Analysis

  • max time kernel
    154s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 13:54

General

  • Target

    2374fd5d049c1b8f1b7fd3115f035e9f154b1f04e1cc276507930811fe349399.msi

  • Size

    2.0MB

  • MD5

    b13b0cf148e3a25cbad37604956df69d

  • SHA1

    b7136c309dd803a1303c6d93c1aafebb00e1b6bd

  • SHA256

    2374fd5d049c1b8f1b7fd3115f035e9f154b1f04e1cc276507930811fe349399

  • SHA512

    af79999ff2b12d6fd32fd0fdaf0a69b23f5ad196035d9a521ff959960c29a9ee7a2dd781f8e5cd1b82677554afd370d97bb17d4434e177cc4ef215df08fefd49

  • SSDEEP

    24576:fBlIwwkElBoKQs8pRUm6rPtWYW/x91J8/k:fBmQEjoY8Xbm

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 13 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\2374fd5d049c1b8f1b7fd3115f035e9f154b1f04e1cc276507930811fe349399.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3280
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3612
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 0D2CA9A5BCABB71CFA79F04587379EF9
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:892
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSI347F.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240793031 2 test.old.cs!Test.CustomActions.MyAction
          3⤵
          • Checks computer location settings
          • Drops file in Windows directory
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1304
          • C:\Windows\System32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\tmp3E14.dll",scab
            4⤵
            • Loads dropped DLL
            PID:3656
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:5080
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:3464

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e5a3347.rbs

        Filesize

        8KB

        MD5

        224860528d5673cefcf3b70dc46b7205

        SHA1

        7b95edf06725447b45e041cc89f026d8371d1cd5

        SHA256

        fe388f3dc394a6ca873d7485928d67ee555e2a2c610720b48e3029ae1f0a169e

        SHA512

        2ae80458732b74702f0560769d883657f6dbef7dcd844dc8374d047be0897b0af6bd74734325940398b5d89caa9328a76cd1c592a2f6f15e873702be855cd9c8

      • C:\Users\Admin\AppData\Local\Temp\tmp3E14.dll

        Filesize

        1.6MB

        MD5

        986c2e054d91a9466fbfadf0a5e22168

        SHA1

        583dd35705afedf2d068f3477b481fc9654ec6b7

        SHA256

        d51d38f49f7b810bccd6a41159e8e5142aceff1d6be775a34c2c7c54eda192d9

        SHA512

        9106ae09b2732a2a9c8164fef5d5fc4f2c673a6fb6615a6269a286a24c0d4e3118575f05b78fdfd999540efaa2e09df5ec384b705716f059aa02d21b924286a0

      • C:\Windows\Installer\MSI347F.tmp

        Filesize

        408KB

        MD5

        0421886125b50123188287996979264e

        SHA1

        a7a3015012a668d35d9375a91ebc06ead1903477

        SHA256

        63de2da6690ec48231b10585e8eeb1d320925568d55ed8de22e6cfdbb197ca2a

        SHA512

        4cb61236b634ee1ddd44e192fbba24a47b1f6f8abefa758e7e804e5d1e3fba79396e2d65a5f8cd5dd1dc56c60415ed4d8d586a752491c056b3d6004724764eb5

      • memory/1304-24-0x00007FF9D3C80000-0x00007FF9D4741000-memory.dmp

        Filesize

        10.8MB

      • memory/1304-27-0x00000233B3AA0000-0x00000233B3AB0000-memory.dmp

        Filesize

        64KB

      • memory/1304-30-0x00000233B3AA0000-0x00000233B3AB0000-memory.dmp

        Filesize

        64KB

      • memory/1304-31-0x00000233B3AA0000-0x00000233B3AB0000-memory.dmp

        Filesize

        64KB

      • memory/1304-32-0x00000233B3AA0000-0x00000233B3AB0000-memory.dmp

        Filesize

        64KB

      • memory/1304-29-0x00000233CC070000-0x00000233CC0E0000-memory.dmp

        Filesize

        448KB

      • memory/1304-26-0x00000233B3A50000-0x00000233B3A5A000-memory.dmp

        Filesize

        40KB

      • memory/1304-44-0x00007FF9D3C80000-0x00007FF9D4741000-memory.dmp

        Filesize

        10.8MB

      • memory/1304-23-0x00000233B3A70000-0x00000233B3A9E000-memory.dmp

        Filesize

        184KB

      • memory/3656-47-0x0000000180000000-0x00000001801A1000-memory.dmp

        Filesize

        1.6MB