Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 14:24

General

  • Target

    ac1978a25d9d96bdfced03af92b93256.exe

  • Size

    12.0MB

  • MD5

    ac1978a25d9d96bdfced03af92b93256

  • SHA1

    ecea8d518fe39d05df7af9961dfb59aea6b0b039

  • SHA256

    eb3a26dafee432003b092d843c80d262ff891343073286c29282faf0f3193035

  • SHA512

    3d3536f95d1ce58a468f394d98876db10fa117f936e7786bd3c6858130aea3b9aa3074c46b569ac91757796d463e34f73b01d3d67f87de5c64514bd4f2e7bb0f

  • SSDEEP

    196608:JUQfGMkASVqV26hgDneSccKbOwKaoXcUP7R/M/xNIPPDZ0oWsTkFP4i5r6uRc7YR:XuMkqE5ccGOwC9IxSPP1o+kh507Y+cN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 16 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac1978a25d9d96bdfced03af92b93256.exe
    "C:\Users\Admin\AppData\Local\Temp\ac1978a25d9d96bdfced03af92b93256.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2916
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding ACEB5525EFDF7497F62C82DC15321038 C
      2⤵
      • Loads dropped DLL
      PID:2236
  • C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IDriver.exe
    C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IDriver.exe -Embedding
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    PID:5068
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    PID:2716
  • C:\Windows\system32\srtasks.exe
    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
    1⤵
      PID:1728

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e576e5e.rbs

      Filesize

      51KB

      MD5

      27f6ec4c6e7e63667da4e3cdf15c85da

      SHA1

      1e72b782e900cfe955493d3764404a3ac1405cb3

      SHA256

      73f6ee68abfb2b5d108c675a4e6e0d239a265f47614ac10919cb59bca3f053bc

      SHA512

      43f09b5612c01aa78de6a1cef98ddb66a2715f8f6731a1ce111a855c3fbf781a563483a30aacec1b22b5a0ca7497d1a73a9540bb701070b50171ae9529e975ac

    • C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\IScrCnv.dll

      Filesize

      260KB

      MD5

      f6aabdf85821a9c61c61dec9408f40cc

      SHA1

      ddac695de73be7a67357aea89c7b9c2ca21fc4e1

      SHA256

      9ee23586d456db53d59fbaa8669e817461aeaf94f81237ead3f2c23cac8c40fa

      SHA512

      73d2e4352c4055c8d08ad5499fc4495ff6fa7613970f9c0a3cf73dae645fc9102e62cf9c7dd046d6bc3c909cbafd06a30812d1d9bcf8f34c4a253c09d628b538

    • C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\iGdiCnv.dll

      Filesize

      176KB

      MD5

      afdfec6679ce99596261ff182afbe9e6

      SHA1

      3289711e3ce8bb72bd84bb0bc33f95d958648f4c

      SHA256

      81b931aaf908e1e372802db04dfbe5256209d488bfe88d58841fc13acadedfd6

      SHA512

      c8ce4617d03084f37b8766f0505922a8f380e0d2745658864197535c43c3b2f985c4a2bac2228752857782181cd41167bfa4b784c7ce3e8a94932d58d099753a

    • C:\PROGRA~2\COMMON~1\INSTAL~1\Driver\10\INTEL3~1\objpscnv.dll

      Filesize

      32KB

      MD5

      aba70b81a5811e7b140271595d66f06f

      SHA1

      42ef824151e67cf921d861d83872c9ef13b500e6

      SHA256

      26d4765c2461fccd669e455d33659397d6f82fe261ece256c3f19b831dcfa0ba

      SHA512

      8780d68124e309b8ec2dbbbac18be3291fefabfd6ed9154645eddfb4dd8076e2fda97168d7c5ea9b378b54ee900f75bd409736cfc1262e0d167e0ff62078de0a

    • C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IDriver.exe

      Filesize

      744KB

      MD5

      a9d3658c5be72816812a5a32e4560ba3

      SHA1

      649003292ee74d2407fae441fb92b605a0d91f90

      SHA256

      b2527d1e2297506796f898e90907fb4c8c7e063f2898194e74152fa9ca21923f

      SHA512

      b80283aafbe8cd59720979d51a5524a1d53b001e59c6fe9693c754b238101ac6058122130e0be97ce22dc4f7edce9cd84aa4fde869bf728cff8fba1733638c5b

    • C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\ISRT.DLL

      Filesize

      400KB

      MD5

      db28ca3ba3c2045aa7b6e59aa9831c68

      SHA1

      55b44ea55f3a04b916339c81e1cc3f3db62d54cc

      SHA256

      ca41725fb64338211a9f9740f45f1b0c4d80e6c7e84a1d2e5580dcecbf87e489

      SHA512

      82c409611e61acad6b2986372ff72682e611b7ee5a88e74fec9c7864ce50c7494adba4165a44f2cc99b93daee33ad67320aed4fd5f85ef2fbc4779bf69f55efb

    • C:\Program Files (x86)\Common Files\InstallShield\Driver\10\Intel 32\IUserCnv.dll

      Filesize

      168KB

      MD5

      197c2ce7cf2a98ae895ece98d88b8245

      SHA1

      f734d8dc508138501e79b384fe1a689920c6ba93

      SHA256

      260924991dff4fbd2f691913007aee1f3136708671ef3309b4f9ec8687da6f1e

      SHA512

      a7ff5f0d56a13d340d9ec1b977f9e995bf7dc61f6bf4b8ecd7369793d39032a43e587146e6b9a9084be5a9cc709876bf971983a218c2af631d3950cd3391cd47

    • C:\Users\Admin\AppData\Local\Temp\MSI8368.tmp

      Filesize

      108KB

      MD5

      9db0fe073e1dbf9bd99fd556ccf56518

      SHA1

      19df8a5cd14fc73b4e2d0196caf3b3d4cdc732dd

      SHA256

      18ca4f41e444e28ed2d2bd33d77c5fb994f6949833c2f7a0ddacfffe6b4c3450

      SHA512

      073d420bf8fd8f413de4ed661cf63d66c19c8dc5b875af54a73315dc755d1885697ba3004518fc0308bd8be444bc7c73419fbbd0b9682565569be3cd41933512

    • C:\Users\Admin\AppData\Local\Temp\MSI8444.tmp

      Filesize

      48KB

      MD5

      fa13aa9996fe8d85aa680e9f5e4f23e8

      SHA1

      cbc23243a9a595b6d91431c4c275c1ab2adc6642

      SHA256

      8f40c1dc28323a3c5310bf21372b9756ca547c20c7cf63197e071a9e1e66b31b

      SHA512

      9f4bd08583dbaadaec281d05d79c11a1dc1651d2d96cc4ecddd68e74178c3eec843e43bea14c546ba18b371177684dde0c21211e8fdb0369bbeeb5e31fdbe87e

    • C:\Users\Admin\AppData\Local\Temp\_is5A17\0x0804.ini

      Filesize

      3KB

      MD5

      f4173acfb530f6529b5a83f4734b7de2

      SHA1

      0ce31f6b2885ce5a891d61bb5cd65239550fac3a

      SHA256

      72f2993df49de0263e981a7d36a11df005755505c9f01c0b3560e427d79e5eb8

      SHA512

      2600c2b255516d88d3f62357071ff0674b6a5457dab36ad8770370e6430b1ccf3111ddbaf0fc9f608d65ebc0162ca622b13a1b064220ca8ec31cb433bc2fb131

    • C:\Users\Admin\AppData\Local\Temp\_is5A17\ISScript10.Msi

      Filesize

      875KB

      MD5

      f93a766e58d9c06b5cfd7c095fdd4b97

      SHA1

      d02e24a8c14bc127ff1cbac8ef7c43830142d0e0

      SHA256

      c00e1e874d0093112e898c615b0f81fa8a0974c25cf01638fe6acb949b1940ed

      SHA512

      65089a6b7a916716866192781af098b8939ad8ef5881abfafbfebc53fd747c3af5b2451668f4e60ca6c3c15eacf485e009c260e710ab934537c4d98ab67d3bbe

    • C:\Users\Admin\AppData\Local\Temp\_is5A17\Netpise V1.2.msi

      Filesize

      7.3MB

      MD5

      da4d6064e40a80d4711c60eb92a2a9c2

      SHA1

      cdd8c94dd50dd109f19d46e68f8e700ae180dfb4

      SHA256

      b728cd6fd411eebccbec204e16d0ad2ff26920a1eb94101a64bdceb6a2ab8887

      SHA512

      37846abd95232bcd283a7e73adc9eeec417af32719e9ead94ee1d6777cf7310e16a34a664708b353f66c8317ade8e0837054cb8415e0a65c1583ee2b5ee75d2e

    • C:\Users\Admin\AppData\Local\Temp\_is5A17\Setup.INI

      Filesize

      1KB

      MD5

      87beddbe2c3d28da9186f10a9f86ec3c

      SHA1

      e7291e9fd895ab1c6e7e2472b695caa01ffbd4a3

      SHA256

      e840e95c3013e3b949fbc800c2f318ef8e29dd4bc753d0c65d4efc26e0ddd468

      SHA512

      3d53a2e3cc443e14b289dd0c94a2dabdf481d7c04b3bbfefd366f0f19f231d1ab17e3564fbd27d74127553ee6009356e71160d88b69a9537f058e04369507128

    • C:\Users\Admin\AppData\Local\Temp\_is5A17\setup.isn

      Filesize

      233KB

      MD5

      a2c5d0d0c1153784aaac022bbd7bb780

      SHA1

      650204a126c15445f21f291f62e8eef9da2ceb93

      SHA256

      0018ddb503901be72a4c8febf7dc353ed185332192015c860c2a261a1e8b178e

      SHA512

      3746e2e585e8d7c13ff5dcd9381cfc96e5470bdf3a394b752345d6d3d4d6daef2041245b76113a1eccc7d9bc30e677fabe76225d02247eeb74f204b385aec4ba

    • C:\Users\Admin\AppData\Local\Temp\{EEA91040-AB62-468B-8011-36C8FF52191F}\ISRT.DLL

      Filesize

      256KB

      MD5

      35ea7080a50d5ba3518c0590e08a5d65

      SHA1

      7cdf2dc37ea5761f0cf3aab96fe5fa3e5603cee1

      SHA256

      a1519a4e3b67fa9a31e3d526849880b24928fa7b373d910d615b05adfc181202

      SHA512

      1ae3687a91d37506f1d1869df3a73ae7a867b3d7909e391a4ba1db8194074dfe222993e7f29dc7a6b4ea03468667cfff11a2fb8d880b6dbd568eff1afc6daca7

    • C:\Users\Admin\AppData\Local\Temp\{EEA91040-AB62-468B-8011-36C8FF52191F}\_ISRES.DLL

      Filesize

      324KB

      MD5

      a16e3ace458e482ee09be13e67c45359

      SHA1

      9443fb115877739a6b76e2c8d635356f89d621b0

      SHA256

      9e1218651e63054d18eb5dcf86ec7e37744650063c833c341ff8d62baecd6d63

      SHA512

      54acaf56b185bf1c8658d7e1ea0d3bf5bfc0cdaaba72e29f772d24a710fb62f2329233964bbaf7fed07d438e7a7c4f1914e5f89e0dd8016788c5a6bb246c2bc2

    • C:\Users\Admin\AppData\Local\Temp\{EEA91040-AB62-468B-8011-36C8FF52191F}\_ISUSER.DLL

      Filesize

      16KB

      MD5

      6196e4a5aa6731ffc897ca8d1fef7345

      SHA1

      10a338da5920b84eefd1c557131825b24168b2ab

      SHA256

      cef66955af1139cac1b8b7713a5a1e5edd9331fb5aed142dd9b23876a5294b63

      SHA512

      3f9d0d869648b467485d1900fa8b6d047f552168bbff21a1b74236c8e17776070818f6afebbe4df788ee033fa44d9f99aa787ab5d2502c2b5c0c700afd96bbea

    • C:\Users\Admin\AppData\Local\Temp\{EEA91040-AB62-468B-8011-36C8FF52191F}\skin8879.rra

      Filesize

      11KB

      MD5

      6c9226c6d56a83042587bc9a1b7abf3b

      SHA1

      259135c6ff4d9a706450809a08db389782b4ccd0

      SHA256

      11a7796e05198361d4775757e18a10cf02839b3dac9b9d1c1e9f2ab37281f725

      SHA512

      f70b56ca5898dcc9549a7911be739cadfd6ed0267295bec4899b50a06855ae853b09a239245c8c0c27283db943adbe774159d3da016bf88ae6ca26f14dd6d5fc

    • memory/5068-139-0x0000000002F40000-0x0000000002F6C000-memory.dmp

      Filesize

      176KB

    • memory/5068-148-0x00000000043B0000-0x0000000004416000-memory.dmp

      Filesize

      408KB

    • memory/5068-167-0x0000000005310000-0x000000000533E000-memory.dmp

      Filesize

      184KB