Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 10:09

General

  • Target

    9c71b3dd94329b2649fd36ccd5f0df919126284883543cff573e103076ce3506.msi

  • Size

    3.8MB

  • MD5

    4b2e289610400400a87a347ac2010c59

  • SHA1

    b8ec5f89be7282a376e1026afdf68ed46753b978

  • SHA256

    9c71b3dd94329b2649fd36ccd5f0df919126284883543cff573e103076ce3506

  • SHA512

    4e1eef2cf6e355549e0eb10309e6b6efb538d88e86ff25c77c201aaff37500b7daa6489a8fef88cf93d53771fe8c80bcf16f4b71d00e3a4824fd20a615c2b0f5

  • SSDEEP

    49152:9pUPW9qhCxzT+WKjSXVRzLVI4s2kF6Wua/tB2KJP9C9/q6ZXc5vpSOCH7p76yTJF:9prCQVNLe6kcL+j2CP9CaCbp7

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\9c71b3dd94329b2649fd36ccd5f0df919126284883543cff573e103076ce3506.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2224
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:680
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3224
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 1181B6BB8587C6D3F8AC4AF29CDF47F9
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:492
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:1208
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:2908
      • C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\files\iTunesHelper.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\files\iTunesHelper.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2412
        • \??\c:\temp\Autoit3.exe
          "c:\temp\Autoit3.exe" c:\temp\script.au3
          4⤵
          • Executes dropped EXE
          PID:5072
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 640
            5⤵
            • Program crash
            PID:3652
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\files"
        3⤵
          PID:3092
        • C:\Windows\SysWOW64\ICACLS.EXE
          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\." /SETINTEGRITYLEVEL (CI)(OI)LOW
          3⤵
          • Modifies file permissions
          PID:1796
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:1492
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5072 -ip 5072
      1⤵
        PID:4524

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\files.cab

        Filesize

        3.5MB

        MD5

        2ca32763a836bda6629439dfdf7574fb

        SHA1

        73df86b5c6efddef1759b803fe075f9f0414a75a

        SHA256

        249ccc81506722721da5774e2d3718b02fa79f1a2f4024e609e6fcf1b6bedf0a

        SHA512

        248df241c4de5fc942163ec9c447328aadaf824c4323a676b3c261027237f3cf72390a372b67c678b97ce8f62e3b92f3e218f6d29be47bb45ba604b4d7b1df1a

      • C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\files\CoreFoundation.dll

        Filesize

        1.5MB

        MD5

        ce2e53da2015987538d794b04c4ae0d5

        SHA1

        6952ba24fcc3bb41d4dd03d41c56ca12f4cce95a

        SHA256

        1e3bddd68b9dbdf728afa28a29db324b21d71fa145e6efff8d44b46f3637d9f4

        SHA512

        ddd0d0746a180f1782cb9c13cf37992d80e2b8f3c0e043fe5ba96f80adac066de79e59d10d5e1e91e22c434eca65793efc17459ab2d6565b2fc6986c86b146b0

      • C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\files\iTunesHelper.exe

        Filesize

        358KB

        MD5

        ed6a1c72a75dee15a6fa75873cd64975

        SHA1

        67a15ca72e3156f8be6c46391e184087e47f4a0d

        SHA256

        0d8878cca08903777888b3681f90e4a07c7aef7d9600a67dfa985844d4bf5eda

        SHA512

        256c2ebfeb42c2d3340d8bb423ef0ae48d5fb9fe5ca09c363595f51a03007482b67a777e4cae7a8194f69bc3a3fbcdb9abb5c9f92097925272431bb9d50f5c03

      • C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\files\sqlite3.dll

        Filesize

        1.6MB

        MD5

        076ed533d27f3bd8678ab4b7015f0976

        SHA1

        657aa4110236c4e3cfa429fc039ca49486a1ee82

        SHA256

        3035fb3598ef2dfce3e0472c44a6c53a7c0e18b451ca58d8ad6def288d890ca3

        SHA512

        22b3e3fc5f18e368763c1dbfd63990a5eec99a39fb6590c92fa37ff7798fe075dbaf03fc1dcae5cb4b045e300e57a55b80fe951e11325e7be7414b862015df0f

      • C:\Users\Admin\AppData\Local\Temp\MW-8f19ae6b-4911-4000-8e92-e18900d12b10\msiwrapper.ini

        Filesize

        1KB

        MD5

        aa3c7462860c6b1bc755f564ab1479b6

        SHA1

        e422ce4fde99193781eea80cfc962bf5d5e1def2

        SHA256

        b2f084241342d2ec20b8f03144efc78e56f714136f89bb5529e0cfc015ede14d

        SHA512

        e84d74d62c27c5addf833347a8f09c876b3e999628b5606f2f32baddd484538f15bdbcd7d89896f6cea134130ba4050a630cdbe4d7bfcc94939b65b341a6aefe

      • C:\Windows\Installer\MSIFFFB.tmp

        Filesize

        208KB

        MD5

        d82b3fb861129c5d71f0cd2874f97216

        SHA1

        f3fe341d79224126e950d2691d574d147102b18d

        SHA256

        107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

        SHA512

        244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.7MB

        MD5

        97d07a9befcf9d45c8f6f32f8b240c5d

        SHA1

        6cc840ce10b8eb60aa6c1250e429d5379d5aabb3

        SHA256

        d9e58e2ec7c244054a1a9a2573351d7aa53dc2d1a89db00c4351960f0d786f60

        SHA512

        820d523bd5cca455e353cf5c795444160749f3dca99656d3a42271de9f04d17188d579b908fd13e379f05de44fcb71e08fdce8c25245331503520772324aa13d

      • \??\Volume{e992337d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{4355b8d0-f102-45ed-a9d5-7d32ddb94230}_OnDiskSnapshotProp

        Filesize

        6KB

        MD5

        3b05a86f9ea8b405bd70e31a398922f4

        SHA1

        63352278c039d33d5fcff3c3643ef3708927e591

        SHA256

        f427f725f5838643c3465c09e16b108d9ee7cf1db1fc8da65e271af87410560c

        SHA512

        320cff19d692887b46b63eb01b325f526632cafdeafe841e875c53b8192902ef8496ddfae501999526cbfe5e1f07597d60d21f653194fb48451dc3c4be7a1355

      • \??\c:\temp\Autoit3.exe

        Filesize

        872KB

        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • \??\c:\temp\script.au3

        Filesize

        470KB

        MD5

        51cac8ad7fca3b404d7bb89beef8890b

        SHA1

        ba76502def5d65af3d98569a9812bcbb4d52a973

        SHA256

        97c6d302415978c1e3b6e336f213fc4a66c814f489604e27d277cfd259342fe0

        SHA512

        6e7ad62e4e7cb7da412fec06885a367e82ae61f7c3658f9b36148cfe1be2cfa3270cd00a46d519b15bb62b77cdcc87eda54799bd7ce395a0d2d0627b548677d5

      • \??\c:\temp\test.txt

        Filesize

        76B

        MD5

        3f252d7956c3e1472a0f208aac6da8ce

        SHA1

        41a5e96c5ca98f5f8e78894c0ce03590c9bf6cb3

        SHA256

        1e5385399bd1a8d6d531b820da88d0b217b863ec2e7100e1533e64605fadd898

        SHA512

        1ab1c23095d5061f73df8569c2fb2ed235e478ffa716ffd93801d52a75e631bb0bac4cf39ef0dcd4a186460e4c93fcec4f4d6c07fa4b91d926b54a61b5b2c00a

      • memory/2412-77-0x0000024BBB5D0000-0x0000024BBB76F000-memory.dmp

        Filesize

        1.6MB

      • memory/2412-87-0x000000005D050000-0x000000005D1ED000-memory.dmp

        Filesize

        1.6MB

      • memory/2412-89-0x0000024BBB5D0000-0x0000024BBB76F000-memory.dmp

        Filesize

        1.6MB

      • memory/5072-88-0x0000000004D80000-0x0000000005D50000-memory.dmp

        Filesize

        15.8MB