Analysis

  • max time kernel
    455s
  • max time network
    1175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:39

General

  • Target

    setup.msi

  • Size

    508KB

  • MD5

    4c5d506168367113b3a4e6c66cd93b01

  • SHA1

    6970b2b8c0bb82e481844707c8a2965bad815d65

  • SHA256

    7ab156266c51905322bb36eb17ad85809c7b29eca210fd6e4de0c09454b33a0a

  • SHA512

    986776eb27c27949ae21df8fce533a7a36031fbf1f281d1838a6e8ff0a28f349b4340bed7969572eea3f2943edc46d587cb35be4cc953ea3e4894e3216804c07

  • SSDEEP

    6144:SveJGCndUlTIVOdtc+Hp1h/yQz+VPZspW0/9jKaSArZJsnPn:LGCndUlT4+Hp+Qz+lK1Zkv

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\setup.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2448
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4608
      • C:\Windows\Installer\MSI6429.tmp
        "C:\Windows\Installer\MSI6429.tmp"
        2⤵
        • Executes dropped EXE
        PID:1836
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57639d.rbs

      Filesize

      8KB

      MD5

      ccc8d9229569bdbbc450c8b62d708fa1

      SHA1

      0a7331393d158e7b87f028aac789c9d024f9e1f5

      SHA256

      a92d9f2c9a58c6652b0c623acc0e89eee55b612d550cec62acbbf602efc9a518

      SHA512

      e9d1fec196a8d85677ba8528df0cfd2cb3359bf3bb70223c49464b83b76b3e4e8943d725611a91770f31cbe63f71a150f9f6203f40f3a72b65ecfa17953d7bc1

    • C:\Windows\Installer\MSI6429.tmp

      Filesize

      472KB

      MD5

      f3092d2e603cf154a7cebde8e5f07868

      SHA1

      b164271ad70aecb4757f986e96d8a11bbc49da3e

      SHA256

      068a7dd7731272b56a03d4431b3f49ff9d4c190127aab6c127b5d246d7c68edf

      SHA512

      328944764b3d35bc3876f53626a85a85c3786541629b20a1e029f0500ea099c4c70de561119f692446f15b6946bbcf99babb1d93400de16d3a1a7aa20748644c

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      341d02c725a7e40a57fc68a577ae47e7

      SHA1

      989c7a49ab5f34f6ba4aa6324d282b3644261b94

      SHA256

      3f8010a9ef8a1fc2f92a4b175f2ac51fb076ab7e36462b8536fc7933fd973f3b

      SHA512

      ff1441809ead3c381acbe36216b05227f6439111b39896662900d6a5108ba124099814b9608ee55a59e5a427db45a634122d03f89adfa50c480a9fdb3576aa2d

    • \??\Volume{b97ebe19-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{2175de05-080e-43d3-9322-64c363f737bf}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      fe1ba8f84a850f5cff1ad59533572b48

      SHA1

      afd3a1be8a2e63c72aa9077f6b6331eb384e0e63

      SHA256

      eeabd61084ca785708006d1cdd872f647d4dde8b73c2a63a7f455afa85ad2715

      SHA512

      ed62a06bb464c119143621c1d89c793c6029347c253c20217d5a3d95697a5a3099c1325fb35bebde6cb53f64ffd858634ba65fe7d621a8f9e5b73637fe89249b