Analysis

  • max time kernel
    50s
  • max time network
    62s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2024 17:40

General

  • Target

    ICCSafe.Installer.msi

  • Size

    107.8MB

  • MD5

    9599a8f5b6c834d4f16a8e7132acea39

  • SHA1

    1306c6d51382fdfac74a6fd777ce93b293dc1a82

  • SHA256

    af59c36b03ee77d584a3af87cc6444613bacf49094b7233369a835004cd0ad82

  • SHA512

    28ad8b8f532460ba6b7401232e7abfe2946f9e895ceeac91d1b63f769c345d3d0bf7ef47ceb23b2450c3611292bfcc4679d9ead87fccf5b4f6c3e17ff9e24d62

  • SSDEEP

    3145728:0GD6Whj3b1fnRj1llWxtHNhk14zpGJrGwxfr8kNq5RJ/64:H6Whj3b1fRRLkHN64NGJrFxf1Nq5D

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 3 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 21 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ICCSafe.Installer.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3560
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4304
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 1E5DA1299F64CFCDF800122E2A65C8DC
      2⤵
      • Loads dropped DLL
      PID:1124
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 313C020A95AE475EC08293BEA91229F9 E Global\MSI0000
      2⤵
      • Manipulates Digital Signatures
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIDD96.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240639390 64 ICCSafe.CustomAction!ICCSafe.CustomAction.CustomActions.SaveConfigJson
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:3372
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e57cbdc.rbs

    Filesize

    711KB

    MD5

    6426dc37e0b9058821f18dc1e1d72157

    SHA1

    7217dbeb3ca4ddc660e1f46171d437d65e1c3a18

    SHA256

    7e1fe9149e67b35978c26b4efa90da9fe1169ece80227a13be80c7b570a76718

    SHA512

    49afcfba3f0b88867dbf254fb6fbf4224b47d6f81191ea38fcb9d2ada520f5ded6000140fe9b4c077da72f6b270491f96f52f0b5720481e7e7cd6cb129c48132

  • C:\ProgramData\Autodesk\Revit\Addins\ICCSafe\AppConfig.json

    Filesize

    783B

    MD5

    47b11a8d356442dab4645737c0be6954

    SHA1

    d5c75a282565f9ee7ac31acfc34d371864d7a6a1

    SHA256

    43d1db3d41453d1b8d9b2814ed2c502536d07e387d649769352752628fe5be11

    SHA512

    4f770f817631d474fbaaf2835b0ed6c72c16c83788c6e6ff963210c8d2952cd058e74387eb384e89f89865e819cbd1de94f5f2202153241f3be283903d95dbd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C42BC945025A34066DAB76EF3F80A05

    Filesize

    49KB

    MD5

    7b6f4c65049bbe115a5dfbdd66dd6383

    SHA1

    943a1b668f19e507407093bbac88e18f428c25d3

    SHA256

    72cff6370b1d5e17a1de73f8e97efb8dd9638583c3d080d39931df6f78dfed7f

    SHA512

    cf1fe5896a56d377ab3f9b0a92fe557a4c7a88c3a8be0d35d9a5f0fcd1409b5a73ab2b3d69e082b1d2e21789799c43d4d73d89407aef86e4f2fa0a768744a4f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

    Filesize

    727B

    MD5

    7a3b8457313a521e0d44f91765a4e041

    SHA1

    4ea8ecb5e7b4c11f4c491caf6cee7ced5ec4c267

    SHA256

    2b08ecf53bb8b6c430659926148f896102dc80b5f38b0ec5efe122199659651c

    SHA512

    7349fd1b8c490d540a8bb25f40587f9874ff5d9b1f9bdb2ea69db9218ebdbdccea5e4d6645fbd1098d051b008b1ebfd12a619c3a4d6fb54940705ab14933e159

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C42BC945025A34066DAB76EF3F80A05

    Filesize

    314B

    MD5

    196da11b4a5faba52b92bb967cec4a1c

    SHA1

    f50de49bee2f5658da756570f6e54d021e22aa0b

    SHA256

    faed671ed25e886b8ed9ef29019148d3ae683d0f2838358f7c0afc999ad1d063

    SHA512

    c7d24d8079be5c91e6ce0c6520066949e869ee1924affebd8eea12000d32976eda9fb092c93dd64f14092d55afbf61981afcff0287262eaf867c0bfca423f907

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

    Filesize

    478B

    MD5

    a51fa4b814ece54051d6cb5c5b657b49

    SHA1

    d2b6c13ecbfd25bf61714c7ee5b4c9399a7ed60b

    SHA256

    45b260d5e9c4cd8349a96f1452f1c95b4a091eedbaf52caba62fcc3220858ff9

    SHA512

    00f79a3492e5c627d03956f241f20ab4a41234b2e0088e736c45aa3465bf0abad46fb2899d434a221f102c91ff6f77d64e53e4aad3836f599c43e058d4c4a6c1

  • C:\Users\Admin\AppData\Local\Temp\TmpD36D.tmp

    Filesize

    2KB

    MD5

    97085b889cc3f31cc6d453276184cb9c

    SHA1

    b406ca70673463db3ec6151008f19548c55d4ced

    SHA256

    c1b61a27b13e788da13c71699b379334dfb135f9da6365133c23f5bf67819934

    SHA512

    3178cf71b8beca122d219d921a41ca04fec5659544e77f4725045179181e0ce62dd23b9b53f484881ea89e6aec48c3c30fd88a0d110df15ef859734dc0574840

  • C:\Users\Admin\AppData\Local\Temp\TmpD3AC.tmp

    Filesize

    2KB

    MD5

    3cd0b9fe9ab61cc06d50bf2e4778b776

    SHA1

    a270038fe17d57bd76d381e7c9ad0110860509e6

    SHA256

    be0445cfa571f9b7e41743e577dacfdaa62221381ec9d83dbd2ba1652427d0e1

    SHA512

    e94781e8c10b11d7d71755efc1cc551eca33c120ebd173fdb4b68b7e1d7fb035323f90e2b0156d1b4c675353e97f6509257cdc9f7a219e725742482f4f38bed9

  • C:\Users\Admin\AppData\Local\Temp\TmpD3BD.tmp

    Filesize

    2KB

    MD5

    c840aa3fab09920811128fcdf379fc46

    SHA1

    7001bca924ec212b55deff310e24b0701d20840c

    SHA256

    4145eb118ffd67df9a67a2361b80cdbe6c5fcea1e56578361b3a69ee89109b26

    SHA512

    f044e742244b2cbee275fc893c8d874bc13b6d4bb74c523282601c3d1b9d227c42ab1ad45c4f28c4734dd65eb960bd0a7fa47809f1fa033560bb37c8fdc62b9e

  • C:\Windows\Installer\MSICE7B.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\MSID301.tmp

    Filesize

    297KB

    MD5

    7a86ce1a899262dd3c1df656bff3fb2c

    SHA1

    33dcbe66c0dc0a16bab852ed0a6ef71c2d9e0541

    SHA256

    b8f2d0909d7c2934285a8be010d37c0609c7854a36562cbfcbce547f4f4c7b0c

    SHA512

    421e8195c47381de4b3125ab6719eec9be7acd2c97ce9247f4b70a309d32377917c9686b245864e914448fe53df2694d5ee5f327838d029989ba7acafda302ec

  • C:\Windows\Installer\MSIDBAE.tmp

    Filesize

    224KB

    MD5

    4837bbfa20c65ac97910388f07d1785e

    SHA1

    e066a3d68c8a5c099633f22a32e22cb8c4f24d8c

    SHA256

    29b9f6167ea343f279c7ebafa18f8fba0fa8c3c21f9f33e7741452c856d45664

    SHA512

    91cade5a43fedce4c06e21cd68023ad13ecc18ddf34379544f8111569868980d3852e93d8f0ccbb013df317f9ee1ac97d9a16862878371ec2cb0fd51b3468037

  • C:\Windows\Installer\MSIDD96.tmp

    Filesize

    469KB

    MD5

    05443d07e99428a958238614d092ff03

    SHA1

    98a1362ea8a31583beac37c5855bf4b730991b99

    SHA256

    422f51b0455b13b8ecd9cb86340de02620663a9c98147c063e33c324b0363795

    SHA512

    7f9524db8ef6fa496dc7a8c804e3d5275360a6335f82e1159b1bef092a4e88bd4bd298b7009ed1b4c2ed9cab5dbb4b308c7e563f4bb630fa9a50a200c204208d

  • C:\Windows\Installer\MSIDD96.tmp-\ICCSafe.CustomAction.dll

    Filesize

    8KB

    MD5

    d92d7cd04ba1d714e083c249bde42b7c

    SHA1

    e0ef82fa55b14cbf1e32fff499c4fd97e835dee6

    SHA256

    45a43b2179421541025a173e24d3f3f845a5fac3b6c58d54cac1204d25ec8f0d

    SHA512

    d3a6bd3f77a0b699f7f27741bcc047d2226aa2a90e3ee4be9a1551df7091f1c3c0ac4366cfde2a84cff233e5dcd8d77b155dbebbd4edf14179b4a74d0b3f7797

  • C:\Windows\Installer\MSIDD96.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • C:\Windows\Installer\MSIDD96.tmp-\Newtonsoft.Json.dll

    Filesize

    685KB

    MD5

    081d9558bbb7adce142da153b2d5577a

    SHA1

    7d0ad03fbda1c24f883116b940717e596073ae96

    SHA256

    b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3

    SHA512

    2fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511

  • C:\Windows\Installer\e57cbdb.msi

    Filesize

    107.8MB

    MD5

    9599a8f5b6c834d4f16a8e7132acea39

    SHA1

    1306c6d51382fdfac74a6fd777ce93b293dc1a82

    SHA256

    af59c36b03ee77d584a3af87cc6444613bacf49094b7233369a835004cd0ad82

    SHA512

    28ad8b8f532460ba6b7401232e7abfe2946f9e895ceeac91d1b63f769c345d3d0bf7ef47ceb23b2450c3611292bfcc4679d9ead87fccf5b4f6c3e17ff9e24d62

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    23.0MB

    MD5

    b953b39cbd6da86fd612f9c0d9038bde

    SHA1

    79efe1d460e6b1331075a33082db0a749b6d217b

    SHA256

    f2c8e31d35b4cde9a070bffb8d847c9900a1ed091a9f6fa7ff1eeebafda487d3

    SHA512

    9f73de1cbfaab35de5f796ccb6a470e251d22f05b67a9cebea490114462752949d61cc78080b5f9f1ed7c2a598a13d85feb1b6da687a1cd62b58fae8a4bdce86

  • \??\Volume{e037a339-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{94ce2aa3-aa0a-4700-8e1d-63ef155ca181}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    741c98527ca0327ef20afaf14c1bb813

    SHA1

    4884ae1eeccc3bf03a655f3c6f262d0429a7329c

    SHA256

    851fb1571b77e295e20760cb42b6e393efb844649999bf9c76491aaf46f58348

    SHA512

    1ecd9d14ee67b68208dbb1a89fd16f32a796d8082406da71fc71097c66c08d7137e1a1e53150500714c75ae4ed9bea0535b80e426611292351bbcad8b672c49e

  • memory/3372-192-0x00000000047E0000-0x00000000047F0000-memory.dmp

    Filesize

    64KB

  • memory/3372-194-0x00000000047E0000-0x00000000047F0000-memory.dmp

    Filesize

    64KB

  • memory/3372-199-0x0000000004860000-0x0000000004868000-memory.dmp

    Filesize

    32KB

  • memory/3372-195-0x00000000047E0000-0x00000000047F0000-memory.dmp

    Filesize

    64KB

  • memory/3372-203-0x0000000004920000-0x00000000049D0000-memory.dmp

    Filesize

    704KB

  • memory/3372-206-0x00000000049D0000-0x0000000004A46000-memory.dmp

    Filesize

    472KB

  • memory/3372-193-0x00000000047E0000-0x00000000047F0000-memory.dmp

    Filesize

    64KB

  • memory/3372-208-0x00000000048E0000-0x0000000004902000-memory.dmp

    Filesize

    136KB

  • memory/3372-209-0x0000000004A70000-0x0000000004A8E000-memory.dmp

    Filesize

    120KB

  • memory/3372-210-0x0000000004B70000-0x0000000004EC4000-memory.dmp

    Filesize

    3.3MB

  • memory/3372-221-0x0000000073430000-0x0000000073BE0000-memory.dmp

    Filesize

    7.7MB

  • memory/3372-190-0x0000000004820000-0x000000000484E000-memory.dmp

    Filesize

    184KB

  • memory/3372-191-0x0000000073430000-0x0000000073BE0000-memory.dmp

    Filesize

    7.7MB