Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 09:30

General

  • Target

    driver/vista64/install.bat

  • Size

    16B

  • MD5

    903b157dca56861c845179d4d1c5e930

  • SHA1

    e6b5ed1511f1f14f0436ca474ff457cb340e7c60

  • SHA256

    8402e0c9189fa6ef6ef8e955606c5a20f880f1106ea5f81304e42a0864f078f8

  • SHA512

    53f5be22fd9b12ff9d084a65be63bfa7a9b5489a5d95263343ee0db3ce749b1b6d0999ac3cc34b23a4a970f3f02dd7ed1199269c12c8b59313ff58b225774006

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 12 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\driver\vista64\install.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Users\Admin\AppData\Local\Temp\driver\vista64\setupdrv.exe
      setupdrv install
      2⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      PID:1952
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{46d85740-f5cf-f44b-9230-9214ee181ee4}\mv2.inf" "9" "434737feb" "000000000000014C" "WinSta0\Default" "000000000000015C" "208" "c:\users\admin\appdata\local\temp\driver\vista64\driver"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:1104
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{ebeea493-d11a-3741-95b0-7b6e2c2e8c42} Global\{689d07b0-dfba-a741-a782-dda358f75250} C:\Windows\System32\DriverStore\Temp\{06f6f463-9d05-304e-af40-cad244019711}\mv2.inf C:\Windows\System32\DriverStore\Temp\{06f6f463-9d05-304e-af40-cad244019711}\mv2.cat
        3⤵
          PID:1472

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\{46d85740-f5cf-f44b-9230-9214ee181ee4}\mv2.inf

      Filesize

      2KB

      MD5

      1b4f828fc21aa28c3ce863a31c1f9d48

      SHA1

      96b8e2ed63f54beb4e087712ada7520c2379c5c4

      SHA256

      e7f85212d7708402910830576b0bd84873c24a1339cfd3ebbe5a2939127438d4

      SHA512

      9cf0e701adcbbe05652f623a34849910c657fa9536513835d18fd184faad47b62c28437237a78494b8e31f5e27c0bddcd9d4cb5c5b4bedc56ef0842553ab3064

    • C:\Windows\INF\c_display.PNF

      Filesize

      8KB

      MD5

      716a1b21d16beae0405cc08d35d137cd

      SHA1

      a013a0d39efd59a831edfe5194dd182af25109aa

      SHA256

      e3170e44d159d924bd7884c4e0fd6b590ffd93b0ce2c1eebd0d68606039f7df5

      SHA512

      bf6664be664c1675b1038afe91d108a0d0f487f158cf6d0b183ab5ac5cf10836270c71687b69a220bd7ef8383bd2aa1cc9715edcedd4fde1735c7af50ac103f8

    • C:\Windows\System32\DriverStore\Temp\{06f6f463-9d05-304e-af40-cad244019711}\SET36CF.tmp

      Filesize

      9KB

      MD5

      84972e8fa5a2363e42d90f92f1ab3f26

      SHA1

      eed45042eff0459391053879ffa458493fdbfdd3

      SHA256

      a70a4575a97fb62cfef3bc36329dbd0cf9be72e09eb997df1f565fc792727dc2

      SHA512

      3fcc839aa3b3254f794e88ad3254b45d5238cb287d86613669fa80bfbb9de11a8a851ad3bc08c9e3d752b67e38c29896aa0450510328159ef3fd10c76dbd6e80

    • C:\Windows\System32\DriverStore\Temp\{06f6f463-9d05-304e-af40-cad244019711}\SET36D0.tmp

      Filesize

      26KB

      MD5

      f895283a62f0456f91094fe43d45f531

      SHA1

      325422ed844669d0af155d68a801e1c513a95e79

      SHA256

      60dbf8caf518ac5bc5c4881368bcbc2f80f34fa0dac02a0c39ad04156e622737

      SHA512

      af619973b793ee1c169cc212389f77d8e42cf162ea95b2bdd8603b3484894c8c762f55e7d54b9bb89770896ce0ec6dedbf7876c309bf6d1789643d536f60b33c

    • C:\Windows\System32\DriverStore\Temp\{06f6f463-9d05-304e-af40-cad244019711}\SET36D2.tmp

      Filesize

      12KB

      MD5

      a906b08944ef1bec17ae306e9fdb35d0

      SHA1

      e22adb1a14254165099af8940fbf6cc14bf2c276

      SHA256

      898b7d602a2b422c97d8773d72f978c828f9b7ba7582f3236601b0ef4c9834e5

      SHA512

      22d9368c144e130d7b647293bb95a4ef5ada01c169e60f2fbd84e0d576cf85b50aa4f06a62e74313d2a58cf0cb0c92d43812c7072d33c9525c6c3245ec1ad1eb