Analysis

  • max time kernel
    91s
  • max time network
    129s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15/05/2024, 15:03

General

  • Target

    vddinstall.bat

  • Size

    420B

  • MD5

    ee1bfb5ccbb3949e3258155e141a68a5

  • SHA1

    b79dd1e75e3e7acd8d21d7b17c86673a6c6383d9

  • SHA256

    1e7c35eb6c296f96aee5ae4bbbd40395e8019bde95ef9bef91260dd8ef03c6d1

  • SHA512

    b37d680f5dab52536926c718eb1b4c1f0e78552c061756f998e3a3ccb2dc4fbea15dd1a4b181646a68a2987a22ce225c185c2ef2bb1d10a70c780ada8cf9f9aa

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Drops file in System32 directory 16 IoCs
  • Drops file in Windows directory 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\vddinstall.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Users\Admin\AppData\Local\Temp\nefconw.exe
      .\nefconw.exe --remove-device-node --hardware-id Root\Parsec\VDA --class-guid "4D36E968-E325-11CE-BFC1-08002BE10318"
      2⤵
        PID:1132
      • C:\Users\Admin\AppData\Local\Temp\nefconw.exe
        .\nefconw.exe --create-device-node --class-name Display --class-guid "4D36E968-E325-11CE-BFC1-08002BE10318" --hardware-id Root\Parsec\VDA
        2⤵
        • Drops file in Windows directory
        PID:3744
      • C:\Users\Admin\AppData\Local\Temp\nefconw.exe
        .\nefconw.exe --install-driver --inf-path ".\driver\mm.inf"
        2⤵
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:3388
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{a5c7bec9-b342-9342-95bd-12944116c5e8}\mm.inf" "9" "484386e17" "0000000000000154" "WinSta0\Default" "0000000000000164" "208" "C:\Users\Admin\AppData\Local\Temp\driver"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:1776
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "2" "201" "ROOT\DISPLAY\0000" "C:\Windows\System32\DriverStore\FileRepository\mm.inf_amd64_615d17457058f652\mm.inf" "oem3.inf:*:*:0.45.0.0:Root\Parsec\VDA," "484386e17" "0000000000000154" "c73"
        2⤵
        • Drops file in Drivers directory
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:2740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\{A5C7B~1\mm.cat

      Filesize

      11KB

      MD5

      1fe1fc7cc73fb17e995d65835d51ca94

      SHA1

      249acf0a3a362b2163127bd76f6d4d6aa463297d

      SHA256

      136e64ac07dce5a3b4935d5a9c5cfe03983c0b3065f46a30a45536d5b1681d5c

      SHA512

      31fe1bdcb5f243a6eecc40006fc70793bc5aea9d95ffe449117cb67366f0f120c393716ffe93b65a73c8b2dfe02917f1d0dcf4ca62aa302fe685513b8cc80bdc

    • C:\Users\Admin\AppData\Local\Temp\{a5c7bec9-b342-9342-95bd-12944116c5e8}\mm.inf

      Filesize

      4KB

      MD5

      d8030afe09a2f984be00389b31f7039b

      SHA1

      ab7a55fa6641cc31b0b7e70c8680bbbd553fc8a1

      SHA256

      34da9ff45c13577631f67e33d11b8a26e3d22ca685d00c388b6122a795800588

      SHA512

      0787e9e95369686b20bcbddb9ff984111c4ed53a064fc8f198691db5c124dfbe1b1f4d434dbfd81482545b723c01325ed9bcc626f461191b3ae4095222df10a6

    • C:\Windows\System32\DriverStore\Temp\{8b0fab59-34aa-b849-9d78-1fa4b2b99fb1}\SET3BB2.tmp

      Filesize

      169KB

      MD5

      f09967cc8cc9bf03612ddecb6bf86daa

      SHA1

      166f8e3000b6a1e2b13b46e85b7559b9837b9aa7

      SHA256

      96db6ae2f950b56e52be3e68f92893afa94645eae09fea2abd5dd1985758150a

      SHA512

      190d2edea81c42a2d7a5bc69cb98f03368e702a5fcb3fc1dcd4e9c387687bab542e4b0e5de67292e8b8a7efed7fd9e30d1efdd35bcdfea28417de71db0e13864