Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 15:09

General

  • Target

    ff06cffedc00b97f82005c9768951d0e8c18c63ba36e584aef3c7c9e845e62e0.msi

  • Size

    1008KB

  • MD5

    660df6ef0e19375001cd6988f18c105b

  • SHA1

    f6bdeb2faba1d834b39827eb90e9c8d328d32bd1

  • SHA256

    ff06cffedc00b97f82005c9768951d0e8c18c63ba36e584aef3c7c9e845e62e0

  • SHA512

    4c5c2a9dab4728a47784f23a98e578273c157eb2d49a3225202062f41b59c5d646f0cd0832b60bda8f97da071f0204ab2a27e1bc0dc1d75ac8fb65d4cffa034a

  • SSDEEP

    24576:7/9WGtBFV4aFt7u70p71YF73bPI4yXhecIWqHcI0FbbJgxkW:7ntJ42t80y73bJy8cIWq+FbbJI

Score
10/10

Malware Config

Signatures

  • Matanbuchus

    A loader sold as MaaS first seen in February 2021.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ff06cffedc00b97f82005c9768951d0e8c18c63ba36e584aef3c7c9e845e62e0.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2164
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2536
    • \??\c:\windows\SysWoW64\regsvr32.exe
      c:\windows\SysWoW64\regsvr32.exe "C:\Users\Admin\AppData\Local\EdgeTools\edgecef.dll"
      2⤵
      • Loads dropped DLL
      PID:1752
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2616
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005A8" "00000000000003AC"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f763ef6.rbs

    Filesize

    8KB

    MD5

    7ae5584bb7b27d06cd6791794c29f82b

    SHA1

    473cc4f17aef9485b581e12a0957d3f7ed647f38

    SHA256

    70c2c390fcb0bd68a0f34c4bb778a98088ec7d87279f529f59c322f5b10b51ba

    SHA512

    906bf2b2af83b36539c6a59473f17a16239c31268317670585617099d48a8984c9a34881fd8797b7694e237dd316d16a1041a6eb4c34b531ef4c8901b00fa29a

  • C:\Users\Admin\AppData\Local\EdgeTools\edgecef.dll

    Filesize

    990KB

    MD5

    e0ecf5e7d2a4656457fabeee2918ef38

    SHA1

    ca05587d9bd333a62735705ba6b3f919ea7d6d17

    SHA256

    4eb85a5532b98cbc4a6db1697cf46b9e2b7e28e89d6bbfc137b36c0736cd80e2

    SHA512

    f2dc88e57feab0dcc8ad36dd313413d4735350343573f6c8721b5cae48a8ceff393dfd9bcf327d9eb4114347ad704de6dbcfffc42aa53876ba0b017011ac9ddc

  • C:\Windows\Installer\f763ef4.msi

    Filesize

    1008KB

    MD5

    660df6ef0e19375001cd6988f18c105b

    SHA1

    f6bdeb2faba1d834b39827eb90e9c8d328d32bd1

    SHA256

    ff06cffedc00b97f82005c9768951d0e8c18c63ba36e584aef3c7c9e845e62e0

    SHA512

    4c5c2a9dab4728a47784f23a98e578273c157eb2d49a3225202062f41b59c5d646f0cd0832b60bda8f97da071f0204ab2a27e1bc0dc1d75ac8fb65d4cffa034a