Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2024 14:26

General

  • Target

    psqlodbc_x86.msi

  • Size

    4.2MB

  • MD5

    28d14596c0c5ce8aab6c350075184d45

  • SHA1

    03544fc6e333958e461bfada8fcc7c74f958ac91

  • SHA256

    7a077a21c426d36fd136f7cb31cef1055e7992216d07c1aa9bc5ee2fd720999a

  • SHA512

    ede6abd39eda4ea52d1d0b979d94a2c4fe244ddeb157705f962e65014ae97ad8cf90237155478cc1132abe528f6c6301e67b2457afeb2296474011a5cea57585

  • SSDEEP

    98304:VHSqDGkjh7F421XMqCUoIcD8wtEDrkptE4:MqDqb6BcD8w6Dg

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\psqlodbc_x86.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4824
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:404
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:64

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e59552c.rbs

      Filesize

      10KB

      MD5

      78815db71e732a233a02efc8e96585e4

      SHA1

      152f62ec9f7e93033f3c25e063130ad47bf49e68

      SHA256

      d72684a1ff43e9f617da1c02a1dcebfe9525838f941eb88fffdbb01997ba9ed0

      SHA512

      a1ada36d08da47814df5ae8f70b2bc0750dc8cd2c6db38afb8ff63d7aae90240bad74c2fc2eb74cefcfb34e299758c1cee238bbbfa3b8d6414bb9c5a0b1031d0

    • C:\Windows\Installer\e59552b.msi

      Filesize

      4.2MB

      MD5

      28d14596c0c5ce8aab6c350075184d45

      SHA1

      03544fc6e333958e461bfada8fcc7c74f958ac91

      SHA256

      7a077a21c426d36fd136f7cb31cef1055e7992216d07c1aa9bc5ee2fd720999a

      SHA512

      ede6abd39eda4ea52d1d0b979d94a2c4fe244ddeb157705f962e65014ae97ad8cf90237155478cc1132abe528f6c6301e67b2457afeb2296474011a5cea57585

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      20.0MB

      MD5

      9905a66dc40171c0cc940c2cda875d94

      SHA1

      ff532c3cb3c63e0bf7fc28f25c897a2fb78ac0df

      SHA256

      f8756f9eafeb029eea49eed8ff49f83138179e8d2afc3bf6b572ce8cb35ecc4f

      SHA512

      84724f50a86b24b1fdcde6f450e294957c6254929100fbfaea7067987af1b42be9e5e305b614c1682e57f596f9d96831839fddf2d7913be4f6cade941129c4d2

    • \??\Volume{eb4950db-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{58c65c1e-4c44-4c5e-93c2-575374837838}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      867f4dabb7b897327e6a3a8a61cd5cb6

      SHA1

      b01e7c79873bf57b85e56f09a0a2eac79c63af69

      SHA256

      b2437a230af6d8d99ea3219bd113e02eba4cde0e91d0b781b474c2a7a15fc584

      SHA512

      87f2f7af256fecbe4cd62e72f22bac884b399c0f3e9e067775be873d7d6fb04ec726dc17f3d7bb43d45a7c23e2a0f1ec51b5bbf91c40fb2522140e2294f060bf