Analysis

  • max time kernel
    138s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/11/2023, 22:28

General

  • Target

    8177455ab89cc96f0c26bc42907da1a4f0b21fdc96a0cc96650843fd616551f4.msi

  • Size

    126KB

  • MD5

    478dcb54e0a610a160a079656b9582de

  • SHA1

    5ea03fa8326ed87a0c81740092c131f23bc5f651

  • SHA256

    8177455ab89cc96f0c26bc42907da1a4f0b21fdc96a0cc96650843fd616551f4

  • SHA512

    3b1676e12e9b185e9f5ca7dfd43702fd04cc237c21b42137204db0d91bef39e778159115b1113ad3686e45ff9b2df3e5157a3d402ccccd87a656ddbf2b6c734e

  • SSDEEP

    1536:1lnjg5f3DXJLAsfog8Ct45QgVuS3R7YjRk8vYRUoAd2Qf:joJLAsmdi

Score
9/10

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (177) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 64 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\8177455ab89cc96f0c26bc42907da1a4f0b21fdc96a0cc96650843fd616551f4.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4052
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2132
    • C:\Windows\Installer\MSIC9F3.tmp
      "C:\Windows\Installer\MSIC9F3.tmp" debug
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c vssadmin delete shadows /all
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all
          4⤵
          • Interacts with shadow copies
          PID:4436
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im msftesql.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im msftesql.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:5028
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im sqlagent.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im sqlagent.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3332
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im sqlbrowser.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4984
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im sqlbrowser.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1048
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im sqlservr.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3076
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im sqlservr.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1520
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im sqlwriter.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4084
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im sqlwriter.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2640
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im oracle.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3632
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im oracle.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4176
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im ocssd.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:844
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im ocssd.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3376
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im dbsnmp.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3840
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im dbsnmp.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3088
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im synctime.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im synctime.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1376
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im mydesktopqos.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4480
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im mydesktopqos.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4232
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im agntsvc.exeisqlplussvc.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5056
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im agntsvc.exeisqlplussvc.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3852
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im xfssvccon.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1788
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im xfssvccon.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4072
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im mydesktopservice.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im mydesktopservice.exe
          4⤵
          • Kills process with taskkill
          PID:5048
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im ocautoupds.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1860
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im ocautoupds.exe
          4⤵
          • Kills process with taskkill
          PID:1564
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c taskkill /f /im agntsvc.exeagntsvc.exe
        3⤵
          PID:116
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im agntsvc.exeagntsvc.exe
            4⤵
            • Kills process with taskkill
            PID:4440
        • C:\Windows\system32\cmd.exe
          "cmd.exe" /c taskkill /f /im agntsvc.exeencsvc.exe
          3⤵
            PID:5112
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im agntsvc.exeencsvc.exe
              4⤵
              • Kills process with taskkill
              PID:4272
          • C:\Windows\system32\cmd.exe
            "cmd.exe" /c taskkill /f /im firefoxconfig.exe
            3⤵
              PID:1028
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im firefoxconfig.exe
                4⤵
                • Kills process with taskkill
                PID:1464
            • C:\Windows\system32\cmd.exe
              "cmd.exe" /c taskkill /f /im tbirdconfig.exe
              3⤵
                PID:3884
                • C:\Windows\system32\taskkill.exe
                  taskkill /f /im tbirdconfig.exe
                  4⤵
                  • Kills process with taskkill
                  PID:5044
              • C:\Windows\system32\cmd.exe
                "cmd.exe" /c taskkill /f /im ocomm.exe
                3⤵
                  PID:404
                  • C:\Windows\system32\taskkill.exe
                    taskkill /f /im ocomm.exe
                    4⤵
                    • Kills process with taskkill
                    PID:2368
                • C:\Windows\system32\cmd.exe
                  "cmd.exe" /c taskkill /f /im mysqld.exe
                  3⤵
                    PID:1624
                    • C:\Windows\system32\taskkill.exe
                      taskkill /f /im mysqld.exe
                      4⤵
                      • Kills process with taskkill
                      PID:912
                  • C:\Windows\system32\cmd.exe
                    "cmd.exe" /c taskkill /f /im mysqld-nt.exe
                    3⤵
                      PID:5056
                      • C:\Windows\system32\taskkill.exe
                        taskkill /f /im mysqld-nt.exe
                        4⤵
                        • Kills process with taskkill
                        PID:3132
                    • C:\Windows\system32\cmd.exe
                      "cmd.exe" /c taskkill /f /im mysqld-opt.exe
                      3⤵
                        PID:1788
                        • C:\Windows\system32\taskkill.exe
                          taskkill /f /im mysqld-opt.exe
                          4⤵
                          • Kills process with taskkill
                          PID:3892
                      • C:\Windows\system32\cmd.exe
                        "cmd.exe" /c taskkill /f /im dbeng50.exe
                        3⤵
                          PID:3532
                          • C:\Windows\system32\taskkill.exe
                            taskkill /f /im dbeng50.exe
                            4⤵
                            • Kills process with taskkill
                            PID:2320
                        • C:\Windows\system32\cmd.exe
                          "cmd.exe" /c taskkill /f /im sqbcoreservice.exe
                          3⤵
                            PID:3312
                            • C:\Windows\system32\taskkill.exe
                              taskkill /f /im sqbcoreservice.exe
                              4⤵
                              • Kills process with taskkill
                              PID:4456
                          • C:\Windows\system32\cmd.exe
                            "cmd.exe" /c taskkill /f /im excel.exe
                            3⤵
                              PID:4196
                              • C:\Windows\system32\taskkill.exe
                                taskkill /f /im excel.exe
                                4⤵
                                • Kills process with taskkill
                                PID:3632
                            • C:\Windows\system32\cmd.exe
                              "cmd.exe" /c taskkill /f /im infopath.exe
                              3⤵
                                PID:4028
                                • C:\Windows\system32\taskkill.exe
                                  taskkill /f /im infopath.exe
                                  4⤵
                                  • Kills process with taskkill
                                  PID:844
                              • C:\Windows\system32\cmd.exe
                                "cmd.exe" /c taskkill /f /im msaccess.exe
                                3⤵
                                  PID:3840
                                  • C:\Windows\system32\taskkill.exe
                                    taskkill /f /im msaccess.exe
                                    4⤵
                                    • Kills process with taskkill
                                    PID:1016
                                • C:\Windows\system32\cmd.exe
                                  "cmd.exe" /c taskkill /f /im mspub.exe
                                  3⤵
                                    PID:4460
                                    • C:\Windows\system32\taskkill.exe
                                      taskkill /f /im mspub.exe
                                      4⤵
                                      • Kills process with taskkill
                                      PID:1428
                                  • C:\Windows\system32\cmd.exe
                                    "cmd.exe" /c taskkill /f /im onenote.exe
                                    3⤵
                                      PID:3160
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /f /im onenote.exe
                                        4⤵
                                        • Kills process with taskkill
                                        PID:1624
                                    • C:\Windows\system32\cmd.exe
                                      "cmd.exe" /c taskkill /f /im outlook.exe
                                      3⤵
                                        PID:1956
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im outlook.exe
                                          4⤵
                                          • Kills process with taskkill
                                          PID:4496
                                      • C:\Windows\system32\cmd.exe
                                        "cmd.exe" /c taskkill /f /im powerpnt.exe
                                        3⤵
                                          PID:1680
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /f /im powerpnt.exe
                                            4⤵
                                            • Kills process with taskkill
                                            PID:2184
                                        • C:\Windows\system32\cmd.exe
                                          "cmd.exe" /c taskkill /f /im steam.exe
                                          3⤵
                                            PID:4084
                                            • C:\Windows\system32\taskkill.exe
                                              taskkill /f /im steam.exe
                                              4⤵
                                              • Kills process with taskkill
                                              PID:1884
                                          • C:\Windows\system32\cmd.exe
                                            "cmd.exe" /c taskkill /f /im sqlservr.exe
                                            3⤵
                                              PID:1496
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /f /im sqlservr.exe
                                                4⤵
                                                • Kills process with taskkill
                                                PID:3628
                                            • C:\Windows\system32\cmd.exe
                                              "cmd.exe" /c taskkill /f /im thebat.exe
                                              3⤵
                                                PID:2808
                                                • C:\Windows\system32\taskkill.exe
                                                  taskkill /f /im thebat.exe
                                                  4⤵
                                                  • Kills process with taskkill
                                                  PID:1280
                                              • C:\Windows\system32\cmd.exe
                                                "cmd.exe" /c taskkill /f /im thebat64.exe
                                                3⤵
                                                  PID:3328
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill /f /im thebat64.exe
                                                    4⤵
                                                    • Kills process with taskkill
                                                    PID:2272
                                                • C:\Windows\system32\cmd.exe
                                                  "cmd.exe" /c taskkill /f /im thunderbird.exe
                                                  3⤵
                                                    PID:2676
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /f /im thunderbird.exe
                                                      4⤵
                                                      • Kills process with taskkill
                                                      PID:812
                                                  • C:\Windows\system32\cmd.exe
                                                    "cmd.exe" /c taskkill /f /im visio.exe
                                                    3⤵
                                                      PID:404
                                                      • C:\Windows\system32\taskkill.exe
                                                        taskkill /f /im visio.exe
                                                        4⤵
                                                        • Kills process with taskkill
                                                        PID:1304
                                                    • C:\Windows\system32\cmd.exe
                                                      "cmd.exe" /c taskkill /f /im winword.exe
                                                      3⤵
                                                        PID:2912
                                                      • C:\Windows\system32\cmd.exe
                                                        "cmd.exe" /c taskkill /f /im wordpad.exe
                                                        3⤵
                                                          PID:3948
                                                          • C:\Windows\system32\taskkill.exe
                                                            taskkill /f /im wordpad.exe
                                                            4⤵
                                                            • Kills process with taskkill
                                                            PID:4152
                                                        • C:\Windows\system32\cmd.exe
                                                          "cmd.exe" /c taskkill /f /im tnslsnr.exe
                                                          3⤵
                                                            PID:4216
                                                            • C:\Windows\System32\Conhost.exe
                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              4⤵
                                                                PID:1788
                                                              • C:\Windows\system32\taskkill.exe
                                                                taskkill /f /im tnslsnr.exe
                                                                4⤵
                                                                • Kills process with taskkill
                                                                PID:2176
                                                        • C:\Windows\system32\vssvc.exe
                                                          C:\Windows\system32\vssvc.exe
                                                          1⤵
                                                          • Checks SCSI registry key(s)
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3640
                                                        • C:\Windows\system32\taskkill.exe
                                                          taskkill /f /im winword.exe
                                                          1⤵
                                                          • Kills process with taskkill
                                                          PID:4916
                                                        • C:\Windows\system32\DllHost.exe
                                                          C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                          1⤵
                                                            PID:1884
                                                          • C:\Windows\system32\backgroundTaskHost.exe
                                                            "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                            1⤵
                                                              PID:1280

                                                            Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Users\Admin\Desktop\READ_ME4.html

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    fd783c4ac7dfae763f922102d3b40f6f

                                                                    SHA1

                                                                    9e65fb2b9abb12e64da8d68181d42621270c109f

                                                                    SHA256

                                                                    ec878fb05904517762b47c795989e1ae43c694c5b02dd4d23e15b3e19466f90b

                                                                    SHA512

                                                                    6b7f800bed8a3895f1856586d4da45fc8e6e1a19613d25d404e465a2a030ce0a2c4f697e3ef16b833897eaab382a11e6dd84fb78efc90bf8e8aa8e04af28a7f6

                                                                  • C:\Windows\Installer\MSIC9F3.tmp

                                                                    Filesize

                                                                    74KB

                                                                    MD5

                                                                    26ff72b0b85e764400724e442c164046

                                                                    SHA1

                                                                    c789942d013d8b45b6988ecc6491f5f1a1746311

                                                                    SHA256

                                                                    c3c0cf25d682e981c7ce1cc0a00fa2b8b46cce2fa49abe38bb412da21da99cb7

                                                                    SHA512

                                                                    fe9fdef93dfc44078cbbedd8d77c150932752be48b5f55eb0477c87bdcc8f4257fbaddf57b7d4a24c975f994d1940862bcd9444dc4b533561a10d27fac6058fe

                                                                  • C:\Windows\Installer\MSIC9F3.tmp

                                                                    Filesize

                                                                    74KB

                                                                    MD5

                                                                    26ff72b0b85e764400724e442c164046

                                                                    SHA1

                                                                    c789942d013d8b45b6988ecc6491f5f1a1746311

                                                                    SHA256

                                                                    c3c0cf25d682e981c7ce1cc0a00fa2b8b46cce2fa49abe38bb412da21da99cb7

                                                                    SHA512

                                                                    fe9fdef93dfc44078cbbedd8d77c150932752be48b5f55eb0477c87bdcc8f4257fbaddf57b7d4a24c975f994d1940862bcd9444dc4b533561a10d27fac6058fe

                                                                  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                                                    Filesize

                                                                    23.0MB

                                                                    MD5

                                                                    27f78f6d50ae84e1b0917a57389d4074

                                                                    SHA1

                                                                    d1b83e62fee9781d903796a3a99775e0fe774054

                                                                    SHA256

                                                                    1be4c9012c770fe0a1a6a7a412b6d624d8999f436b9127a33e148f5b5d5cb88c

                                                                    SHA512

                                                                    9cee7e81662bd1be8e4fbcee42785dc3a71f40a6cf175f2758e4d36d542fc2489e7ea5b8266ccd2a0f887f33f7fd937c6202bb4cb15044f72c477956ca89fedd

                                                                  • \??\Volume{c2d04a06-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{5d6ec4e8-2451-4f3a-a307-b557153371fa}_OnDiskSnapshotProp

                                                                    Filesize

                                                                    5KB

                                                                    MD5

                                                                    06f3294b973008051a9d9e09477cb826

                                                                    SHA1

                                                                    a8a43b12488c5b0292ec2e34d34fe4793e786e3c

                                                                    SHA256

                                                                    a745f9d26d5810fb6daf630b38cd77a706b1e17b6f1920bb54662d6656a73a47

                                                                    SHA512

                                                                    bd7cdf9312239e11c8fa92321211fbaa2ad858ed9185fbd97ce74097a5a0e984b008ae2a80e9e0f61f44b4259ba3945a5d8ab05ad87279556d15e2250f5f0432

                                                                  • memory/1804-17-0x00007FFBD4680000-0x00007FFBD5021000-memory.dmp

                                                                    Filesize

                                                                    9.6MB

                                                                  • memory/1804-18-0x0000000000BD0000-0x0000000000BE0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/1804-20-0x00007FFBD4680000-0x00007FFBD5021000-memory.dmp

                                                                    Filesize

                                                                    9.6MB

                                                                  • memory/1804-21-0x0000000000F30000-0x0000000000F3C000-memory.dmp

                                                                    Filesize

                                                                    48KB

                                                                  • memory/1804-22-0x00007FFBD4680000-0x00007FFBD5021000-memory.dmp

                                                                    Filesize

                                                                    9.6MB

                                                                  • memory/1804-23-0x0000000000BD0000-0x0000000000BE0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/1804-24-0x00007FFBD4680000-0x00007FFBD5021000-memory.dmp

                                                                    Filesize

                                                                    9.6MB