Analysis

  • max time kernel
    90s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23-05-2024 00:13

General

  • Target

    setup.msi

  • Size

    508KB

  • MD5

    4c5d506168367113b3a4e6c66cd93b01

  • SHA1

    6970b2b8c0bb82e481844707c8a2965bad815d65

  • SHA256

    7ab156266c51905322bb36eb17ad85809c7b29eca210fd6e4de0c09454b33a0a

  • SHA512

    986776eb27c27949ae21df8fce533a7a36031fbf1f281d1838a6e8ff0a28f349b4340bed7969572eea3f2943edc46d587cb35be4cc953ea3e4894e3216804c07

  • SSDEEP

    6144:SveJGCndUlTIVOdtc+Hp1h/yQz+VPZspW0/9jKaSArZJsnPn:LGCndUlT4+Hp+Qz+lK1Zkv

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 13 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\setup.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4088
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4864
      • C:\Windows\Installer\MSI5DE0.tmp
        "C:\Windows\Installer\MSI5DE0.tmp"
        2⤵
        • Executes dropped EXE
        PID:1776
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3284

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    2
    T1120

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e575d25.rbs
      Filesize

      7KB

      MD5

      018116ebcb77f654e23d41907716235c

      SHA1

      e9d03bc2faa5aad22851c5cdc19c626bbcf5ffe1

      SHA256

      6dc5ae10e288467f71393fc3b6779f35495feb5a27fb4eb5e0b683e73142b28a

      SHA512

      ed208a9ca17fb0eb92b69be0d972a10059f344615ec838ca04557e4cc470a6f3e5a01456270af1c0cf7c2bb7298d93c1165fda15ba31db6fe71ee19d7cc0db98

    • C:\Windows\Installer\MSI5DE0.tmp
      Filesize

      472KB

      MD5

      f3092d2e603cf154a7cebde8e5f07868

      SHA1

      b164271ad70aecb4757f986e96d8a11bbc49da3e

      SHA256

      068a7dd7731272b56a03d4431b3f49ff9d4c190127aab6c127b5d246d7c68edf

      SHA512

      328944764b3d35bc3876f53626a85a85c3786541629b20a1e029f0500ea099c4c70de561119f692446f15b6946bbcf99babb1d93400de16d3a1a7aa20748644c

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
      Filesize

      12.8MB

      MD5

      0110b5cf55b79aea38607e7be904a6ab

      SHA1

      60df987ad765c0c5621714545c6d673a9efc1b61

      SHA256

      6d5ee7f054fa736f9be1c94c3175dc79fff09489eae502dc2e88d07e171c5a7e

      SHA512

      c5eb358e58340134566d40ab9615803bc2982b0f7f046ad86806b33141a80fdd8cc665709d9496cde27738b8dab09408662ea38899a54bd8b7b999a0f856d9a7

    • \??\Volume{453a990c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{fa5f4e7f-9536-4a0b-8133-5ae42581a747}_OnDiskSnapshotProp
      Filesize

      6KB

      MD5

      1a0dbf36052d4dab778411a0f05b5494

      SHA1

      f5879c338a6854565dae061d90fdd05c23184353

      SHA256

      bc2641a4eec845a37508429f15920800e0d0767ebc0a35998b7c7d32e92a54e7

      SHA512

      0546efc1456413fcd42e347fc4af51299e3cd204b011aa75f825126615c31230d219c5589128b56dec1e11f11a4e3817f5738691dc9f429907b4d2f6344848d4