Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:09
Static task
static1
Behavioral task
behavioral1
Sample
9c71b3dd94329b2649fd36ccd5f0df919126284883543cff573e103076ce3506.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9c71b3dd94329b2649fd36ccd5f0df919126284883543cff573e103076ce3506.msi
Resource
win10v2004-20240226-en
General
-
Target
9c71b3dd94329b2649fd36ccd5f0df919126284883543cff573e103076ce3506.msi
-
Size
3.8MB
-
MD5
4b2e289610400400a87a347ac2010c59
-
SHA1
b8ec5f89be7282a376e1026afdf68ed46753b978
-
SHA256
9c71b3dd94329b2649fd36ccd5f0df919126284883543cff573e103076ce3506
-
SHA512
4e1eef2cf6e355549e0eb10309e6b6efb538d88e86ff25c77c201aaff37500b7daa6489a8fef88cf93d53771fe8c80bcf16f4b71d00e3a4824fd20a615c2b0f5
-
SSDEEP
49152:9pUPW9qhCxzT+WKjSXVRzLVI4s2kF6Wua/tB2KJP9C9/q6ZXc5vpSOCH7p76yTJF:9prCQVNLe6kcL+j2CP9CaCbp7
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1208 ICACLS.EXE 1796 ICACLS.EXE -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e57fe65.msi msiexec.exe File created C:\Windows\Installer\SourceHash{719E9625-9BD4-4D30-90BE-113AA1D7545F} msiexec.exe File opened for modification C:\Windows\Installer\MSIFFFB.tmp msiexec.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log EXPAND.EXE File opened for modification C:\Windows\LOGS\DPX\setuperr.log EXPAND.EXE File created C:\Windows\Installer\e57fe65.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 2412 iTunesHelper.exe 5072 Autoit3.exe -
Loads dropped DLL 2 IoCs
pid Process 492 MsiExec.exe 2412 iTunesHelper.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3652 5072 WerFault.exe 109 -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 00000000040000007d3392e9fd415b840000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff0000000027010100000800007d3392e90000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff0000000007000100006809007d3392e9000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1d7d3392e9000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000007d3392e900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 680 msiexec.exe 680 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeShutdownPrivilege 2224 msiexec.exe Token: SeIncreaseQuotaPrivilege 2224 msiexec.exe Token: SeSecurityPrivilege 680 msiexec.exe Token: SeCreateTokenPrivilege 2224 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2224 msiexec.exe Token: SeLockMemoryPrivilege 2224 msiexec.exe Token: SeIncreaseQuotaPrivilege 2224 msiexec.exe Token: SeMachineAccountPrivilege 2224 msiexec.exe Token: SeTcbPrivilege 2224 msiexec.exe Token: SeSecurityPrivilege 2224 msiexec.exe Token: SeTakeOwnershipPrivilege 2224 msiexec.exe Token: SeLoadDriverPrivilege 2224 msiexec.exe Token: SeSystemProfilePrivilege 2224 msiexec.exe Token: SeSystemtimePrivilege 2224 msiexec.exe Token: SeProfSingleProcessPrivilege 2224 msiexec.exe Token: SeIncBasePriorityPrivilege 2224 msiexec.exe Token: SeCreatePagefilePrivilege 2224 msiexec.exe Token: SeCreatePermanentPrivilege 2224 msiexec.exe Token: SeBackupPrivilege 2224 msiexec.exe Token: SeRestorePrivilege 2224 msiexec.exe Token: SeShutdownPrivilege 2224 msiexec.exe Token: SeDebugPrivilege 2224 msiexec.exe Token: SeAuditPrivilege 2224 msiexec.exe Token: SeSystemEnvironmentPrivilege 2224 msiexec.exe Token: SeChangeNotifyPrivilege 2224 msiexec.exe Token: SeRemoteShutdownPrivilege 2224 msiexec.exe Token: SeUndockPrivilege 2224 msiexec.exe Token: SeSyncAgentPrivilege 2224 msiexec.exe Token: SeEnableDelegationPrivilege 2224 msiexec.exe Token: SeManageVolumePrivilege 2224 msiexec.exe Token: SeImpersonatePrivilege 2224 msiexec.exe Token: SeCreateGlobalPrivilege 2224 msiexec.exe Token: SeBackupPrivilege 1492 vssvc.exe Token: SeRestorePrivilege 1492 vssvc.exe Token: SeAuditPrivilege 1492 vssvc.exe Token: SeBackupPrivilege 680 msiexec.exe Token: SeRestorePrivilege 680 msiexec.exe Token: SeRestorePrivilege 680 msiexec.exe Token: SeTakeOwnershipPrivilege 680 msiexec.exe Token: SeRestorePrivilege 680 msiexec.exe Token: SeTakeOwnershipPrivilege 680 msiexec.exe Token: SeBackupPrivilege 3224 srtasks.exe Token: SeRestorePrivilege 3224 srtasks.exe Token: SeSecurityPrivilege 3224 srtasks.exe Token: SeTakeOwnershipPrivilege 3224 srtasks.exe Token: SeBackupPrivilege 3224 srtasks.exe Token: SeRestorePrivilege 3224 srtasks.exe Token: SeSecurityPrivilege 3224 srtasks.exe Token: SeTakeOwnershipPrivilege 3224 srtasks.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2224 msiexec.exe 2224 msiexec.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 680 wrote to memory of 3224 680 msiexec.exe 101 PID 680 wrote to memory of 3224 680 msiexec.exe 101 PID 680 wrote to memory of 492 680 msiexec.exe 103 PID 680 wrote to memory of 492 680 msiexec.exe 103 PID 680 wrote to memory of 492 680 msiexec.exe 103 PID 492 wrote to memory of 1208 492 MsiExec.exe 104 PID 492 wrote to memory of 1208 492 MsiExec.exe 104 PID 492 wrote to memory of 1208 492 MsiExec.exe 104 PID 492 wrote to memory of 2908 492 MsiExec.exe 106 PID 492 wrote to memory of 2908 492 MsiExec.exe 106 PID 492 wrote to memory of 2908 492 MsiExec.exe 106 PID 492 wrote to memory of 2412 492 MsiExec.exe 108 PID 492 wrote to memory of 2412 492 MsiExec.exe 108 PID 2412 wrote to memory of 5072 2412 iTunesHelper.exe 109 PID 2412 wrote to memory of 5072 2412 iTunesHelper.exe 109 PID 2412 wrote to memory of 5072 2412 iTunesHelper.exe 109 PID 492 wrote to memory of 3092 492 MsiExec.exe 115 PID 492 wrote to memory of 3092 492 MsiExec.exe 115 PID 492 wrote to memory of 3092 492 MsiExec.exe 115 PID 492 wrote to memory of 1796 492 MsiExec.exe 117 PID 492 wrote to memory of 1796 492 MsiExec.exe 117 PID 492 wrote to memory of 1796 492 MsiExec.exe 117 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\9c71b3dd94329b2649fd36ccd5f0df919126284883543cff573e103076ce3506.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2224
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1181B6BB8587C6D3F8AC4AF29CDF47F92⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\." /SETINTEGRITYLEVEL (CI)(OI)HIGH3⤵
- Modifies file permissions
PID:1208
-
-
C:\Windows\SysWOW64\EXPAND.EXE"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files3⤵
- Drops file in Windows directory
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\files\iTunesHelper.exe"C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\files\iTunesHelper.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
\??\c:\temp\Autoit3.exe"c:\temp\Autoit3.exe" c:\temp\script.au34⤵
- Executes dropped EXE
PID:5072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 6405⤵
- Program crash
PID:3652
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\files"3⤵PID:3092
-
-
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\." /SETINTEGRITYLEVEL (CI)(OI)LOW3⤵
- Modifies file permissions
PID:1796
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5072 -ip 50721⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD52ca32763a836bda6629439dfdf7574fb
SHA173df86b5c6efddef1759b803fe075f9f0414a75a
SHA256249ccc81506722721da5774e2d3718b02fa79f1a2f4024e609e6fcf1b6bedf0a
SHA512248df241c4de5fc942163ec9c447328aadaf824c4323a676b3c261027237f3cf72390a372b67c678b97ce8f62e3b92f3e218f6d29be47bb45ba604b4d7b1df1a
-
Filesize
1.5MB
MD5ce2e53da2015987538d794b04c4ae0d5
SHA16952ba24fcc3bb41d4dd03d41c56ca12f4cce95a
SHA2561e3bddd68b9dbdf728afa28a29db324b21d71fa145e6efff8d44b46f3637d9f4
SHA512ddd0d0746a180f1782cb9c13cf37992d80e2b8f3c0e043fe5ba96f80adac066de79e59d10d5e1e91e22c434eca65793efc17459ab2d6565b2fc6986c86b146b0
-
Filesize
358KB
MD5ed6a1c72a75dee15a6fa75873cd64975
SHA167a15ca72e3156f8be6c46391e184087e47f4a0d
SHA2560d8878cca08903777888b3681f90e4a07c7aef7d9600a67dfa985844d4bf5eda
SHA512256c2ebfeb42c2d3340d8bb423ef0ae48d5fb9fe5ca09c363595f51a03007482b67a777e4cae7a8194f69bc3a3fbcdb9abb5c9f92097925272431bb9d50f5c03
-
Filesize
1.6MB
MD5076ed533d27f3bd8678ab4b7015f0976
SHA1657aa4110236c4e3cfa429fc039ca49486a1ee82
SHA2563035fb3598ef2dfce3e0472c44a6c53a7c0e18b451ca58d8ad6def288d890ca3
SHA51222b3e3fc5f18e368763c1dbfd63990a5eec99a39fb6590c92fa37ff7798fe075dbaf03fc1dcae5cb4b045e300e57a55b80fe951e11325e7be7414b862015df0f
-
Filesize
1KB
MD5aa3c7462860c6b1bc755f564ab1479b6
SHA1e422ce4fde99193781eea80cfc962bf5d5e1def2
SHA256b2f084241342d2ec20b8f03144efc78e56f714136f89bb5529e0cfc015ede14d
SHA512e84d74d62c27c5addf833347a8f09c876b3e999628b5606f2f32baddd484538f15bdbcd7d89896f6cea134130ba4050a630cdbe4d7bfcc94939b65b341a6aefe
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
23.7MB
MD597d07a9befcf9d45c8f6f32f8b240c5d
SHA16cc840ce10b8eb60aa6c1250e429d5379d5aabb3
SHA256d9e58e2ec7c244054a1a9a2573351d7aa53dc2d1a89db00c4351960f0d786f60
SHA512820d523bd5cca455e353cf5c795444160749f3dca99656d3a42271de9f04d17188d579b908fd13e379f05de44fcb71e08fdce8c25245331503520772324aa13d
-
\??\Volume{e992337d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{4355b8d0-f102-45ed-a9d5-7d32ddb94230}_OnDiskSnapshotProp
Filesize6KB
MD53b05a86f9ea8b405bd70e31a398922f4
SHA163352278c039d33d5fcff3c3643ef3708927e591
SHA256f427f725f5838643c3465c09e16b108d9ee7cf1db1fc8da65e271af87410560c
SHA512320cff19d692887b46b63eb01b325f526632cafdeafe841e875c53b8192902ef8496ddfae501999526cbfe5e1f07597d60d21f653194fb48451dc3c4be7a1355
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
470KB
MD551cac8ad7fca3b404d7bb89beef8890b
SHA1ba76502def5d65af3d98569a9812bcbb4d52a973
SHA25697c6d302415978c1e3b6e336f213fc4a66c814f489604e27d277cfd259342fe0
SHA5126e7ad62e4e7cb7da412fec06885a367e82ae61f7c3658f9b36148cfe1be2cfa3270cd00a46d519b15bb62b77cdcc87eda54799bd7ce395a0d2d0627b548677d5
-
Filesize
76B
MD53f252d7956c3e1472a0f208aac6da8ce
SHA141a5e96c5ca98f5f8e78894c0ce03590c9bf6cb3
SHA2561e5385399bd1a8d6d531b820da88d0b217b863ec2e7100e1533e64605fadd898
SHA5121ab1c23095d5061f73df8569c2fb2ed235e478ffa716ffd93801d52a75e631bb0bac4cf39ef0dcd4a186460e4c93fcec4f4d6c07fa4b91d926b54a61b5b2c00a