Analysis

  • max time kernel
    169s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2023, 16:55

General

  • Target

    793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe

  • Size

    17.7MB

  • MD5

    a23db645b35ca1205d4cdf227a8a5868

  • SHA1

    95d23db4daeb35c2c05855dcaec711692a5dc0ac

  • SHA256

    793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf

  • SHA512

    c45c397d7deb2007687bfbd02917729e7188fadf1f8ec5da0afbcea4c42886ccc9477b76d08e237be8aaefab68d20314c410afcb3da2c8c6dfe4ba6153727a24

  • SSDEEP

    393216:wyabgyGmGbk4uWUWeIFiL//kkN2ODLz1Zi9tLwRLs2gqmZb:wyOHGmkyBWVFiL//tN/Lz1ZifiLlgZZb

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe
    "C:\Users\Admin\AppData\Local\Temp\793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp\FrmInst.exe
      /Install=Agent /FramePkg /OriginalFramePkg="C:\Users\Admin\AppData\Local\Temp\793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe" /Cleanup="C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp" /LOGDIR="C:\Users\Admin\AppData\Local\Temp\McAfeeLogs" /EmbeddedUsername="" /EmbeddedDomain="" /EmbeddedPassword=""
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4648
      • C:\Windows\SysWOW64\msiexec.exe
        /i "C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp\MFEagent_x64.msi" ADDLOCAL=Main,Agent,Svc_x64 TRANSFORMS=:1033.mst /qb+ /l+*v "C:\Users\Admin\AppData\Local\Temp\McAfeeLogs\MFEagent.msi.2023.11.27.17.03.27.log" SITELISTINFO="C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp" PRESERVEREPOSITORIES=True FRMINSTLOGFILE="C:\Users\Admin\AppData\Local\Temp\McAfeeLogs\FrmInst_FEUTZCII"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:740
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2032
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\McAfeeLogs\FrmInst_FEUTZCII.log

    Filesize

    1KB

    MD5

    09de84a1ebdac3010ef3d0e62feffe11

    SHA1

    1f052cac637c330929a482db54498dea7c58b524

    SHA256

    77bdc695f79ff2e80338cd639343dac8d37b9d0b6aa71fc5dc31175cdda7e684

    SHA512

    46070f1a59c4e2722e9dd5847175ce20e4adfc943a467992d99e23bd8a66f853808af39eb7dd0f85420fcc0f057c84b7ebdc4d658fb4b293b0106232bc75f83b

  • C:\Users\Admin\AppData\Local\Temp\McAfeeLogs\MFEagent.msi.2023.11.27.17.03.27.log

    Filesize

    2KB

    MD5

    16c815f4e6f963492935b5cf8b073cba

    SHA1

    0f4406ef623d3b9a2d7f81778cad495392a5a711

    SHA256

    99a8f8f65f4e2a7edd5df730a171568b4c03ea0a579aedfb3cd5c65a19418e8e

    SHA512

    d782548ad764681a576fbc1125b791306c16412617b6f100dcb690a804e228dbd251381b32c555c0980d9ebedc8ff30e60c68b72e04a00193143fe6fc136799a

  • C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp\DXL.zip

    Filesize

    5.0MB

    MD5

    a6925927a48d4f8188e2c8cf7d4d43c4

    SHA1

    8d6cae3e8718a6985bed567910c7787d4b5ff70f

    SHA256

    0181b546b6b8cfd2937bdf329af9333d0b5f5ea31d51c26515e40e00197d5767

    SHA512

    e3cda574604ccb1212c0a3c7c31b272e2b0baef36f83fbf14271d9a0ba8030ffe9710763b6e7f55a9edebcceed8daaf283d7f1c1ade827258c5964c75781e9af

  • C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp\FrmInst.exe

    Filesize

    294KB

    MD5

    2fe363f0f20917ea26436c147ea49793

    SHA1

    9e66d752d0caf0a6ed43200e3df61b94350a1912

    SHA256

    ac7cc092993f5bf79983bee92bcad7b88321f8c0b62710c570881c63c6987adb

    SHA512

    075cedf6da8be93a86e22065e8164e5726a8b216e68f962e36ef91a9a97254c2b1da301d0a169ff882a46acae2332e5f223fc84f20eb4025a06008bb69948a9d

  • C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp\FrmInst.exe

    Filesize

    294KB

    MD5

    2fe363f0f20917ea26436c147ea49793

    SHA1

    9e66d752d0caf0a6ed43200e3df61b94350a1912

    SHA256

    ac7cc092993f5bf79983bee92bcad7b88321f8c0b62710c570881c63c6987adb

    SHA512

    075cedf6da8be93a86e22065e8164e5726a8b216e68f962e36ef91a9a97254c2b1da301d0a169ff882a46acae2332e5f223fc84f20eb4025a06008bb69948a9d

  • C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp\FrmInst.exe

    Filesize

    294KB

    MD5

    2fe363f0f20917ea26436c147ea49793

    SHA1

    9e66d752d0caf0a6ed43200e3df61b94350a1912

    SHA256

    ac7cc092993f5bf79983bee92bcad7b88321f8c0b62710c570881c63c6987adb

    SHA512

    075cedf6da8be93a86e22065e8164e5726a8b216e68f962e36ef91a9a97254c2b1da301d0a169ff882a46acae2332e5f223fc84f20eb4025a06008bb69948a9d

  • C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp\MFEagent.msi

    Filesize

    2.6MB

    MD5

    ace5e54e175a7b11b32cbc0a9ad3e0db

    SHA1

    854fbb030f6ca248ec3c35cff0206401d24c8cd0

    SHA256

    c87fc6665231c2dac635cf04d2dc63d8c7df935d76a984f8eeaf17b2929285c2

    SHA512

    927febcd603dc1da17a2ab9ca0c7141b9de31d8bcc2780441730dbbe770932e53b2415572514bbc003d9ad8b52de9dae5bafaaf9da24d5ef3dfdfb85e0b2e8ce

  • C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp\MFEagent_x64.msi

    Filesize

    2.6MB

    MD5

    01e9aab6179bc79fb2b5990cdbcc582a

    SHA1

    cec8c517fc32ef23eb639a0aafebde8bbc4f782d

    SHA256

    2ccce6254114aa375fb5e9ebdbfbd8cf6d193b84c7fc4c7793920d343183cf2b

    SHA512

    2b21d0a18a56eaed99f0dba27f077b1957aacc3e2af20dc206330fcf08b333b210af4442c85d2569a44d2cf7a102c98da93f0eb3a103b08c8b66b4d580834efb

  • C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp\contrib.ini

    Filesize

    108B

    MD5

    726963cb852dea4c425108b5c118098f

    SHA1

    ca808b094588c7bcf4483642b3d4f09be37ce697

    SHA256

    9b2ba5bce55178d25260501f5baacbaed7d7dfda40653287057b61d35bbabb38

    SHA512

    f713e76094c0a5f042d70270b805305de9648427d87acee49b7e3ee446d4375c801536b888d5c8cfa70f6b24bd014b800e3f1575b8c83b207b88c33c5b344b47

  • memory/4648-70-0x0000000000870000-0x0000000000926000-memory.dmp

    Filesize

    728KB

  • memory/4648-85-0x0000000000870000-0x0000000000926000-memory.dmp

    Filesize

    728KB