Analysis

  • max time kernel
    128s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2023 13:52

General

  • Target

    SETUP.bat

  • Size

    192B

  • MD5

    4200cecaf0d0d6838e48b87f78c90c19

  • SHA1

    9ac646870d4047e34d72ea244d003397bb4e54be

  • SHA256

    1c684469f8230b75ca0c8e6d1ed39bfdbe22d7259e7c992986f9f3897bf91c05

  • SHA512

    1f363479d82e6d9f1f8e068aff25043f8af44027a49c337f788ead27329e510c9e8bed755d5a7cb484be3fcfcfeb986481e82d68cc4689fd92f79c7df22169e0

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 54 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 56 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\SETUP.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\vcredist_x86.exe
      vcredist_x86.exe /q:a /c:"msiexec /i vcredist.msi /qb!"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec /i vcredist.msi /qb!
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2432
    • C:\Windows\system32\msiexec.exe
      msiexec /i postgresql-8.3.msi
      2⤵
      • Enumerates connected drives
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of FindShellTrayWindow
      PID:608
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 85C1320EBB6305518603AD4DA889DF24
      2⤵
      • Loads dropped DLL
      PID:2464
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 33CFDFAAC0349FD410A527D956E9E424 C
      2⤵
      • Loads dropped DLL
      PID:2068
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2676
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005A8" "00000000000003C4"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredis1.cab

    Filesize

    247KB

    MD5

    aa85aa3738acfe30e197d9dfd5c3428d

    SHA1

    7f3ee53bd967265afe32b31d75b4f6c47363654a

    SHA256

    af3560ef0c55c7e4eff2170c63e7860498b5830e405a3841f96c91601e62e108

    SHA512

    e1bf248d6425f6ba91bf0a1f3d364321b09477af9be2f31f8bf6d92defbaddfbab8f3e6284262742378f1f87d60d06eee3b98fb081e60f9fb6f19c1797489861

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist.msi

    Filesize

    2.7MB

    MD5

    dc1ab7ce3b89fc7cac369d8b246cdafe

    SHA1

    c9a2d5a312f770189c4b65cb500905e4773c14ad

    SHA256

    dde77dd3473d3d07c459f17cd267f96f19264f976f2fcc85b4bbbecf26487560

    SHA512

    e554b8b36a7a853d4e6efb4e6faf2d784f41e8d26edafbb1689a944bf0a7a4b58258d820a3fada1496b8c8d295d8771fc713b29127d54a3fbc317659b7565cbe

  • C:\Users\Admin\AppData\Local\Temp\MSI9ECF.tmp

    Filesize

    48KB

    MD5

    246c2abfdfc0c728eaac835d7733e2b7

    SHA1

    b60eed815ce8f0e096cef0483083834ab05de022

    SHA256

    3569d3af32012dc51422b37be3ff838bae3d5f4412bd60b57fd2c0ce3c2180ff

    SHA512

    43d63f7969854e2cdda78d0a724aaa5eb2200228b4c44cc74c73108ce7aede7af85fc463d8967a3f9a9cdfab1bcc0ee171b343972f4608e6324618f35c362bae

  • C:\Windows\Installer\MSI72CF.tmp

    Filesize

    28KB

    MD5

    85221b3bcba8dbe4b4a46581aa49f760

    SHA1

    746645c92594bfc739f77812d67cfd85f4b92474

    SHA256

    f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f

    SHA512

    060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d

  • C:\Windows\Installer\f77e502.msi

    Filesize

    2.7MB

    MD5

    dc1ab7ce3b89fc7cac369d8b246cdafe

    SHA1

    c9a2d5a312f770189c4b65cb500905e4773c14ad

    SHA256

    dde77dd3473d3d07c459f17cd267f96f19264f976f2fcc85b4bbbecf26487560

    SHA512

    e554b8b36a7a853d4e6efb4e6faf2d784f41e8d26edafbb1689a944bf0a7a4b58258d820a3fada1496b8c8d295d8771fc713b29127d54a3fbc317659b7565cbe

  • \Users\Admin\AppData\Local\Temp\MSI9ECF.tmp

    Filesize

    48KB

    MD5

    246c2abfdfc0c728eaac835d7733e2b7

    SHA1

    b60eed815ce8f0e096cef0483083834ab05de022

    SHA256

    3569d3af32012dc51422b37be3ff838bae3d5f4412bd60b57fd2c0ce3c2180ff

    SHA512

    43d63f7969854e2cdda78d0a724aaa5eb2200228b4c44cc74c73108ce7aede7af85fc463d8967a3f9a9cdfab1bcc0ee171b343972f4608e6324618f35c362bae

  • \Windows\Installer\MSI72CF.tmp

    Filesize

    28KB

    MD5

    85221b3bcba8dbe4b4a46581aa49f760

    SHA1

    746645c92594bfc739f77812d67cfd85f4b92474

    SHA256

    f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f

    SHA512

    060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d