Analysis

  • max time kernel
    276s
  • max time network
    269s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 15:06

General

  • Target

    CyberSpike-Setup-V1.2.8.msi

  • Size

    70.7MB

  • MD5

    a1f44ab3a671c97af4be10ea09eac393

  • SHA1

    d226a85cfa5b744e94e52abc9341173287c4104a

  • SHA256

    ac14ef2a4ee7b383bad45efa5030034394876013c7258d179e5f1657eeff39bd

  • SHA512

    092b3f17b3f75d402979535b10042eb29ad113eb3246c70f23f945d63da60cbaf2f117d6228543baa0c4fb5bdc3f80972ad88817a4bb2cc877e8007e71efa2e8

  • SSDEEP

    1572864:sUJZMWWS8KaAkws3GmoAcHIhHEc2PsoNWL1eDj+0QV2qS/MdMC9NRNl5NS:h745AkwsFNEDnNIeH+LV2FsMCXN

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 47 IoCs
  • Drops file in Windows directory 10 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\CyberSpike-Setup-V1.2.8.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1772
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 7F2ED1EE324A6104F9D0D68B2E653F27 C
      2⤵
      • Loads dropped DLL
      PID:2860
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4728
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding D2C7D7E3029EA2E125D7146D7C8E0CD7
        2⤵
        • Loads dropped DLL
        PID:2892
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57bc6b.rbs

      Filesize

      32KB

      MD5

      e8dc80951c68bf02d326a72726a9ce4d

      SHA1

      f4bdcde8a8ba49b1bd0f9c53aa6918c32ed93d3e

      SHA256

      0ca4e8d2195776dc839389f9b6306dcfc2441ac96656a409ee9d20e2e3ccc166

      SHA512

      4edda9ed27d7ca9f3e90198cf93430ec68bfeb96bff5e18e11616a2322bb9446a08cb18df4406f2009e87a8027c81660cc2f375349e8501c7f39ee71be68e3ee

    • C:\Program Files (x86)\CyberSpike Studio\CyberSpike\Plugins\System.Management.Automation.dll

      Filesize

      6.1MB

      MD5

      4e83c528d307d3b5da2aed5abbe3ffe8

      SHA1

      2e84ceccecb30378f84be898711f15b4e157e045

      SHA256

      0208b783efaf3854f07a31f9bcbb46f9afcd80b12e2ddb8001a9faeccfc2d0f0

      SHA512

      378f75db718891fd214776d7d5a2bad0c493dcf5c4413308554d2fe3283170aef55de1ff4bdbc0d417e5bef4f6acd3370c48bb33c37f360a606baeff12e6f72a

    • C:\Users\Admin\AppData\Local\Temp\MSI57A5.tmp

      Filesize

      285KB

      MD5

      b77a2a2768b9cc78a71bbffb9812b978

      SHA1

      b70e27eb446fe1c3bc8ea03dabbee2739a782e04

      SHA256

      f74c97b1a53541b059d3bfafe41a79005ce5065f8210d7de9f1b600dc4e28aa0

      SHA512

      a8b16bc60f8559c78c64ca9e85cd7fd704bba1f55b362465b7accef1bb853d1c9616995a35f972256c57fbe877ce880398ba1fbceaa658604883aa12dcbc4f57

    • C:\Users\Admin\AppData\Roaming\Microsoft\Installer\{003B9766-E418-4C8D-9945-7D37225CAD95}\_57A0FCAA677BC563120477.exe

      Filesize

      66KB

      MD5

      04525535dd0b6a0206afe4fb3fa5c829

      SHA1

      c4829cca26792a27811980bdb1223b924b6e90b0

      SHA256

      bac4051d19a839ada5493c61aad6809fa585c9165da1067053bc5932efead0b7

      SHA512

      f8417d3f873119a2f7578c79988f293e44c6778c9d7037f875e3f1460a376ae2a964b92a8102ebc28f0d9beab1a4a785756db59955d236fb362ba40310deba6f

    • C:\Windows\Installer\e57bc6a.msi

      Filesize

      70.7MB

      MD5

      a1f44ab3a671c97af4be10ea09eac393

      SHA1

      d226a85cfa5b744e94e52abc9341173287c4104a

      SHA256

      ac14ef2a4ee7b383bad45efa5030034394876013c7258d179e5f1657eeff39bd

      SHA512

      092b3f17b3f75d402979535b10042eb29ad113eb3246c70f23f945d63da60cbaf2f117d6228543baa0c4fb5bdc3f80972ad88817a4bb2cc877e8007e71efa2e8

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.0MB

      MD5

      7df8394fa38242a468476b00dbd825db

      SHA1

      b88c18cc7e8319dcd53d9156861225a06c035ea2

      SHA256

      1ab031c493e65eee694867bfbcdd211ca8b5aa4befc78d68b81d7d01f5499da3

      SHA512

      3dc75357ac819081e39343dcd5656695a4ab45458ac093cd6edd270528c149f238439d862d25c8c66179a7d6b4595ca1e33742ca09853a2af58c97cd4b304763

    • \??\Volume{14f6f45c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{1d86d1c3-dd52-456a-93e9-af065ace048e}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      76f1be90b8997796509edd5b2bcbfe24

      SHA1

      dd5b71316f84f9e0989ce8686d8956a09411ce95

      SHA256

      d4c6391d53cd807058097f706d9cf0589057cf85583debfd35198f5cb9c3ef5c

      SHA512

      70502b5bc71cd435508c17ff13498b3cb164d95699a2e9640008cb09c56612aad4054410d4ee2f352bee26c10d7f83b39ef0e53447b07216cf2b079840ea8f6b