942b_JC.msi

  • Size

    527KB

  • MD5

    f21e7ee2ee6ab192ea920d1dbacbfc3e

  • SHA1

    7df2489e660c9f0f060b2897d732deb51a5dea37

  • SHA256

    e4780a285befbc2419d74e2c3bcecffd0e128a8e1f8db367de072b37d59e942b

  • SHA512

    10bdbb79d00dedb5945c6f2398d2bb6a438da80bb7273405dab3f3c19e2ef1493e66f9e6d0110ad31bec40c4c70c6ab80112e7101db4e6bd0e09cf40a86f86b6

  • SSDEEP

    12288:kfkdlY5AVTqp4nb5roPzfGXSjptsrYI21wlD:kfkdlY5Awp4b5fXSjp2b

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\e4780a285befbc2419d74e2c3bcecffd0e128a8e1f8db367de072b37d59e942b_JC.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1592
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Drops startup file
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4592
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 621ECF16696C248E9D52A1FC2404ED0D
      2⤵
      • Loads dropped DLL
      • Blocklisted process makes network request
      PID:1972
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:3520

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\e5a1198.rbs

          Filesize

          1KB

          MD5

          affab7d07b869059fbd0bb0debbf1f08

          SHA1

          1fa372da7a5a6ec77569520213854481c63fbde0

          SHA256

          943e327719b76cc239390f3980c5116835da37780face092d70adcfc94bafa77

          SHA512

          eb3fb3af7993a81586312902e077c8bbf62ea42eb370c775a745fdc1a80dbacbe2cae3e24d7e33ce8194480a4a096c15f46c6e5423594aa1beec277008e230c1

        • C:\Windows\Installer\MSI1500.tmp

          Filesize

          91KB

          MD5

          5c5bef05b6f3806106f8f3ce13401cc1

          SHA1

          6005fbe17f6e917ac45317552409d7a60976db14

          SHA256

          f2f3ae8ca06f5cf320ca1d234a623bf55cf2b84c1d6dea3d85d5392e29aaf437

          SHA512

          97933227b6002127385ace025f85a26358e47ee79c883f03180d474c15dbaf28a88492c8e53aefc0d305872edd27db0b4468da13e6f0337988f58d2ee35fd797

        • C:\Windows\Installer\MSI1500.tmp

          Filesize

          91KB

          MD5

          5c5bef05b6f3806106f8f3ce13401cc1

          SHA1

          6005fbe17f6e917ac45317552409d7a60976db14

          SHA256

          f2f3ae8ca06f5cf320ca1d234a623bf55cf2b84c1d6dea3d85d5392e29aaf437

          SHA512

          97933227b6002127385ace025f85a26358e47ee79c883f03180d474c15dbaf28a88492c8e53aefc0d305872edd27db0b4468da13e6f0337988f58d2ee35fd797

        • C:\Windows\Installer\MSI32E9.tmp

          Filesize

          91KB

          MD5

          5c5bef05b6f3806106f8f3ce13401cc1

          SHA1

          6005fbe17f6e917ac45317552409d7a60976db14

          SHA256

          f2f3ae8ca06f5cf320ca1d234a623bf55cf2b84c1d6dea3d85d5392e29aaf437

          SHA512

          97933227b6002127385ace025f85a26358e47ee79c883f03180d474c15dbaf28a88492c8e53aefc0d305872edd27db0b4468da13e6f0337988f58d2ee35fd797

        • C:\Windows\Installer\MSI32E9.tmp

          Filesize

          91KB

          MD5

          5c5bef05b6f3806106f8f3ce13401cc1

          SHA1

          6005fbe17f6e917ac45317552409d7a60976db14

          SHA256

          f2f3ae8ca06f5cf320ca1d234a623bf55cf2b84c1d6dea3d85d5392e29aaf437

          SHA512

          97933227b6002127385ace025f85a26358e47ee79c883f03180d474c15dbaf28a88492c8e53aefc0d305872edd27db0b4468da13e6f0337988f58d2ee35fd797

        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

          Filesize

          23.0MB

          MD5

          c1756ec988416052b1cc38c58fdeefb8

          SHA1

          18011cf314de9a5c431ae2a6e2dc709d971ef8c8

          SHA256

          c5e8737223e0fab4f25ca92a64c6622e6363e20297576fd67a3557bb19ae9157

          SHA512

          5629afee10c425bf79c2155203380995159aac0a377bfc16978fc05d6e4e7bdacffa8799db95da2c2de9b30bc688ba89bb29c44bb532195111a7dbd697d4e262

        • \??\Volume{99926f1d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{43010e06-cf36-4ab5-97e8-855231c1781f}_OnDiskSnapshotProp

          Filesize

          5KB

          MD5

          123db48ca560d8b417dee3e14f1065de

          SHA1

          cedacef07c85a800acda1463e1309a573a44d1d1

          SHA256

          1e196891122656bf1f50a79b277b7d332ac88b95fbbff8cb8c22a87f4705be0f

          SHA512

          1eda00c4bf66beb7a7a5e5dfe23e7fb6d5b444fb71b00845f89b57f51e5642023a6864249583614694bc02024e5d50ab71862847f279829fa48d5009871d9938