Analysis

  • max time kernel
    122s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2023, 14:09

General

  • Target

    d6832398e3bc9156a660745f427dc1c2392ce4e9a872e04f41f62d0c6bae07a8.exe

  • Size

    2.6MB

  • MD5

    6402438591b548121f54b0706a2c6423

  • SHA1

    e052789ebad7dc8d6f8505a9295b0576babd125e

  • SHA256

    d6832398e3bc9156a660745f427dc1c2392ce4e9a872e04f41f62d0c6bae07a8

  • SHA512

    c615e6337a9507bfaaff14e23043e206351d48bf7ba1d0c244c4bc8a08f411b4aa27f9a9074a87b320007b3cfca448306752fd343392bdde83b851b0e7daadef

  • SSDEEP

    49152:OW6IfKsucUSdXRc8jfi8sH9LyrgSnem02SIi7oOBX4twfDI4OzLbT3:RxucUkGwoBrSn9hFi73BV7xO33

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 43 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 56 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6832398e3bc9156a660745f427dc1c2392ce4e9a872e04f41f62d0c6bae07a8.exe
    "C:\Users\Admin\AppData\Local\Temp\d6832398e3bc9156a660745f427dc1c2392ce4e9a872e04f41f62d0c6bae07a8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~3.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~3.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec /i vcredist.msi
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2360
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F3A79F31F534CE46D02417BA5E76A7DC
      2⤵
      • Loads dropped DLL
      PID:2904
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2880
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000328" "00000000000003EC"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2028

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fbc24438d08c7f8afcf0a86349b2acfe

          SHA1

          82c1160a37a50d5ba0c5d183bf5cb9aba96b1205

          SHA256

          b43e461cf2c1681575cdce25692223fd9c73b3e29acffb0ea8965ec59fd72fb3

          SHA512

          ea7d4b35a65895011dc0e21bb45a40ceb63e49ebee4ffca13e3bafbb5c377cc8ebba56ac0daa825b8bf29e76b95dc8142087ee50a69d85d88091fa1cc6eba93b

        • C:\Users\Admin\AppData\Local\Temp\CabE8E8.tmp

          Filesize

          61KB

          MD5

          f3441b8572aae8801c04f3060b550443

          SHA1

          4ef0a35436125d6821831ef36c28ffaf196cda15

          SHA256

          6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

          SHA512

          5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~3.EXE

          Filesize

          2.6MB

          MD5

          c5c698758bd9da02cc2ef94dcf1b4637

          SHA1

          1d6773537b0baba779090c7fa29be43d2130c3dd

          SHA256

          e1df4fda1f4f6a5d9faa94cc53e77458a53c56a87df4f1062708095150c86dbf

          SHA512

          c238860204de3933c7c41ba5f621f957d602286fa3a19a1bf4b6b272d8b417a20f5351ccf6ae5b46dde6ae938c7158e0f11d610e7a76a3530ba6825a96c9196b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~3.EXE

          Filesize

          2.6MB

          MD5

          c5c698758bd9da02cc2ef94dcf1b4637

          SHA1

          1d6773537b0baba779090c7fa29be43d2130c3dd

          SHA256

          e1df4fda1f4f6a5d9faa94cc53e77458a53c56a87df4f1062708095150c86dbf

          SHA512

          c238860204de3933c7c41ba5f621f957d602286fa3a19a1bf4b6b272d8b417a20f5351ccf6ae5b46dde6ae938c7158e0f11d610e7a76a3530ba6825a96c9196b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vcredis1.cab

          Filesize

          247KB

          MD5

          d5dd8a90812067e0ccb23a7299f82562

          SHA1

          5787391891cef8295666bce637d10e992d021d81

          SHA256

          71a4560b0eb5e45c385ce3aef154d97fa944b762f9aff3b3b9364d42bd1d5afd

          SHA512

          d38d3bcb8a640538a3a1b4052727d8d291d8d17218ba1abcaab1dca615bd83d3317a4bed89e495fadfbe6d20791562e5a8032284ae1cfeadc0020337ea0fe673

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vcredist.msi

          Filesize

          2.6MB

          MD5

          f194e681c552647c95441877b5552415

          SHA1

          285c6b1dbbc2d1525c9b1c276a4901b98d49b202

          SHA256

          6d4f42d5856384c2566ed79bdc587993208013640b035b04540de9f05ee597d6

          SHA512

          8ed21ce7829a1cb6c2dd4eff2e3701171aeba5b7e4337eaf0ddff86ea3fda812198a2e3fb4f1873b129944bdc8ddb09ebbd78e5c2b9811900cb853ef2afdab8c

        • C:\Windows\Installer\MSID8A.tmp

          Filesize

          28KB

          MD5

          85221b3bcba8dbe4b4a46581aa49f760

          SHA1

          746645c92594bfc739f77812d67cfd85f4b92474

          SHA256

          f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f

          SHA512

          060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d

        • C:\Windows\Installer\f76e88b.msi

          Filesize

          2.6MB

          MD5

          f194e681c552647c95441877b5552415

          SHA1

          285c6b1dbbc2d1525c9b1c276a4901b98d49b202

          SHA256

          6d4f42d5856384c2566ed79bdc587993208013640b035b04540de9f05ee597d6

          SHA512

          8ed21ce7829a1cb6c2dd4eff2e3701171aeba5b7e4337eaf0ddff86ea3fda812198a2e3fb4f1873b129944bdc8ddb09ebbd78e5c2b9811900cb853ef2afdab8c

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~3.EXE

          Filesize

          2.6MB

          MD5

          c5c698758bd9da02cc2ef94dcf1b4637

          SHA1

          1d6773537b0baba779090c7fa29be43d2130c3dd

          SHA256

          e1df4fda1f4f6a5d9faa94cc53e77458a53c56a87df4f1062708095150c86dbf

          SHA512

          c238860204de3933c7c41ba5f621f957d602286fa3a19a1bf4b6b272d8b417a20f5351ccf6ae5b46dde6ae938c7158e0f11d610e7a76a3530ba6825a96c9196b

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~3.EXE

          Filesize

          2.6MB

          MD5

          c5c698758bd9da02cc2ef94dcf1b4637

          SHA1

          1d6773537b0baba779090c7fa29be43d2130c3dd

          SHA256

          e1df4fda1f4f6a5d9faa94cc53e77458a53c56a87df4f1062708095150c86dbf

          SHA512

          c238860204de3933c7c41ba5f621f957d602286fa3a19a1bf4b6b272d8b417a20f5351ccf6ae5b46dde6ae938c7158e0f11d610e7a76a3530ba6825a96c9196b

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~3.EXE

          Filesize

          2.6MB

          MD5

          c5c698758bd9da02cc2ef94dcf1b4637

          SHA1

          1d6773537b0baba779090c7fa29be43d2130c3dd

          SHA256

          e1df4fda1f4f6a5d9faa94cc53e77458a53c56a87df4f1062708095150c86dbf

          SHA512

          c238860204de3933c7c41ba5f621f957d602286fa3a19a1bf4b6b272d8b417a20f5351ccf6ae5b46dde6ae938c7158e0f11d610e7a76a3530ba6825a96c9196b

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\VCREDI~3.EXE

          Filesize

          2.6MB

          MD5

          c5c698758bd9da02cc2ef94dcf1b4637

          SHA1

          1d6773537b0baba779090c7fa29be43d2130c3dd

          SHA256

          e1df4fda1f4f6a5d9faa94cc53e77458a53c56a87df4f1062708095150c86dbf

          SHA512

          c238860204de3933c7c41ba5f621f957d602286fa3a19a1bf4b6b272d8b417a20f5351ccf6ae5b46dde6ae938c7158e0f11d610e7a76a3530ba6825a96c9196b

        • \Windows\Installer\MSID8A.tmp

          Filesize

          28KB

          MD5

          85221b3bcba8dbe4b4a46581aa49f760

          SHA1

          746645c92594bfc739f77812d67cfd85f4b92474

          SHA256

          f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f

          SHA512

          060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d