Analysis

  • max time kernel
    101s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 05:20

General

  • Target

    resources/wireguard/x64/wntn.msi

  • Size

    308KB

  • MD5

    4f9855957a9e04023166e3619d233e26

  • SHA1

    45478661f419b425a06380c3e89f101247fc53bb

  • SHA256

    fb73b8c3034f2cf44b2a82f2820f1b6975b4e8bb63aa8b5e476063b6797174c8

  • SHA512

    817ecf32b82b2dcb5d78082e9f02e191c7d09a1c799391906aa83ad80f016f55e8ae7a5248eb5c8a3e776e4cc9b519ca0b13f03775e77893eb520080da7db76e

  • SSDEEP

    3072:q7N6bBrGsu4ldGrlmxElEmNoPl4+eDhIVJkRZ5Br/NbvcjKX5mMgQSeRocPvuocM:q7N6UWldGrlmxEDNMea+H5R/B/1lp4x

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 15 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 31 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 44 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\resources\wireguard\x64\wntn.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4236
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4904
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 671E08A8D2EED68F89511EF3D379D1DE
        2⤵
        • Loads dropped DLL
        PID:5048
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 7157B9890999041453E433AB99737A1C E Global\MSI0000
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:5044
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4836
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Windows\Temp\c56b32522ab03fc6092a1d8021082f5612d748e5c04477f8a09d83cc63e447a2\wintun.inf" "9" "444afe357" "0000000000000138" "WinSta0\Default" "000000000000015C" "208" "C:\Windows\Temp\c56b32522ab03fc6092a1d8021082f5612d748e5c04477f8a09d83cc63e447a2"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:4760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57baa6.rbs

      Filesize

      523B

      MD5

      f5403f2b4d3f2da48bf2eb323c86091d

      SHA1

      932153b0067ad54e15b0593203f2e9bdffe28fef

      SHA256

      6a2ccb0082e24e7abd2ae4a44d605704aa27d16246f8f796ec7d7e8de669923f

      SHA512

      d400580404a55e0bad6f79226017dcb764668d45bf6427e7a6d385d7ab48660fcaef38eeebf24e418b21e57d5b34f967aac2a16bda4245d76915d414bd599458

    • C:\Windows\Installer\MSIBB42.tmp

      Filesize

      275KB

      MD5

      2232c07e354364e0eb1dc80024593826

      SHA1

      65bb4232c0416cfb2c158bfc32a7732ad72cee72

      SHA256

      fb1cd5e7c3ea30dfafd3cc1862e311388361d896610db28c63716da9d71e8f3f

      SHA512

      f0d295565b209f4dedd2a79123fa54ff9b8cbb173f14463ab3d3707b8d87aad84b05c2898478ecc148e29d02fa07ddda9499795e0ceafc2982c0adbd570a3572

    • C:\Windows\Temp\C56B32~1\wintun.cat

      Filesize

      9KB

      MD5

      faba2ccb8fe366fd281ca6be6d2bb7c2

      SHA1

      bb7bd32a21f3eba652fde24146387ffc5278143e

      SHA256

      602187e5470ddbdf9421045bb0515f358c88bf88f59fd8a886fb6373da5d0f82

      SHA512

      ec424a545e2598f299706499dab07b4d12b0734a52f928216a53bca2b7f384b97bd4fc092d7d68de636a75daf79ac392c4b49b7251ec011236de1659253d6214

    • C:\Windows\Temp\C56B32~1\wintun.sys

      Filesize

      37KB

      MD5

      1945d7d1f56b67ae1cad6ffe13a01985

      SHA1

      2c1a369f9e12e5c6549439e60dd6c728bf1bffde

      SHA256

      eb58bf00df7b4f98334178e75df3348c609ea5c6c74cf7f185f363aa23976c8b

      SHA512

      09af87898528eaa657d46c79b7c4ebc0e415478a421b0b97355294c059878178eb32e172979ee9b7c59126861d51a5831e337a96666c43c96cb1cf8f11bc0a0f

    • C:\Windows\Temp\c56b32522ab03fc6092a1d8021082f5612d748e5c04477f8a09d83cc63e447a2\wintun.inf

      Filesize

      1KB

      MD5

      8480579050970b0812cc3d9a1bce1340

      SHA1

      edebebd090602f4eee375ad754c8566d4fda23cb

      SHA256

      44098408ab9611dd99a38e140c7fb1ca5dce6eb2d5f0d5e500547ac1ba5d235b

      SHA512

      46de9202c3cf0ddbf19f9e0e02ec17530f2722abfa08669fd30a6095ce2342fa89a2cc59c1d47afd82b48c915bb95f4c6d16e7c21129a9c8f09c2bf239566933

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      d24aaa2cfc3efe7dfdf63f3c3f80a051

      SHA1

      859e66f4255aca3883c1306b5b7a47003a6235a0

      SHA256

      5c6e5d8a5c669de289dccfac17474df3967a6b53adb68e2c12d1bc8010df8ebf

      SHA512

      8fcb1340ef8e5d02a096e9ce4ca910bbf6e034d78f37db7a3dc38f042d9a328082225daaf62386d546116fdc2b3d7a047170e147b677e80e13ce84e788ffc60b

    • \??\Volume{b9e6a081-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{6e56b382-0fd5-49eb-964b-6424a2e69c39}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      de0186eb0fad578505a9207490bd1168

      SHA1

      88ab73fb4ae8b83d2af2151ed1f09fabc252ca2b

      SHA256

      de0ab39b0b47ea87b98fe9a7ccce0a654e6ed38d6d9a0f789eb6741915b59a6a

      SHA512

      e9f4773273bd22f24efba3c50cc4be9b0d308b4dc662bbcb8f81d6cdac18fdb4d010fe4ad780a38bf9e7fb53a0fc64a830ff37b334364a9bd094de2925f7e780