Overview
overview
7Static
static
3MaestroPro v9.zip
windows10-2004-x64
1AUTORUN.inf
windows10-2004-x64
1Disk1/0x0409.ini
windows10-2004-x64
1Disk1/ISSetup.dll
windows10-2004-x64
1Disk1/data1.cab
windows10-2004-x64
1Disk1/data1.hdr
windows10-2004-x64
3Disk1/data2.cab
windows10-2004-x64
1Disk1/engine32.cab
windows10-2004-x64
1DotNetInstaller.exe
windows10-2004-x64
1IScript.dll
windows10-2004-x64
1IUser.dll
windows10-2004-x64
1IsProBE9x.tlb
windows10-2004-x64
3IsProBENT.tlb
windows10-2004-x64
3ctor.dll
windows10-2004-x64
1iKernel.rgs
windows10-2004-x64
3ikernel.dll
windows10-2004-x64
1objectps.dll
windows10-2004-x64
1Disk1/layout.bin
windows10-2004-x64
3Disk1/setup.boot
windows10-2004-x64
3Disk1/setup.exe
windows10-2004-x64
4Disk1/setup.ini
windows10-2004-x64
1Disk1/setup.inx
windows10-2004-x64
3Manuals/OR...es.pdf
windows10-2004-x64
1Manuals/V9...al.pdf
windows10-2004-x64
1Support/vc...86.exe
windows10-2004-x64
7Analysis
-
max time kernel
592s -
max time network
643s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 14:59
Static task
static1
Behavioral task
behavioral1
Sample
MaestroPro v9.zip
Resource
win10v2004-20231222-en
Behavioral task
behavioral2
Sample
AUTORUN.inf
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Disk1/0x0409.ini
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
Disk1/ISSetup.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Disk1/data1.cab
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
Disk1/data1.hdr
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Disk1/data2.cab
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
Disk1/engine32.cab
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
DotNetInstaller.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral10
Sample
IScript.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
IUser.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral12
Sample
IsProBE9x.tlb
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
IsProBENT.tlb
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
ctor.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
iKernel.rgs
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
ikernel.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
objectps.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
Disk1/layout.bin
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
Disk1/setup.boot
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
Disk1/setup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
Disk1/setup.ini
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
Disk1/setup.inx
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
Manuals/ORTEC File Structures.pdf
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
Manuals/V9 Users Manual.pdf
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
Support/vc_redist.x86.exe
Resource
win10v2004-20231215-en
General
-
Target
Disk1/setup.exe
-
Size
929KB
-
MD5
2cc9103dfdf1e8a5db13f0915a9416de
-
SHA1
da0ad0f88a26e31846e9df040e470d70f5d699e7
-
SHA256
f0a02d3ace10af6507f29e56b7c6e5f4eeb643f809baa2eb2a44ce08ce66e290
-
SHA512
6024b0ef569aa82b0ed18a2552ad141fc8340b9a462388292fba103e18a2462fb78fc79a82fb7d247c2a15a8f5e7eb4d21c597ea54c03a428d945754d2f02ba8
-
SSDEEP
12288:9p5e7e1f+jY849fxuBa5kVDIyb496sxhFSOQ2gqIKXH62t:9pA7e1jwD9bEtFSOQCIaHlt
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 7 IoCs
Processes:
setup.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exepid process 3096 setup.exe 4212 ISBEW64.exe 4388 ISBEW64.exe 884 ISBEW64.exe 3040 ISBEW64.exe 3720 ISBEW64.exe 4240 ISBEW64.exe -
Loads dropped DLL 4 IoCs
Processes:
setup.exepid process 3096 setup.exe 3096 setup.exe 3096 setup.exe 3096 setup.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
vssvc.exesrtasks.exedescription pid process Token: SeBackupPrivilege 2780 vssvc.exe Token: SeRestorePrivilege 2780 vssvc.exe Token: SeAuditPrivilege 2780 vssvc.exe Token: SeBackupPrivilege 836 srtasks.exe Token: SeRestorePrivilege 836 srtasks.exe Token: SeSecurityPrivilege 836 srtasks.exe Token: SeTakeOwnershipPrivilege 836 srtasks.exe Token: SeBackupPrivilege 836 srtasks.exe Token: SeRestorePrivilege 836 srtasks.exe Token: SeSecurityPrivilege 836 srtasks.exe Token: SeTakeOwnershipPrivilege 836 srtasks.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
setup.exesetup.exedescription pid process target process PID 3908 wrote to memory of 3096 3908 setup.exe setup.exe PID 3908 wrote to memory of 3096 3908 setup.exe setup.exe PID 3908 wrote to memory of 3096 3908 setup.exe setup.exe PID 3096 wrote to memory of 4212 3096 setup.exe ISBEW64.exe PID 3096 wrote to memory of 4212 3096 setup.exe ISBEW64.exe PID 3096 wrote to memory of 4388 3096 setup.exe ISBEW64.exe PID 3096 wrote to memory of 4388 3096 setup.exe ISBEW64.exe PID 3096 wrote to memory of 884 3096 setup.exe ISBEW64.exe PID 3096 wrote to memory of 884 3096 setup.exe ISBEW64.exe PID 3096 wrote to memory of 3040 3096 setup.exe ISBEW64.exe PID 3096 wrote to memory of 3040 3096 setup.exe ISBEW64.exe PID 3096 wrote to memory of 3720 3096 setup.exe ISBEW64.exe PID 3096 wrote to memory of 3720 3096 setup.exe ISBEW64.exe PID 3096 wrote to memory of 4240 3096 setup.exe ISBEW64.exe PID 3096 wrote to memory of 4240 3096 setup.exe ISBEW64.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Disk1\setup.exe"C:\Users\Admin\AppData\Local\Temp\Disk1\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{A937BAFA-C28B-4EA8-BE2B-289966DA1F40}\setup.exeC:\Users\Admin\AppData\Local\Temp\{A937BAFA-C28B-4EA8-BE2B-289966DA1F40}\setup.exe -no_selfdeleter -IS_temp -media_path:"C:\Users\Admin\AppData\Local\Temp\Disk1\" -tempdisk1folder:"C:\Users\Admin\AppData\Local\Temp\{A937BAFA-C28B-4EA8-BE2B-289966DA1F40}\" -IS_OriginalLauncher:"C:\Users\Admin\AppData\Local\Temp\Disk1\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{31F17347-1366-4A76-94B0-589988BFAB98}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C4590CA0-4AAA-48D2-A0AD-922A44BAD4CF}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7B515882-F6B7-497C-BD45-6D2C04F99BDA}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3067CA11-1F64-4673-9AF7-896AF4E82303}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3CEBD37D-F7D9-4146-8104-3C51B05228C4}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{EB2FE879-5371-4B23-BD9C-01BC8AD32CD6}3⤵
- Executes dropped EXE
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\ISBEW64.exeFilesize
178KB
MD5fc6b38a02516871ec641e99fb18f448b
SHA158754875d6b068d4c076363531674b5d8164e4dc
SHA2569419696372f4460fdc12d96ecd9f3a9489e9070ccab7cca4b51602c051db31bf
SHA5129a9bb2ad036ba9141fe312ab199ed2eb75bb132f69cb4b1fe98f4daaac8698debf2f72fc4b7969b1386fd849ef857e6861f66b14cf43a86328cfbac3617c6b98
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\{5AD9FC81-F943-4F6C-BDB6-71E1C421C806}\DIFxData.iniFilesize
84B
MD51eb6253dee328c2063ca12cf657be560
SHA146e01bcbb287873cf59c57b616189505d2bb1607
SHA2566bc8b890884278599e4c0ca4095cefdf0f5394c5796012d169cc0933e03267a1
SHA5127c573896abc86d899afbce720690454c06dbfafa97b69bc49b8e0ddec5590ce16f3cc1a30408314db7c4206aa95f5c684a6587ea2da033aecc4f70720fc6189e
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\{5AD9FC81-F943-4F6C-BDB6-71E1C421C806}\FontData.iniFilesize
37B
MD58ce28395a49eb4ada962f828eca2f130
SHA1270730e2969b8b03db2a08ba93dfe60cbfb36c5f
SHA256a7e91b042ce33490353c00244c0420c383a837e73e6006837a60d3c174102932
SHA512bb712043cddbe62b5bfdd79796299b0c4de0883a39f79cd006d3b04a1a2bed74b477df985f7a89b653e20cb719b94fa255fdaa0819a8c6180c338c01f39b8382
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\{5AD9FC81-F943-4F6C-BDB6-71E1C421C806}\_isres_0x0409.dllFilesize
1.8MB
MD5dc1c02e272c281895c0456f358f44378
SHA1cd51129bacc9f463fc0fb09bb38eb89ece916fde
SHA2563782f17b843b4cd3245c8b751d0c23b1b34a24a64a923dbcaefc26e65fe4f69d
SHA5127d1dc68274f164b811acb08334857ab4c3c847daea1724a5ca9d2db7f1f4fff3009b9092fc8c5ccc64e2c8d57babe563d72b3c7f9f64de3c1c02c2e747ec48b5
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\{5AD9FC81-F943-4F6C-BDB6-71E1C421C806}\_isres_0x0409.dllFilesize
14KB
MD500a08f5c8da59b47a3bca9310a9d6eb1
SHA115aeec67daa4115b4b4c92ec5feba2c17de63cc1
SHA2560fe5ae540f15f32112ea45eb1f9e2bebc9d097f87a1593a9741d3f817159a258
SHA5125f0329311220df9d0ef2793cb564b2da0dfd5b497b3e0f3ac1d2ab3d182d94aa68cbe2dc5808e36659ffba4ad984a28fa8f2f22d38ff118ff588d32c3d453360
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\{5AD9FC81-F943-4F6C-BDB6-71E1C421C806}\isrt.dllFilesize
426KB
MD56142481421bd6cc14addf9606137973d
SHA197686f0e3254c3c245256ae280ed36f9457b3ec2
SHA256650d006d2f4f62d740d7d198f7febe201d3f528ee87e089958b5c4e1cd27e748
SHA51221e9bd11b931ba20dff2e30f3301fcb5fc119535a6428c175224e1a35e6c6c14b07f437a416d53787635ce8b8aa042d4dc514beed41b0575591ae79c1592993b
-
C:\Users\Admin\AppData\Local\Temp\{74DEF12D-7ADF-4EA2-A446-3B3E2E56E57D}\{5AD9FC81-F943-4F6C-BDB6-71E1C421C806}\setup.inxFilesize
128KB
MD5b9808c1bbddd11dcdfb8884e6c271680
SHA1d653adae2da5655d4a1a36d58bf7e6b01a1d5bd7
SHA256d791bd74843c05bed871dcdcbeb7c815edba614b1131d189a44e90940962a223
SHA512fd5c5393b757f07301484c04571ea02eef2c0010909793eceb4e3491818037bee0eca1aa50e4e2ee358898cb8598f52f642585864ba9dd54217f8b3618999e8f
-
C:\Users\Admin\AppData\Local\Temp\{A937BAFA-C28B-4EA8-BE2B-289966DA1F40}\0x0409.iniFilesize
21KB
MD5a108f0030a2cda00405281014f897241
SHA1d112325fa45664272b08ef5e8ff8c85382ebb991
SHA2568b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948
SHA512d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298
-
C:\Users\Admin\AppData\Local\Temp\{A937BAFA-C28B-4EA8-BE2B-289966DA1F40}\ISSetup.dllFilesize
1.6MB
MD582785d52aff250d92e6c415a84f3a0cb
SHA1f18d27f5b4fa37fb77f3c24fd96d6075db759580
SHA25689b71ad218a00b8ca87136266d841240dd8d00ad4e8745b28c9a8cf775623937
SHA512decdc14dc3d77bc25a30ac16095a2045b5ccb6fad99fe652e0477ac08524762ed7c3b39fcb2e90ddfd5ef1752f609522d9c6b9794450536761c6195862eb89c2
-
C:\Users\Admin\AppData\Local\Temp\{A937BAFA-C28B-4EA8-BE2B-289966DA1F40}\setup.exeFilesize
929KB
MD52cc9103dfdf1e8a5db13f0915a9416de
SHA1da0ad0f88a26e31846e9df040e470d70f5d699e7
SHA256f0a02d3ace10af6507f29e56b7c6e5f4eeb643f809baa2eb2a44ce08ce66e290
SHA5126024b0ef569aa82b0ed18a2552ad141fc8340b9a462388292fba103e18a2462fb78fc79a82fb7d247c2a15a8f5e7eb4d21c597ea54c03a428d945754d2f02ba8
-
C:\Users\Admin\AppData\Local\Temp\{A937BAFA-C28B-4EA8-BE2B-289966DA1F40}\setup.iniFilesize
2KB
MD5a4d19620ead09181c517e06750d91e97
SHA1b0fc15f5fb1c77091a8763b48ccbc2c9e07c59ef
SHA25671ec8da4023db3adeb0ec13102cfe60d89c1a19469f9fad725ec62b6ee38cd12
SHA512491751f8758b111391a3749338472b8be92d34295474c60634a669530ef53e7627e31833195b150b763aad3fa4ba11391b464c3e1f8ebb180025ecabce5f1481
-
memory/3096-76-0x00000000036B0000-0x00000000036B2000-memory.dmpFilesize
8KB
-
memory/3096-75-0x0000000010000000-0x0000000010114000-memory.dmpFilesize
1.1MB
-
memory/3096-81-0x0000000005C80000-0x0000000005E47000-memory.dmpFilesize
1.8MB
-
memory/3096-97-0x0000000010000000-0x0000000010114000-memory.dmpFilesize
1.1MB
-
memory/3096-107-0x0000000010000000-0x0000000010114000-memory.dmpFilesize
1.1MB