Analysis
-
max time kernel
169s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 16:55
Static task
static1
Behavioral task
behavioral1
Sample
793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe
Resource
win10v2004-20231023-en
General
-
Target
793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe
-
Size
17.7MB
-
MD5
a23db645b35ca1205d4cdf227a8a5868
-
SHA1
95d23db4daeb35c2c05855dcaec711692a5dc0ac
-
SHA256
793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf
-
SHA512
c45c397d7deb2007687bfbd02917729e7188fadf1f8ec5da0afbcea4c42886ccc9477b76d08e237be8aaefab68d20314c410afcb3da2c8c6dfe4ba6153727a24
-
SSDEEP
393216:wyabgyGmGbk4uWUWeIFiL//kkN2ODLz1Zi9tLwRLs2gqmZb:wyOHGmkyBWVFiL//tN/Lz1ZifiLlgZZb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4648 FrmInst.exe -
resource yara_rule behavioral2/files/0x0009000000022cc6-69.dat upx behavioral2/files/0x0009000000022cc6-68.dat upx behavioral2/files/0x0009000000022cc6-71.dat upx behavioral2/memory/4648-70-0x0000000000870000-0x0000000000926000-memory.dmp upx behavioral2/memory/4648-85-0x0000000000870000-0x0000000000926000-memory.dmp upx -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeShutdownPrivilege 740 msiexec.exe Token: SeIncreaseQuotaPrivilege 740 msiexec.exe Token: SeSecurityPrivilege 2032 msiexec.exe Token: SeCreateTokenPrivilege 740 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 740 msiexec.exe Token: SeLockMemoryPrivilege 740 msiexec.exe Token: SeIncreaseQuotaPrivilege 740 msiexec.exe Token: SeMachineAccountPrivilege 740 msiexec.exe Token: SeTcbPrivilege 740 msiexec.exe Token: SeSecurityPrivilege 740 msiexec.exe Token: SeTakeOwnershipPrivilege 740 msiexec.exe Token: SeLoadDriverPrivilege 740 msiexec.exe Token: SeSystemProfilePrivilege 740 msiexec.exe Token: SeSystemtimePrivilege 740 msiexec.exe Token: SeProfSingleProcessPrivilege 740 msiexec.exe Token: SeIncBasePriorityPrivilege 740 msiexec.exe Token: SeCreatePagefilePrivilege 740 msiexec.exe Token: SeCreatePermanentPrivilege 740 msiexec.exe Token: SeBackupPrivilege 740 msiexec.exe Token: SeRestorePrivilege 740 msiexec.exe Token: SeShutdownPrivilege 740 msiexec.exe Token: SeDebugPrivilege 740 msiexec.exe Token: SeAuditPrivilege 740 msiexec.exe Token: SeSystemEnvironmentPrivilege 740 msiexec.exe Token: SeChangeNotifyPrivilege 740 msiexec.exe Token: SeRemoteShutdownPrivilege 740 msiexec.exe Token: SeUndockPrivilege 740 msiexec.exe Token: SeSyncAgentPrivilege 740 msiexec.exe Token: SeEnableDelegationPrivilege 740 msiexec.exe Token: SeManageVolumePrivilege 740 msiexec.exe Token: SeImpersonatePrivilege 740 msiexec.exe Token: SeCreateGlobalPrivilege 740 msiexec.exe Token: SeBackupPrivilege 2168 vssvc.exe Token: SeRestorePrivilege 2168 vssvc.exe Token: SeAuditPrivilege 2168 vssvc.exe Token: SeBackupPrivilege 2032 msiexec.exe Token: SeRestorePrivilege 2032 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 740 msiexec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4648 4904 793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe 87 PID 4904 wrote to memory of 4648 4904 793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe 87 PID 4904 wrote to memory of 4648 4904 793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe 87 PID 4648 wrote to memory of 740 4648 FrmInst.exe 88 PID 4648 wrote to memory of 740 4648 FrmInst.exe 88 PID 4648 wrote to memory of 740 4648 FrmInst.exe 88 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe"C:\Users\Admin\AppData\Local\Temp\793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp\FrmInst.exe/Install=Agent /FramePkg /OriginalFramePkg="C:\Users\Admin\AppData\Local\Temp\793ca9356bbe8faeaa6f8ea67111b4fa95db036107c958005d5ed0378418edcf.exe" /Cleanup="C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp" /LOGDIR="C:\Users\Admin\AppData\Local\Temp\McAfeeLogs" /EmbeddedUsername="" /EmbeddedDomain="" /EmbeddedPassword=""2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\msiexec.exe/i "C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp\MFEagent_x64.msi" ADDLOCAL=Main,Agent,Svc_x64 TRANSFORMS=:1033.mst /qb+ /l+*v "C:\Users\Admin\AppData\Local\Temp\McAfeeLogs\MFEagent.msi.2023.11.27.17.03.27.log" SITELISTINFO="C:\Users\Admin\AppData\Local\Temp\mfe8F1CF74C-1515-41CE-BF87-B821B2AF1448.tmp" PRESERVEREPOSITORIES=True FRMINSTLOGFILE="C:\Users\Admin\AppData\Local\Temp\McAfeeLogs\FrmInst_FEUTZCII"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:740
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD509de84a1ebdac3010ef3d0e62feffe11
SHA11f052cac637c330929a482db54498dea7c58b524
SHA25677bdc695f79ff2e80338cd639343dac8d37b9d0b6aa71fc5dc31175cdda7e684
SHA51246070f1a59c4e2722e9dd5847175ce20e4adfc943a467992d99e23bd8a66f853808af39eb7dd0f85420fcc0f057c84b7ebdc4d658fb4b293b0106232bc75f83b
-
Filesize
2KB
MD516c815f4e6f963492935b5cf8b073cba
SHA10f4406ef623d3b9a2d7f81778cad495392a5a711
SHA25699a8f8f65f4e2a7edd5df730a171568b4c03ea0a579aedfb3cd5c65a19418e8e
SHA512d782548ad764681a576fbc1125b791306c16412617b6f100dcb690a804e228dbd251381b32c555c0980d9ebedc8ff30e60c68b72e04a00193143fe6fc136799a
-
Filesize
5.0MB
MD5a6925927a48d4f8188e2c8cf7d4d43c4
SHA18d6cae3e8718a6985bed567910c7787d4b5ff70f
SHA2560181b546b6b8cfd2937bdf329af9333d0b5f5ea31d51c26515e40e00197d5767
SHA512e3cda574604ccb1212c0a3c7c31b272e2b0baef36f83fbf14271d9a0ba8030ffe9710763b6e7f55a9edebcceed8daaf283d7f1c1ade827258c5964c75781e9af
-
Filesize
294KB
MD52fe363f0f20917ea26436c147ea49793
SHA19e66d752d0caf0a6ed43200e3df61b94350a1912
SHA256ac7cc092993f5bf79983bee92bcad7b88321f8c0b62710c570881c63c6987adb
SHA512075cedf6da8be93a86e22065e8164e5726a8b216e68f962e36ef91a9a97254c2b1da301d0a169ff882a46acae2332e5f223fc84f20eb4025a06008bb69948a9d
-
Filesize
294KB
MD52fe363f0f20917ea26436c147ea49793
SHA19e66d752d0caf0a6ed43200e3df61b94350a1912
SHA256ac7cc092993f5bf79983bee92bcad7b88321f8c0b62710c570881c63c6987adb
SHA512075cedf6da8be93a86e22065e8164e5726a8b216e68f962e36ef91a9a97254c2b1da301d0a169ff882a46acae2332e5f223fc84f20eb4025a06008bb69948a9d
-
Filesize
294KB
MD52fe363f0f20917ea26436c147ea49793
SHA19e66d752d0caf0a6ed43200e3df61b94350a1912
SHA256ac7cc092993f5bf79983bee92bcad7b88321f8c0b62710c570881c63c6987adb
SHA512075cedf6da8be93a86e22065e8164e5726a8b216e68f962e36ef91a9a97254c2b1da301d0a169ff882a46acae2332e5f223fc84f20eb4025a06008bb69948a9d
-
Filesize
2.6MB
MD5ace5e54e175a7b11b32cbc0a9ad3e0db
SHA1854fbb030f6ca248ec3c35cff0206401d24c8cd0
SHA256c87fc6665231c2dac635cf04d2dc63d8c7df935d76a984f8eeaf17b2929285c2
SHA512927febcd603dc1da17a2ab9ca0c7141b9de31d8bcc2780441730dbbe770932e53b2415572514bbc003d9ad8b52de9dae5bafaaf9da24d5ef3dfdfb85e0b2e8ce
-
Filesize
2.6MB
MD501e9aab6179bc79fb2b5990cdbcc582a
SHA1cec8c517fc32ef23eb639a0aafebde8bbc4f782d
SHA2562ccce6254114aa375fb5e9ebdbfbd8cf6d193b84c7fc4c7793920d343183cf2b
SHA5122b21d0a18a56eaed99f0dba27f077b1957aacc3e2af20dc206330fcf08b333b210af4442c85d2569a44d2cf7a102c98da93f0eb3a103b08c8b66b4d580834efb
-
Filesize
108B
MD5726963cb852dea4c425108b5c118098f
SHA1ca808b094588c7bcf4483642b3d4f09be37ce697
SHA2569b2ba5bce55178d25260501f5baacbaed7d7dfda40653287057b61d35bbabb38
SHA512f713e76094c0a5f042d70270b805305de9648427d87acee49b7e3ee446d4375c801536b888d5c8cfa70f6b24bd014b800e3f1575b8c83b207b88c33c5b344b47