Resubmissions

18/01/2024, 17:24

240118-vysrraefg5 8

18/01/2024, 16:21

240118-ttnfssdgf8 8

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 16:21

General

  • Target

    Installers/EndpointVerification_2.0.3.msi

  • Size

    1.1MB

  • MD5

    03b66b1d1876277e38a471f3234a220a

  • SHA1

    9b17405ce7fa680c6b33754d452f2b56c490ddf9

  • SHA256

    6342063d367b494050943937c8d8e672296e7e44d25c74ce36b808e54a70bebf

  • SHA512

    1c8698f4372e286b917b9fb9f7405d7e305f1b0be75e46636c7580cd493ee8ca736f1b24ae656516bd4cd0eab9812c8748ccecf6a39a957ce3ce66139d48f2f5

  • SSDEEP

    24576:JaEn64cOQP424L8Ehnyi8zJjkQvHJ8KBaqLpHULlG:JaEvcdPfE8RFwQB8KBaimJ

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 12 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 25 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Installers\EndpointVerification_2.0.3.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2384
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2204
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2564
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003A0" "00000000000004DC"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2468

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\f763748.rbs

          Filesize

          8KB

          MD5

          a03026878d3c35ecd65a344c16fe6208

          SHA1

          757919595fcef41acb477967e39149fefbe99097

          SHA256

          31e5f8367e50dfb15e1a776665f48ef2541f867644b3f57842b65e6bd8988902

          SHA512

          437cda7e2551d99198329cfc9cfd353f5e48cc34bfb70f26fe341da116b344d1a038a6ffb3fd89a88a6e7f757f84393cdc001c3c5b72bd0c096a0fa0d8b667f3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

          Filesize

          471B

          MD5

          671ecf50d1915c0d90afe103ee64163f

          SHA1

          5320e0df86d71a30ba9051624b7acad87947812a

          SHA256

          a0abd4ef96cce8eb01b7d31ca4e5856c2e7ec1cdce5375902975ec2765bc8820

          SHA512

          5b0d39dd9a18ee594a9a20289a4cdd8b187e9a7f92fd0c5f65e86bd3b9046ae474579fc64fb9cf12219e3cc119924dbeba4f7cb9a7cd45800c43c6682bb37595

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66AE3BFDF94A732B262342AD2154B86E_F0D50A4367A618DF509B0016B83B8E3C

          Filesize

          471B

          MD5

          831e81f341564a287134b0b9cdb41113

          SHA1

          53ad7c63fb0c2144c013be6bc9db76a2b431feaf

          SHA256

          a154811f6143ceb051b44f1d5889496211633d42919e9dbf9672b50f63e21c1e

          SHA512

          2237a89d1626ef9faebd0b54b8d8857307b7e1596d1594eca66c4ccd86b5e3047acff6ccfb456501dac6da95e72871f7f8f23bf44b185249d0caad55f5379ce3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

          Filesize

          404B

          MD5

          ec6151ca8e484118c79b2269916f455d

          SHA1

          baddf073c5e2114a086c442af24023a1b73c1f88

          SHA256

          2fcc7420598b54ac7be7ac86a9da22e43c656d6b99feecd6d5c937891391d023

          SHA512

          731bc65bf7867e726d2fb0cee3138c1ad69b0e2dee36c77fa7463e331bdef3b431fc8f41784afafb910551c8de24f8c1c55f44c55dc2318eada19a04c52e8f7f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66AE3BFDF94A732B262342AD2154B86E_F0D50A4367A618DF509B0016B83B8E3C

          Filesize

          400B

          MD5

          1ab451ad84965923652670f6d354e816

          SHA1

          ba173ae87ae2f50f44a19dee136a64cba3abfd99

          SHA256

          9fc4e3b5c532484a8efc0fbcae31fdeaa7fdff7828d385293c0031fafac6fc5a

          SHA512

          204765ebaaaf5a88b32ab8870bb06dc7c8c809aa37575af6eb575c98cb042f74ac99b5a47e2c70b97097bf8b46c3b66950ec1cf7b2730179a87212b01543f2f7

        • C:\Windows\Installer\f763746.msi

          Filesize

          1.1MB

          MD5

          03b66b1d1876277e38a471f3234a220a

          SHA1

          9b17405ce7fa680c6b33754d452f2b56c490ddf9

          SHA256

          6342063d367b494050943937c8d8e672296e7e44d25c74ce36b808e54a70bebf

          SHA512

          1c8698f4372e286b917b9fb9f7405d7e305f1b0be75e46636c7580cd493ee8ca736f1b24ae656516bd4cd0eab9812c8748ccecf6a39a957ce3ce66139d48f2f5