Analysis

  • max time kernel
    52s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05-03-2024 15:53

General

  • Target

    SetupDTC300.exe

  • Size

    311.6MB

  • MD5

    b9b9b28358039da480658d974dfff10b

  • SHA1

    dbf74fc97651715f9aa4b5b764aad3dc69255c0f

  • SHA256

    d81b9ef03cdf5bd1cbb8f07c0a1f53cefbaffdc340990c63bce24bc58401e332

  • SHA512

    9a4b748b59c3ccb1a0b9d6e0d5f80f83f8a762db3f35c3df5ff40d02253a722fff382e74d58749917b8fd68e33e6196df4f72e18fdfdc10189057948a875c490

  • SSDEEP

    6291456:EWgMkN6RS41bMCeQggF+w2NdlDwIbXTiZxVwn0kOZYHYZ4X03WFk4kcYa/o:Eik6S4AG8NsgDiZxVwuggp7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 18 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SetupDTC300.exe
    "C:\Users\Admin\AppData\Local\Temp\SetupDTC300.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4144
    • C:\Users\Admin\AppData\Local\Temp\{56DF11BF-1DAB-4988-9FA2-AA3F221BB072}\SetupDTC300.exe
      C:\Users\Admin\AppData\Local\Temp\{56DF11BF-1DAB-4988-9FA2-AA3F221BB072}\SetupDTC300.exe /q"C:\Users\Admin\AppData\Local\Temp\SetupDTC300.exe" /tempdisk1folder"C:\Users\Admin\AppData\Local\Temp\{56DF11BF-1DAB-4988-9FA2-AA3F221BB072}" /IS_temp
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Windows\SysWOW64\MSIEXEC.EXE
        "C:\Windows\system32\MSIEXEC.EXE" /i "C:\Users\Admin\AppData\Local\Temp\{56DF11BF-1DAB-4988-9FA2-AA3F221BB072}\DTC300.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="SetupDTC300.exe"
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:536
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\system32\explorer.exe
        3⤵
          PID:4512
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1868
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:1312

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57de0d.rbs

      Filesize

      12KB

      MD5

      f0e93c844b0cdc7be73e8a6a420f0c2e

      SHA1

      7a8e5de5a2104d87aaf5c235365131de9b8e56ff

      SHA256

      fd18878d9efdbd95a76b734c482f31250e4be5f0933f778817d9312b45bc8946

      SHA512

      46b84d76e36ec0703864528781b192d5710d86722bb02e664a402133ede2ce22f3a1e77d9466dac7a1d420551b9dc255b0b7bc0e9980d5a223d7864a75f9f0ae

    • C:\Users\Admin\AppData\Local\Temp\{56DF11BF-1DAB-4988-9FA2-AA3F221BB072}\0x0409.ini

      Filesize

      21KB

      MD5

      a108f0030a2cda00405281014f897241

      SHA1

      d112325fa45664272b08ef5e8ff8c85382ebb991

      SHA256

      8b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948

      SHA512

      d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298

    • C:\Users\Admin\AppData\Local\Temp\{56DF11BF-1DAB-4988-9FA2-AA3F221BB072}\DTC300.msi

      Filesize

      751KB

      MD5

      ccefae48b3c67a59e9e85f399329a3e9

      SHA1

      ade027ecf28a1d1095d3ae637f39ee67f7535854

      SHA256

      106075b6347801e699805ce3dceb17b4f327177b6386d579522e074e1f13995f

      SHA512

      10df8dd718cb1b7a6fa7f87f33941ed8085db7ceffb1d0de2975d5386de97256467555dc4084d4647cc483f3d19200d0b25f9ca7478c39f4103b7e451eedfcf1

    • C:\Users\Admin\AppData\Local\Temp\{56DF11BF-1DAB-4988-9FA2-AA3F221BB072}\SetupDTC300.exe

      Filesize

      35.5MB

      MD5

      2ee49e4598a6554d7147d614975bbc42

      SHA1

      2592514d8992ce9d97cdbcf962cf3c9d56196a5f

      SHA256

      609e42a2856259186496eb4d974d79eaae0c9d849faa1e3269deffc5b8b4192b

      SHA512

      23ed80624eed79e33b69115f1ffd25a84d402a830598796b88e45608c36aac5b13f78cda1af4b5f3fee887ccb6de215d1dd052b40eba4058a7f0549d85c541fe

    • C:\Users\Admin\AppData\Local\Temp\{56DF11BF-1DAB-4988-9FA2-AA3F221BB072}\SetupDTC300.exe

      Filesize

      49.7MB

      MD5

      83eb6d35e90e984dc1429ffea4cff010

      SHA1

      d2a07b7092c3a4f16367fd5bd968f73c65ae9269

      SHA256

      0d75494720796fe24aacf6f8a3c05844d7a3ad0f84534d048ffc297c9081d057

      SHA512

      8bf979e469ee61f32c29171a134eeeec4d17e6ea9e75867ccf3906de9e9bfe466161f7373668fa92bc43642a6ef41d1282491b691a552bafcc4442c3670a082f

    • C:\Users\Admin\AppData\Local\Temp\{56DF11BF-1DAB-4988-9FA2-AA3F221BB072}\_ISMSIDEL.INI

      Filesize

      20B

      MD5

      db9af7503f195df96593ac42d5519075

      SHA1

      1b487531bad10f77750b8a50aca48593379e5f56

      SHA256

      0a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13

      SHA512

      6839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b

    • C:\Users\Admin\AppData\Local\Temp\{56DF11BF-1DAB-4988-9FA2-AA3F221BB072}\_ISMSIDEL.INI

      Filesize

      616B

      MD5

      3cd6da8796786e6755ae9e05cae7c782

      SHA1

      04adb5f6ac7066e6ef9f8438d7748f758bdb9cfd

      SHA256

      460282a36747774aa57beda9e337edd3892403022477cc112da703202f76691d

      SHA512

      b73e0847ba88a5adf6f2a339c7c4326afa73ea093dccb51740772ac3590cc936ca4a0cb4f60a67d8259c2cf92743c0afd99728d270f732ccb8130f7cf810c867

    • C:\Users\Admin\AppData\Local\Temp\~6C77.tmp

      Filesize

      5KB

      MD5

      c1d0ccfbf7ae8d3057166e915b3d2312

      SHA1

      60b7fb7c8f1a1b58379343424c0cf786dfa78186

      SHA256

      c2b9bf478bbcdbac993f37b2fb4fde259d3f8434b3c88321a89fe7bc8f75783b

      SHA512

      7e9d6031456a32314af45dbe49deff8c5072217a3091cab15e91a527616ad2301531adb62e68d6c31f02f6d85060bce930960ac3af68a485052159f69426a426

    • C:\Windows\Installer\e57de0c.msi

      Filesize

      11.2MB

      MD5

      ccf68cff8ab1fe757c4030e3f4868750

      SHA1

      367cd9dee926ae69397edcece1fc4c011dde4166

      SHA256

      e1f1734e60446a2eb54cbfeb4010063ee99c40010d385bd42e94add483a38abb

      SHA512

      89e1941c00cc18ab755c7753eab21c938688220e1739951749a86e8717bcb8ebec3c050f30f51ef5bb84d0bcde6eb7cb3e9bc80c7584aa1e65277ed041d6616f

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      10.7MB

      MD5

      ed162f0b16afb7b0f877db0f92357990

      SHA1

      8ba1cc5265e8b7a0d8c4f6211e99072ff00ae6ef

      SHA256

      790c6fe082711949528b7b43ce2cfee28abc0be77f9da342f0e92edb953e1cb3

      SHA512

      31e686e440332d0ceb933e03df6cd5df43c87496d77dc0ba454f81892ad3161eed901f5691bd8088ff2543364ac31f4ef6dd4a74d09f90e21385a2f2e5a0c92e

    • \??\Volume{d1929823-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{a4b216a3-8422-4338-be37-6d1dd262838d}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      66fe87b6ccd4a9fc421ab61c3687c659

      SHA1

      d559886159a771631a3ed980718aacea5a3ae817

      SHA256

      656b0a91ecfba01f48cddfa395ddbb119c5f20996bed226e5748b1c221b67f80

      SHA512

      2a84f67dca9e5d558042da014f6aa3f935de7f1f3bb5c98f0e57c5b85446faa302ce4b118ddb61326a288bc8522ebd5a0510fe1ff5ce36126c2558c2fd9dd010