Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 12:26

General

  • Target

    NotifyConnect.exe

  • Size

    13.8MB

  • MD5

    27a948607ab53fe815617effb81600d1

  • SHA1

    86a50ff946d264cd717de00d440cfd224ed46894

  • SHA256

    ae5a608d1f60cd2a180c3f2f49304deb00d2082762e22614f88312a8f121214a

  • SHA512

    b0f55ba415d66a958150546f7153ace1ed2478ce26b52d1f6b092d7bc746ca2f8a3305830ab026820ff70c8fb74ac38489192ffdd11645c5e3d442d892cfef0d

  • SSDEEP

    196608:HMwAeseEJOAQPDt8sFXOQdJrsBemmRjHlmxi1sfZafCFYLM9ltd5Cxzgx:zkeJAaesFXOQoAzDr17LtzM

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 22 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NotifyConnect.exe
    "C:\Users\Admin\AppData\Local\Temp\NotifyConnect.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\SysWOW64\MSIEXEC.EXE
      MSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Downloaded Installations\{9BFCC852-4EA8-490A-A17D-5E65A0AE354D}\MdConnect_Desktop.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="NotifyConnect.exe"
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2456
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C1245647C28C2438D7E9A591C1248674
      2⤵
      • Loads dropped DLL
      PID:1588
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5CBA17F4DCC4D0A32EB549D9DB31DC22 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:2824
    • C:\Windows\system32\cmd.exe
      cmd.exe /c "C:\Windows\system32\sc.exe failure ConnectNewPoint actions= restart/60000/restart/60000/restart/60000 reset= 86400"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe failure ConnectNewPoint actions= restart/60000/restart/60000/restart/60000 reset= 86400
        3⤵
        • Launches sc.exe
        PID:1684
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2840
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005A0" "00000000000003D8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f7657c3.rbs

    Filesize

    84KB

    MD5

    4a861f15a0684a009bd072495f95f479

    SHA1

    ea544c52d9de424529d5dc26cfab796120f8ade9

    SHA256

    f3de61b5f27b87e6305d9c436d77da9979358f7fddb31bc2755854e932b22af5

    SHA512

    86b317d4af4c1bb1d5fb72a1e651d7e43d6b2b23c37b707bf14efe4d3e9befe5f1a2606c640c7188e605eb29044740cabd4ecd87df6cb8e2c64e63ae9ec1176c

  • C:\Program Files (x86)\NotifyConnect\NotifyConnect\Util.dll

    Filesize

    351KB

    MD5

    8d5ab55c254db8746c1c362ef6683e37

    SHA1

    df393abef1656973f504271b9ae5bfcb0168b052

    SHA256

    f4555f780ea3839002164f0a5c0b335c588021fdbce55ec468972f8f5defcf34

    SHA512

    420c38590ef1bd1c264594cbe581fd3051c2ff8e0f026b1e03dfa36620984f71b2f1318a32b81c43993494580d1a7425732a802028e521544f62f917084ec806

  • C:\Program Files (x86)\NotifyConnect\NotifyConnect\commpro.dll

    Filesize

    64KB

    MD5

    b9f966cb62f10d2bfb7502d4657086db

    SHA1

    ae00304a88b1d417ecfcaf4ff6f9ad9d73f6bca2

    SHA256

    0c80d7f107a4ea865d3d42660b6082867f6f2c7da460fdaeef5643c2145f7298

    SHA512

    a4bb23fe1e568c87f6b1a09443b1e4e2d1503ac5a6fab45e5d6a461069ee0b8507bb51b0e2a72740c27454b25f2e262ad70dc14d6b5552be95a168b88cf6107a

  • C:\Program Files (x86)\NotifyConnect\NotifyConnect\zkemkeeper.dll

    Filesize

    459KB

    MD5

    e62a4d02a1a911eb9c5f7638604d028b

    SHA1

    d30e336a74659db3a91c3b0c89b316054663ba1c

    SHA256

    d78bc689c8603df783994c1dcc116dca7a1698326f9bf0feb9f8318842bf3d1c

    SHA512

    ac192e0f661be928048e80a38537c912f8e5e3a92835bc45bef1d1a329fe3494758dcd43d6afcdc07d841c6ed5b66c99c92ca034414138ef12e89d272f69fa01

  • C:\Program Files (x86)\NotifyConnect\NotifyConnect\zkemsdk.dll

    Filesize

    215KB

    MD5

    8494ace342c7548184f126344243896d

    SHA1

    7559632376e294b3d2af06f64b2de260b618f89d

    SHA256

    187aedc01a7d76c8c6476329c5b36954a1a9fa867238df1c26f70f217153f5e4

    SHA512

    06928ea3a7092d603c9077d8dac7c52786bfd69f9324c32351cd9a5a371544cdc1a945fb4312b02da1d2848e8bfad555b83819453643cf4a5fad7c637e653ccc

  • C:\Users\Admin\AppData\Local\Downloaded Installations\{9BFCC852-4EA8-490A-A17D-5E65A0AE354D}\MdConnect_Desktop.msi

    Filesize

    13.7MB

    MD5

    16cbe8c063e2571a14885fcb465f470c

    SHA1

    f02b7ffbfe4313585a3eab98aecf38246a69ce32

    SHA256

    7ac1f4f46846ea1dc120802a8ff3d8b129ee579f2a8ef4f8885842530636d117

    SHA512

    4186bfae917f1eb9dd4679ce228f3efbbe9340c1c871f4c160e262cf8f40653b73f5488d7b87701e46c0004a03c4034d4ebfe6eb2235ff38e453072578f5969e

  • C:\Users\Admin\AppData\Local\Downloaded Installations\{9BFCC852-4EA8-490A-A17D-5E65A0AE354D}\MdConnect_Desktop.msi

    Filesize

    9.2MB

    MD5

    abe88a1e2659dc9f659d04d6b9535f7a

    SHA1

    849a2a33e4773ee9a08f93e529b95ce7fdc82a68

    SHA256

    59f17807af6d8aa9a5bb3882f0944ed105e696c95662c0dde8f4170abdecd2a4

    SHA512

    a8a31e6d7d13a8f1e2de38f031b1d74f1b4ede57496e217e985a9a54f42a2c6c67c02eee042aa96a3218c08fde9546e7743961e6861665e2c62cd3e21e8036ce

  • C:\Users\Admin\AppData\Local\Temp\_isD02.tmp

    Filesize

    1KB

    MD5

    4703a131510955e0e14974f0bcc626b2

    SHA1

    69b710fccb792684a5694b69a0e86d4e3c7eae9c

    SHA256

    5006934220d17a4b5f02f3cdc607acd222420a68aef3ea4fc46a1c6ce93158b3

    SHA512

    126eb7a227e73edc4c2065c4bfff47402857b3aa0dfe8770b79fe7ba8f4d5c44c32d414f0cadfcdcf53f141b3f1da72a06e70eda00944a1e2fd5e55058aa4998

  • C:\Users\Admin\AppData\Local\Temp\{D8AED750-ED9B-4A25-BAD3-EE2ABA4AB23A}\0x0416.ini

    Filesize

    14KB

    MD5

    69f04b48601cd07f01cf4f6e364ecdb8

    SHA1

    5d8260e533fdc9576f33a1f013f3739c144ad612

    SHA256

    3a56a6e10eec747b4e1c0b4bae2aa8d3eaff840254ab23c9748512777adb1159

    SHA512

    6eaa7ced5299d7e1e5068d3fa4b2a0d31a40ad02e71e646ed40e4bb339e36f36a5dec50936e851d7ec3d871c47ccb42119e5233c3bee1b3d8c2fe276e3d3018a

  • C:\Users\Admin\AppData\Local\Temp\{D8AED750-ED9B-4A25-BAD3-EE2ABA4AB23A}\Setup.INI

    Filesize

    2KB

    MD5

    435628c19ba43f37335682223fa05e32

    SHA1

    d5a4e945926654f68b0ef2bc4d06248233e27600

    SHA256

    44c9fec2539858c2a12366571a20991559398548890d8c97fc3aec9d612ff832

    SHA512

    566c19d4a1f47ad1320266fed3cf2fae7de3caf6cbf4d814eab78dadc72b824633265648235c5260a14b4bb3291f56b6a5dc621244617be248ec7a9b219346bb

  • C:\Users\Admin\AppData\Local\Temp\{D8AED750-ED9B-4A25-BAD3-EE2ABA4AB23A}\_ISMSIDEL.INI

    Filesize

    11B

    MD5

    3fdd2635aa94921522af8186f3c3d736

    SHA1

    0fe63553e9f993c0cb2cb36b8cdcfba4f4a2650d

    SHA256

    17ad78845c9c6a8e97a5bd14be56700a51ee85867c979ed6cf538e1fed82cf7c

    SHA512

    ebdbeefbdc777937fce516a1cbd9af7c305fc242091d695ad919a27c98fac5b6b16b44130bdf97dbfd10561cce701180b1fbb303d848944c3b33b8a3c058653a

  • C:\Users\Admin\AppData\Local\Temp\~5908.tmp

    Filesize

    323B

    MD5

    6d7f32005a3839edce48e38ddf630c22

    SHA1

    c3bbd41cc08a3b2eeb1825478316118716b2c168

    SHA256

    df5ba60e9309ded0e4beda62ae82a9de05a2a11bd7dbf1169f23852c34181c46

    SHA512

    ba61ecc5f43f039a4d4f56d4c0edb2fb8ce297cc38079e86ecda124fe8c1d3182fbbd2ed5a6e521b4c7c389e46614f393154ea4cb48a3f9e7e6968fea85f8803

  • C:\Users\Admin\AppData\Local\Temp\~5908.tmp

    Filesize

    320B

    MD5

    c7ffe2f9a1902c553beb6639cb0dd89a

    SHA1

    aa7e182ffc401872af768c5d535ceb38e845fc95

    SHA256

    01cb7bd95bc2f59e423b3ee55e2de4711d62110822c1700adfd0cd45e2769385

    SHA512

    e71cfcb24a7cfe52d35399febd1d1f8454a0b4f312b9a0015ad7fa3e282e0ed72269da7627d967822a2166a7c1580a107ed69ce29e900bf139e63e9055e22cee

  • C:\Users\Admin\AppData\Local\Temp\~5908.tmp

    Filesize

    329B

    MD5

    141936c30d63643e19320ddcc34aca06

    SHA1

    e2ab2a1a05785d7ae3e85ddc5edb6c4cf2cec707

    SHA256

    74e74f8e332a98d0abe3cb681859a2daa138c6f59b5e9be1a9e0fe1f7c59b530

    SHA512

    eabd7b060ed7a5626848f71c6edd487211de2f928867bd88f941187db1569048f6f8cc464915eede0b840e630df1e2cb66c875948a0ccec4e32fd81dc6e9d582

  • C:\Windows\Installer\MSI58AC.tmp

    Filesize

    161KB

    MD5

    03c0e661e724c8c2ea958ea6c8399b4b

    SHA1

    84aec5b716199c3e95b979c2b8614af7dc1a4780

    SHA256

    655e34000815dac7c76a7d31a0d60a9e0b7bcf4952fddc0fb3242aaeb9cc30dd

    SHA512

    a2cd6a2c1d993c69c9c64fb7dfea5c0f912dd1fa361665a771a3d2aa7e259cd2bbaa2235f560fdeaecc82fc66933605bf787ea62c2eb876506a129b59f8d8c76

  • memory/2824-208-0x0000000002040000-0x00000000020B8000-memory.dmp

    Filesize

    480KB

  • memory/2824-212-0x0000000000610000-0x000000000064B000-memory.dmp

    Filesize

    236KB

  • memory/2824-216-0x0000000000280000-0x0000000000296000-memory.dmp

    Filesize

    88KB