Resubmissions

23-12-2023 12:44

231223-pylqjscdd5 7

23-12-2023 12:05

231223-n869kabad7 7

Analysis

  • max time kernel
    43s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2023 12:44

General

  • Target

    Setup_SmoothWizard_1-0-0-7.msi

  • Size

    3.3MB

  • MD5

    253310261c1d0d7ac2f136307d2c7761

  • SHA1

    c68e9122f3d6a40a9418f5e1782a89c23674c937

  • SHA256

    92769f62cbfd2f1bd615b0976d069e839c4bb0f3ee759c316a05aa0de8fc50c9

  • SHA512

    468b666bd7a1150b37c2d20d5d0803f08141bcd3de5d82a7e01eb278bc62c857706656df94075d6ab1b6f9a72979b28a005a5425bfd450362a699f58f3b3fd31

  • SSDEEP

    98304:WWB/Pss9Mp8lzKGtL00lriLvAdAJ4sVLkbkH:d/P99MalzxlirAd4G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Setup_SmoothWizard_1-0-0-7.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1632
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding FCE3501AEADC865FAB2D15F055E44A2E C
      2⤵
      • Loads dropped DLL
      PID:4732
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 041123194EC8B3B7FB10DEF7FCC15F10
      2⤵
      • Loads dropped DLL
      PID:1612
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:400
    • C:\Program Files\SmoothWizard\smoothwizard.exe
      "C:\Program Files\SmoothWizard\smoothwizard.exe"
      1⤵
      • Executes dropped EXE
      PID:4176

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e576ed8.rbs

      Filesize

      70KB

      MD5

      fcce0cd4e1977fe8b53afafe34bad309

      SHA1

      084a7c5cc7bf0a1be04c062242fa922203f2c7c8

      SHA256

      9d732a9b178ecc17603f793d99edd8cb18c03468d4566f9772d9b21139cff2d7

      SHA512

      f02c279672ba71e7055371af3e843eedb81cb873d47c360fbad441b2a192a51c377d22499570db9cf4c6c01b6525f185b65cf91a449bb3217c85456b7643b08e

    • C:\Program Files\SmoothWizard\System.IO.Compression.dll

      Filesize

      65KB

      MD5

      b5bceea7ef5ec52cd91c22cf91da0f94

      SHA1

      c680f2ac978785b1f9b2a082a8da0e59b506ae19

      SHA256

      d13f7d37eb9b0d5ba1cbcdfb05b9aff55735e4fd2d0d407e9aa1d7a102d3eecf

      SHA512

      90a8bed664ba842334947b7220ffabea877bc0c36cde0a413351927110015da0d7d2c4623ac338e7b08405ca77b9f61b75a832821c1a221c7108f2a9ab372d1b

    • C:\Program Files\SmoothWizard\smoothwizard.exe

      Filesize

      2.6MB

      MD5

      e0931c1aad39fe713afd533968ff4ed6

      SHA1

      f1fe6a19b72c583555e5e8fa2ca3f84ba7bc2103

      SHA256

      b7115201b638b2425d6103c4e084fb497e10b48ffbbc9c9cda26288269cb4f62

      SHA512

      ec4153941b161f80c61f5f83c7d5cb24b427ed6573c05ecb62893fb42367216ecd3ddf092487263b54b67da0f518fda26f54960233c253cfd264ab01fb0b514a

    • C:\Program Files\SmoothWizard\smoothwizard.exe

      Filesize

      2.4MB

      MD5

      1b517af3f2381dfde99a8c8acfdecd02

      SHA1

      4e52305ba438229c9aea25531f1f73e131d81d39

      SHA256

      e33736f9245aaf5faa93dd5847613e9e7db76d4df744cbed90a9a1206b947d74

      SHA512

      1fd11af086cb33b330c681c2c1fef6630b2abd56f84952b37cf1ce01a6e550ddcb632a9fd02287ab4555c850f1fa538c20eeb3a0f84539db4477aaac3a4963ee

    • C:\Program Files\SmoothWizard\smoothwizard.exe.config

      Filesize

      1KB

      MD5

      031f98911182c2a121194ce9aa0c2c1d

      SHA1

      4323fc39305f84577ba9d36b95117a7820a740cc

      SHA256

      1496c3191fddf30830054fa2cbcfe0c69cdabf5c37a157aa272396a98d9df35a

      SHA512

      4f3c4f71ae07807bd4e8797f4a92e72fd3fc2e78deac02437004b771a9022effbcd6f27322aca0d22a784f54e9510aa4b1f1acf5b88475c7f0fb810f53c9b6e3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\30069012ED3CF5DB92F9F4FC78D55E2D_16AA5B9B040CB195ADDB70661F18F3C5

      Filesize

      1KB

      MD5

      b180e591f5f94069209f9ac248a16426

      SHA1

      5a8648d7b94822131b2a77f06f011bce07e2a36f

      SHA256

      a3632891408e047483a934af72b7a009ed1b67aaa3216bd53e4989eecf6926ad

      SHA512

      3908e22880baefcfe514238bd46d2663ca762d0b0d08b73dff84f7c4e9c255b2e6d0ed3511beaaaf0a89c4427cb2883e2a54614ea14ee26cc2d7d7c08ea365f0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\68FAF71AF355126BCA00CE2E73CC7374_E5F521CA60C5ED8C2B4E2BF399FE2061

      Filesize

      1KB

      MD5

      2da324a81b1165d374653a507e9c8f09

      SHA1

      71484816df87610989d5eb500eac2392710898d1

      SHA256

      ca6ccb72cda058eee574f503b02dad70ebf7b8f959f70ba5302f5ee84f54962d

      SHA512

      24e0ddbe7546705347d60b57f05b6fa0c002d62ae4ca3dc0760feaa52b6cb04360eb2e4c56d42551c7a7f68ca31b246c5a930cc54527237e4d677b72b114bd11

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\856FDBDDFEAC90A3D62D621EBF196637

      Filesize

      770B

      MD5

      f59fe5c24d1c274725775161394efd6b

      SHA1

      b76adc2f6815d26f69df4c4acedbe82496fe0597

      SHA256

      591ab31defc1de696497438637a0b6cf876a7235ecb44824228a6f07db7ff670

      SHA512

      da421a1b0a9893bf97a199aa5035a0e27f0442f57b0da611838b108361b85ff509230ef84749c46428d4e27bff7a4ad5a1cf2fb2965ea68526bfb7356e1e1134

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B03113490075047F519A3F760F0FF379_CEB17B4FCC5A2FC9F8AEF97B608E2CC1

      Filesize

      2KB

      MD5

      f79aa1d5416af9b2862f2953e1600502

      SHA1

      68070a6a42257019c122b6696cb7cdc11ec010d9

      SHA256

      5949ce61515ffdc02bd7c3756b2e1ba512650644bdfea5ee738b9e365be8d1fb

      SHA512

      fca5ccc252d15c77d5fb9ea662a0fe4a783b3c0ff59550371325f24fd40c8682857fe7099ecb61f37c5277cbfaf4d71650a1c7d651c2f05211bc17169b302067

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\30069012ED3CF5DB92F9F4FC78D55E2D_16AA5B9B040CB195ADDB70661F18F3C5

      Filesize

      412B

      MD5

      9cb71586e8dee7f460735aa1bb1c6ada

      SHA1

      e0c1684c07c97495bb3538d7f06598aae54ebd10

      SHA256

      6ffebc266b8afac8fbe5d69097385eb3ad1e9451f0fedb69074773aa9627f7d7

      SHA512

      e3cdc0adc0df9c77ab5de9100ff17d79f82055fa88df75b8dcfc3b1a5b4c9d70072b0a0bb59d05c1e09242b1d3ca10952d596edb8f216c82c03a16f4087c1b01

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\68FAF71AF355126BCA00CE2E73CC7374_E5F521CA60C5ED8C2B4E2BF399FE2061

      Filesize

      412B

      MD5

      0b72cd111ff8053e6c3b8531d0e065f3

      SHA1

      a34fbbd7b212fb58ca2d9350473fc73323d46dec

      SHA256

      7691cc33fb7fc2b3fcd844bfd0c65e70ba76d4865d828c75f7733278751b0f0a

      SHA512

      fed0585bbeadce93755ca870007dce043dc20e4a72f4f85ddbaacf3315b14ee31d6f26441a78d723ecf97b3393f978f2c9044daff8f027fa728971638df3466f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\856FDBDDFEAC90A3D62D621EBF196637

      Filesize

      178B

      MD5

      ce94109ed6692b648e43390f85572062

      SHA1

      031cd4be6fe30a679f3f5392bfeae0cad657695f

      SHA256

      51392ffdfab91dc1a09c1857a53eb05a744cecb5f471010484c3ba16c4abc18a

      SHA512

      865510b2ecff7afc6843e90271a8760a87ba9dd25c20f3d75edb794fa31afb79d69a7a3354a0385bbbb85de28eb4ba567ed80de2a6ec5cc84f9b6daf38f6488e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B03113490075047F519A3F760F0FF379_CEB17B4FCC5A2FC9F8AEF97B608E2CC1

      Filesize

      432B

      MD5

      8b85c40a60d752bd74b1eb847a11bf6a

      SHA1

      207ce6d90b8b9ea4fe9356a0ad5480a6236e9a77

      SHA256

      1721e55e6d3d7b5741c5ffe4c73e49e1c411f43611ec47e034a2b6492d1df262

      SHA512

      d7577caf0efaf24067468c45317bebb7413f15d1e6c90fa8fa9cfaccdd7ea1fbef0342a15d3e28f69818526ad73c4aa65fbe62aa983e808406b57fd2a93000ab

    • C:\Users\Admin\AppData\Local\Temp\MSI5A36.tmp

      Filesize

      285KB

      MD5

      b77a2a2768b9cc78a71bbffb9812b978

      SHA1

      b70e27eb446fe1c3bc8ea03dabbee2739a782e04

      SHA256

      f74c97b1a53541b059d3bfafe41a79005ce5065f8210d7de9f1b600dc4e28aa0

      SHA512

      a8b16bc60f8559c78c64ca9e85cd7fd704bba1f55b362465b7accef1bb853d1c9616995a35f972256c57fbe877ce880398ba1fbceaa658604883aa12dcbc4f57

    • C:\Users\Admin\AppData\Roaming\Microsoft\Installer\{DB60E80C-3C43-4DFE-9E3E-098274FB7FCC}\_B9DC3E1780C6BE98125ABB.exe

      Filesize

      126KB

      MD5

      55349367d09d20d08f1c387b53abef72

      SHA1

      96b2abb8b5ceef3f93a151d186e0d6ba1c117e8a

      SHA256

      7317d89b4eeed8451bf3708f5f0061aa9e6f857e0250d1064bb918352fc3a91d

      SHA512

      3a807f944cd7dc2e12b9ab15995fa914463cd183e22292e4d339b31cd8afbe71aa5bb6ee5dca6e07e62599985de79de008ff7b800c6b9eb83372ef58792b5833

    • C:\Windows\Installer\e576ed7.msi

      Filesize

      3.3MB

      MD5

      253310261c1d0d7ac2f136307d2c7761

      SHA1

      c68e9122f3d6a40a9418f5e1782a89c23674c937

      SHA256

      92769f62cbfd2f1bd615b0976d069e839c4bb0f3ee759c316a05aa0de8fc50c9

      SHA512

      468b666bd7a1150b37c2d20d5d0803f08141bcd3de5d82a7e01eb278bc62c857706656df94075d6ab1b6f9a72979b28a005a5425bfd450362a699f58f3b3fd31