Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23/10/2023, 04:03

General

  • Target

    TGSetup.msi

  • Size

    37.3MB

  • MD5

    a2bf86357fa871600abe9e011ba94008

  • SHA1

    ba0c977df82ea3b008106e15cfbac9ad2bab2dcd

  • SHA256

    0efb729f2661f2e187d9819210a44b8b29906a902ec6b8c31b0f553e6d206bce

  • SHA512

    d831446866c6027d028325665ea56e97c1c01daf670ba2f797997f540941cd5d4babe8373c3165d5ac56fdbe7bf5643f926ad155e5be0f81f915a04f48e6f338

  • SSDEEP

    786432:kvkRSdH4qrxuszvcNEyvDizwAfHXlv6nC2nBl0pZm0PeJ/pyPO:pRQH4qrxJzvEE3wAfVCBlmZ8M

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 9 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\TGSetup.msi
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2064
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Program Files\T中文版\T中文版\5.exe
      "C:\Program Files\T中文版\T中文版\5.exe" /Commit
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:852
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2716
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000057C" "0000000000000498"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2504

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\T中文版\T中文版\5.exe

          Filesize

          1.2MB

          MD5

          03b6047e1cae3c09193454b45db5525a

          SHA1

          a5185080807fafca2c9840b1b16666b559d720a2

          SHA256

          baa0af581aa4ca54db977c8268c827bff4986be809ff4cbf224fb0e4a7c20bf8

          SHA512

          49cffbdf09b7e7c92fb1de7c0f677472fd11b5e759341c73c91ac83ccca632a547a7e76585cf9e9f317e846c9dd38dd27ef4d792019dfe51cbf9190dc4fe4627

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7NWSSREY\UZW1J2PQ.htm

          Filesize

          390KB

          MD5

          c4935d99068dc068e9517ec606ff1526

          SHA1

          b9924aa5a810158a1ab75af689375f4a4f923ecf

          SHA256

          48410b26c39854720a28712852d4f779d52b960a2cda9776fb4a74a927497711

          SHA512

          32bd25c424d4c750c58bbe8974cca7f4bf0dee8a4d47bc5a8e1df3b619d4cea705638f5e2203a59721306570f71135bed78894c402e1d17c39d165bb7d94e653

        • memory/852-38-0x0000000000400000-0x000000000059E000-memory.dmp

          Filesize

          1.6MB

        • memory/852-46-0x0000000000400000-0x000000000059E000-memory.dmp

          Filesize

          1.6MB