Analysis

  • max time kernel
    294s
  • max time network
    301s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2024 04:04

General

  • Target

    TS Setup.msi

  • Size

    119.6MB

  • MD5

    762693a76e48c511441139a32e1b0afe

  • SHA1

    3d8bac6a67b71d52f4a2bf547e7140297fa61dc9

  • SHA256

    fdd43450dd4fbb4401851aa82f46b392e2e6d721a456db2eedafe566de6d7c7f

  • SHA512

    48d4a6c039392534f021d45e6fdca287270599ef985555add06a8b3e12cd6279d9a01b33355e87bf794561741dca585302ef70fa5ebca0a9cdfbf2bb76ada4a4

  • SSDEEP

    3145728:n57bFe0N9sOVo+N+/k++ODv87wtE1ODuaoIZ4DwiuJou:n15yOVoiyk9Qv8MtIQuaL4Dwz

Score
10/10

Malware Config

Signatures

  • Detected Ploutus loader 1 IoCs
  • Ploutus

    Ploutus is an ATM malware written in C#.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 21 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 22 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\TS Setup.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1540
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 121EAA8BF1997999B8E536DDCE139F56 C
      2⤵
      • Loads dropped DLL
      PID:2296
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4100
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 04ACEA365E03CDAED8FB3B26A78B3410
        2⤵
        • Loads dropped DLL
        PID:4476
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding DC5D33CB39648BB0417B5BE44C9ACAD6 M Global\MSI0000
        2⤵
        • Modifies registry class
        PID:3756
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 3A3E397899217018779B5EA2DA754846 E Global\MSI0000
        2⤵
        • Loads dropped DLL
        • Modifies data under HKEY_USERS
        PID:3464
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:4656

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    2
    T1120

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e5ae1f6.rbs
      Filesize

      251KB

      MD5

      e8c4a1f4b466406d174f2526ff77dc34

      SHA1

      b4a0d8f966d1c7da1f757675ec9a7d7a15b5dbc6

      SHA256

      04ff7d1099c3fe6eeb96bd4c9c18ce08690755d4d15c983b215006bb03601259

      SHA512

      9c8372b66fd1c0243734ee2e63f9d09a962312656da087d183325ada3505edaa98c63c8d2ef3359fbe96c32850b33ccc55cec94899e66abfeaaec9ed0d799e70

    • C:\Program Files (x86)\VAULT\Transaction Server Service\NetFalcoLibrary.tlb
      Filesize

      57KB

      MD5

      b35ba590b82e846d05717f0beb0f2f0d

      SHA1

      d6d0b09a255f8445ecfbcdc6e1c48180a851543b

      SHA256

      13e234fb8e3d0013463184216826fd7a3be0cf277fbaf350068a4d94cd2f6105

      SHA512

      357216cdff0c463f69f5fceb517bbc00769557f874ac226ed00fa567c95e8dbe55332758900d9af4a236061b95bc15d7db1f0be8c073a8f932e4c4890ca1715d

    • C:\Program Files (x86)\VAULT\Transaction Server Service\RestSharp.dll
      Filesize

      186KB

      MD5

      d294a1a08de13d8f8a8be2d6cc4261ea

      SHA1

      8c1f67c96ebbf6f8ffe996c3df37b3cde8e790d7

      SHA256

      654e7245aadd65be246efe8ca8f9a85986922eb1babac10a0daa7261d60a603b

      SHA512

      ef56f3be6f54134d68c8ef6b88a9be221c962b33984be25e4dcebb1d7c85f316151ab109d1336697ca3382df8e839b59e9c390f52e199a32f0eb806957f40894

    • C:\Program Files (x86)\VAULT\Transaction Server Service\TransactionServerService.exe
      Filesize

      597KB

      MD5

      1d56620eef7fdd2235528a48c1645f06

      SHA1

      bc0f99d76bd99518e2d0af083b43c357cd252c6c

      SHA256

      81e9b5fba6b1a38b703e160e6a2da29d9fa4a9dc189d9e0c43e7b64d71af1635

      SHA512

      802442e0afbd1c48aa6ac0534da422c448a68f6e2807a7bffa25cd42425894356e5aa4ff3984d116ab5a9645aba69d989d5119fea8d3beb7de34f28b98f9f48e

    • C:\Program Files (x86)\VAULT\Transaction Server Service\VaultRemote.dll
      Filesize

      14KB

      MD5

      abdc75bcc5e89665e2d86c89423090e8

      SHA1

      011992c4d1a2dab7754db0b05368f4acffc4d61a

      SHA256

      59682ed0d1d60cecb2d21f9cf72a92350b616770c0aeb76557b7b4a1977ebcdf

      SHA512

      2b5dc60393311da4d73aacdc31308dd91bf45f4ca70ab9d818397e3de042d1eaaf82f598b2597dbddfe353998fd3d6e0c1157a49640ca13b4fe484ff9a445fa3

    • C:\Users\Admin\AppData\Local\Temp\CFGE37C.tmp
      Filesize

      152B

      MD5

      ccb860553902094f48b6d91dbae56fdd

      SHA1

      0a9909816f156632c0c8718725853f48a81fa0bc

      SHA256

      7d10aea89090852f80436f2c5eb025df6be018d8c7e27caf46131446e6abdccd

      SHA512

      be344e0e9567e469fcd46e5166310779e69b092cd6b55256cfc4525287f2a0f6e52463967c58c5609d81fbaec27422264f1c1c62e7327dd31ff7dd9920a3339c

    • C:\Users\Admin\AppData\Local\Temp\MSI4BED.tmp
      Filesize

      325KB

      MD5

      f048cf239cc583f8433634acf23cae55

      SHA1

      7d3a296a05267855cc637c5bf95fe687b7a765a2

      SHA256

      4d6efad25f62f4c34998385819e46569869b09de4d8b3f1e22dc9e8f032ed3bb

      SHA512

      a021d559150338ef823b8749d95ac262ec13d9c9ed80d2d0d67e0d7690ae61713219a5edf88d83832ad673f0d7a1d306b49af4f07020c98bac2cfb006bcf0c53

    • C:\Windows\Installer\MSIF12B.tmp
      Filesize

      66KB

      MD5

      b1463eaa0f849e4dd49e88c8594dd985

      SHA1

      c65251d8e7e0855769967238084cb282b14f7d48

      SHA256

      18e517c567db5a8ccbfd5db698cc5179862d002039f461656a9468dce51d1448

      SHA512

      ba6ed16f13246617abf8f75d3506da629e8370f2faa77caecfed1444c25d6bc2e85803b84c1214a4a4803b4cea2166043fe2819a42ac8ca28e22f04d0e1d0e23

    • C:\Windows\Installer\e5ae1f7.msi
      Filesize

      119.5MB

      MD5

      3f29169e326ae7f6dfa3163c1be89e38

      SHA1

      90d0b4853c72ed23a194fd4bc869c02c29cb400b

      SHA256

      daa3e2397b01ce09d67604a8cbf3a5e84dab41b21acc2c129497c0d99089bd2b

      SHA512

      7b6781db69b81b3030fe37f6b95ad0fb4fa70150e5388c93baa867ecc3f117eb9f54d46a8d6a91476b37f6481d4b5f336c8bade7f64efae546646eebb0103d1d

    • C:\Windows\SysWOW64\FalcoNetworkLib.dll
      Filesize

      707KB

      MD5

      6ac75e242be9c30da26ef13711e270f2

      SHA1

      ab1426e82d1cd248cb407ca0f8b2ed1f94123461

      SHA256

      4d46f595246b0aa9763c1b6e1a9f52bf573b632b330f940837e0677c4c8425ed

      SHA512

      5116245732ab80b53309f53e796ee65d30e57e9bf898f38f0629ae98a6a251aaf6ade98965db54677578bf943ae10a1b4e28fd4c211256c05dd2e4f31184bfbe

    • C:\Windows\SysWOW64\UCBioBSPCOM.dll
      Filesize

      230KB

      MD5

      df344e433d3806fcbd255d0238efcab7

      SHA1

      270435d936fdd2c490a0524aae6618f600f3b842

      SHA256

      fe9ead1e4a8911be6814d166dc82a5caa6ad6e59ef63211e07f75cf8403498c9

      SHA512

      004142d8abb20f683b5067cc47cd189f1b4866b7b83ce1655cf36edf1dba885d45e4b9bff10d6f38acdcdc9b7f804fe54283c6d1bc31723dd13aceda95d54fa5

    • C:\Windows\SysWOW64\UCSAPICOM.dll
      Filesize

      1.8MB

      MD5

      69a8770a7d428716d7c29a9ded61fda7

      SHA1

      8b99fce55dbb69950d32cc819ea1e19037d41ad2

      SHA256

      c857bb8cb780ad8990bb9bc86ec240d8dbec5b9567715809a4f22a72e6e3d0d8

      SHA512

      7bf00460b16f4c03595fce3d75df329d9dfdd41b330affc3e13323a81b520645781518e00a8adda773a5ec456acd396df960d72c5caef0aff2363c6b0d558d94

    • C:\Windows\SysWOW64\zkemkeeper.dll
      Filesize

      436KB

      MD5

      105bc87c8f0dfceb04fac8c44dfc08c0

      SHA1

      2edd013ae9385cd7f3dbdcd90c96de886d8c6229

      SHA256

      c54c9c36080537893ab7e1a58e5996c306fe4cdbaffb6096e1139941a4673551

      SHA512

      5f3d13dcb340a0ceeb418e19de6368a922cfde5f2a3bcfe4c254627a41d2dba52226cd0c2e7ab716dd63de7a1960ac2aecace47daefb53ba9d129478e58471ba

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
      Filesize

      23.0MB

      MD5

      0a9a05b35e05113c7617e696e480c2f1

      SHA1

      891b840f43cbd035310cf6b60ce42ebfb1bb0526

      SHA256

      4c126c7c5971697f7925f1a74b313cc54b493439e84d8b7bc012f54a924b2728

      SHA512

      bab4b3f464d0b1a45a40fdedc890cef106e4b4fa43f040cdc1fc073850c05f9cf9254062eb3ecf7924a26b5d0bd63fedb1bf2552f3f0940b7aa45a598d1a10a2

    • \??\Volume{15ae01b2-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{569927f7-0e71-4d79-a03b-9c5cbc22535d}_OnDiskSnapshotProp
      Filesize

      6KB

      MD5

      e22559855390b60cfc824411f5352058

      SHA1

      51b6bf25800100feec8d156ccfdd18e1935efbd0

      SHA256

      b66a46a586d8f818fc294def8bfbc2989d3e8f080a603d01c34f89fef7aeedbe

      SHA512

      8b41d5c35e736eae2602fc1f9892b8126cc12d54bddedeb7c45a03d6f427ca99107ae542163a966883c44b5c5fbb27f863a531c00c908569935529c5cb71f190

    • memory/3464-249-0x00000000052D0000-0x00000000052F2000-memory.dmp
      Filesize

      136KB

    • memory/3464-257-0x0000000005790000-0x00000000057A2000-memory.dmp
      Filesize

      72KB

    • memory/3464-247-0x00000000050E0000-0x0000000005114000-memory.dmp
      Filesize

      208KB

    • memory/3464-253-0x0000000005330000-0x000000000533C000-memory.dmp
      Filesize

      48KB

    • memory/3464-254-0x0000000005340000-0x0000000005694000-memory.dmp
      Filesize

      3.3MB

    • memory/3464-255-0x00000000064C0000-0x0000000006A64000-memory.dmp
      Filesize

      5.6MB

    • memory/3464-256-0x00000000057F0000-0x0000000005882000-memory.dmp
      Filesize

      584KB

    • memory/3464-248-0x00000000058F0000-0x0000000005F08000-memory.dmp
      Filesize

      6.1MB

    • memory/3464-258-0x0000000005890000-0x00000000058CC000-memory.dmp
      Filesize

      240KB

    • memory/3464-243-0x0000000005230000-0x00000000052CC000-memory.dmp
      Filesize

      624KB

    • memory/3464-242-0x0000000005140000-0x00000000051DC000-memory.dmp
      Filesize

      624KB

    • memory/3464-278-0x0000000073CF0000-0x00000000744A0000-memory.dmp
      Filesize

      7.7MB

    • memory/3464-238-0x0000000073CF0000-0x00000000744A0000-memory.dmp
      Filesize

      7.7MB

    • memory/3464-237-0x0000000002EB0000-0x0000000002ECA000-memory.dmp
      Filesize

      104KB