Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/06/2024, 01:55

General

  • Target

    1bcdbe6543f47331c7bad86aa0ed85e0.exe

  • Size

    5.4MB

  • MD5

    1bcdbe6543f47331c7bad86aa0ed85e0

  • SHA1

    66b56a3ceefabd8733b8f150eb49413802c24786

  • SHA256

    9e65842baabd299e5377703510b380bbb5e9f73feefa8ed055caea3e52083cd4

  • SHA512

    a84ad2a4ba25e12cefc59b64dc0bbe0916805d84a78bda4817ff76cfeb0ebbf8de6e0b3e3d884b1783a82129117b435f8c6cdc3298f7fff661a9428e549860c5

  • SSDEEP

    98304:G9s6efPGi9gOTXohA4sJNtxutjIeGq7tq5O8TjoIi88Q:0fefPGi9gOTXsstxwMsvz

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Drops file in Windows directory 15 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 25 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 52 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bcdbe6543f47331c7bad86aa0ed85e0.exe
    "C:\Users\Admin\AppData\Local\Temp\1bcdbe6543f47331c7bad86aa0ed85e0.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\d7180ea7753db304\setup.msi"
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2228
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Registers COM server for autorun
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5CBA330359C986C717BBB700C09153B6 C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI99B0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259431207 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
        3⤵
        • Loads dropped DLL
        PID:2448
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 86825181E1DC71F149DC429F321596D4
      2⤵
      • Loads dropped DLL
      PID:2712
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C1A74C0E71A30585AE560FAD060EDFD0 M Global\MSI0000
      2⤵
      • Drops file in Windows directory
      • Loads dropped DLL
      PID:1292
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:1052
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000578" "0000000000000580"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:1368
    • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\ScreenConnect.ClientService.exe
      "C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-dslnez-relay.screenconnect.com&p=443&s=41ce1f0e-28a3-476f-9524-44c837e18f3a&k=BgIAAACkAABSU0ExAAgAAAEAAQBxTxYaMousxklwEL5LtgfBVtBkq60%2bE574c0wbZR0wk9yjj5eeo9MP8ASHt0Zr3zFc1ZH0WA5qpTBTMYSv3BRNnqumc1a87bhHTnARcodj%2bsmK%2bmXR5jIS8E2sWhAdF%2ffVz8u%2blct%2b71hfJmXNCn4MvaP31UyFwcWuDbQm96wP%2fW7o5x17%2fNa5usknk14UZKShKCzsBBnAXTkYz9TIsFFU35Y%2bhSU%2bxR3cHEQPRCZcjNZvPbvZiVf7R4HLzXEriQEH71So0%2fEP%2bzlEd9LJ9sYvOsQLDJG4LtFTUKb0rJJ8kjUJCkcvgVwY9IQVxVz68zuNhFXYMMnvVcCBm%2bQjMpSo"
      1⤵
      • Sets service image path in registry
      • Drops file in System32 directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\ScreenConnect.WindowsClient.exe
        "C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\ScreenConnect.WindowsClient.exe" "RunRole" "cc8ae96f-f54d-4b53-9ab7-46b97d5cc258" "User"
        2⤵
        • Executes dropped EXE
        PID:2260
      • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\ScreenConnect.WindowsClient.exe
        "C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\ScreenConnect.WindowsClient.exe" "RunRole" "4d7ffb24-799b-428a-a8af-bdb821191e47" "System"
        2⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        PID:2940

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f76fecb.rbs

      Filesize

      213KB

      MD5

      af8d89fbde182972d2866a3ceb85d3db

      SHA1

      89079e035f75d68bef8be176caad908744c0733f

      SHA256

      6feaa1a91685f95757b945bf5425fbdcd83835e7cc11f3c3c1a9d19a9f8ba6d2

      SHA512

      435d623bd41bc6d46a64f8273d1f87c47ce864cedc925ded4fe03347625ab92e99862b5d0cc3d424f9b1aea6e5c1db9c347e05741b8a6418a610f27849bf3606

    • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\Client.Override.en-US.resources

      Filesize

      365B

      MD5

      61365ea5ec28909a6a9cb273e84d2d80

      SHA1

      258c8b05f27c1ca84f519a86ef328a92a9a4d550

      SHA256

      ebeb046fbeb0d51b9d8fa3a5d6f035ce6084a43b0a2376ef122181ffd3df36cf

      SHA512

      4866cdf1650fb50b791c24efa82f5f944d5cfd544fdb04764270f620147963c2fe150728740cc7a34c311967b41f87c44c2ef13a5ba8318b24d9cd94168833b9

    • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\Client.en-US.resources

      Filesize

      48KB

      MD5

      511202ed0ba32d7f09eab394c917d067

      SHA1

      dbd611720fd1730198f72dec09e8e23e6d6488f8

      SHA256

      f8398a235b29af6569f2b116e0299b95512d042f5a4cd38c98c79729a5fbdb9d

      SHA512

      f04b08938f3ebf8cfa1a1157a94da3ae4699494bdce566619afa5b13a8f6ebe556d522c064e5ea02e343b59a489343f77e3ea2bb2ea390aae35a626f41cadc77

    • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\Client.resources

      Filesize

      26KB

      MD5

      5cd580b22da0c33ec6730b10a6c74932

      SHA1

      0b6bded7936178d80841b289769c6ff0c8eead2d

      SHA256

      de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

      SHA512

      c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

    • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\ScreenConnect.Client.dll

      Filesize

      192KB

      MD5

      bddfba6105b88f0df924d41e20a43efb

      SHA1

      73a0ffb39b4193eb9db8b705b552019e91461d15

      SHA256

      a0faff6017e061386a7a161f6d97cca3e935ecf1733d2cb999d1400e60e5eaf2

      SHA512

      4493de052e1daeccf8ec4661ccfc5c369014121eb730fb8aa4cec789c5bb65b1ae74bb4928f6ea4fcc9d3359c52584b8e9c0fcd90994af493a2a48ebf5bb71fe

    • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\ScreenConnect.ClientService.dll

      Filesize

      66KB

      MD5

      d8ec66efb7ce863d68931685039c9775

      SHA1

      852c5332e22cfd720a0ea42cf69e602d397fa6a7

      SHA256

      de8d8e97fb59c4f8e5cd936e566ec9d9423d270556ce5f005bfff89ae2f45a45

      SHA512

      d1f2c8dee56f26f6a2e7ad1075cd5e23a3e6a048a4b420fc9ffe06829dee3bc677cf11098dbf1f1124b4413816728245095da68ea63bf8909ca0c0b5c3aa94c0

    • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\ScreenConnect.ClientService.exe

      Filesize

      93KB

      MD5

      1b8110b335e144860e91f5e68ccdc8b3

      SHA1

      4f1662c9f914776e22616d2619d6cd99dc4333a7

      SHA256

      dc326e95e7f778aa53f67b420c3f7621ed078ee33ef9beb62d4907e90f55a389

      SHA512

      dbd21613450f61be471bd4406847773cd96b3355b70bcb1ca74043d0ff102c0e782abd185f9dbcfb6a07fb71f490f3d500aea32056f2978cfbb106f4badb373a

    • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\ScreenConnect.WindowsClient.exe.config

      Filesize

      266B

      MD5

      728175e20ffbceb46760bb5e1112f38b

      SHA1

      2421add1f3c9c5ed9c80b339881d08ab10b340e3

      SHA256

      87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

      SHA512

      fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

    • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\ScreenConnect.WindowsCredentialProvider.dll

      Filesize

      878KB

      MD5

      ad074a74d926c9a1eb6ca18518002fc2

      SHA1

      84e20d41b39ebfd44e2e63a676a13e72725b93aa

      SHA256

      269e3b2daef210905969dab4e90384a15991af50b90ff0c31bfa462c604bffd5

      SHA512

      5025287c484628650896c3628ceab3f9633beb02f87f5dff97a43da5b58a5a44b318276359c36802daf5654fe92e89997ffebec65c8b7791ce94c61e5d33b61d

    • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\app.config

      Filesize

      770B

      MD5

      76fa7c0ab1d92f7df04e2cca28265517

      SHA1

      578462bb815e548432c96b8b48be1c668227f56c

      SHA256

      16e71446b2e94a1b6f93fb7e5d517fc6c0ba6684ed7e45b39506dc0285fc82ef

      SHA512

      d226ac210c891e1e878333c3089d9ccdd62ed9dd36f0f60202e8a7a0d441ad6c28c409726e746d68d1fd3b666a98fd9f6d3265fdaee38dfc9a8a31269b3b9ed9

    • C:\Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\system.config

      Filesize

      970B

      MD5

      4cc68160d0850367169ded4077449158

      SHA1

      a543d18daa22fddaf6d522d772cb677e6d11c7af

      SHA256

      268853ab6f3dc3307a70cd3bfd94aa63f69a127cb3208ae043269370a69b2c4b

      SHA512

      3b4913c99a223308fbdb487efb4a1e7ff7ec1785fd833fcbc70f50aacd62a35421120ec7c60fd77c38d483a0cad2618709b1bd2488b2009b29636f9b152d8092

    • C:\Users\Admin\AppData\Local\Temp\ScreenConnect\d7180ea7753db304\setup.msi

      Filesize

      11.2MB

      MD5

      e56937e03e501f668dacdd8529001b1c

      SHA1

      59861d36189996d69e1ec48a116d5b1393c24566

      SHA256

      5150f0d1142d92312f2acfc686fec2527e4e33b1826a13c81c569968df68c850

      SHA512

      015fa98bcea87cefc1067a5c06ea8755716ba99938dda2d189afcad1249c2f90f16b088328cdad74752b173d1cb4f57c1787dbf5f556150131252e88bc7cef91

    • C:\Windows\Installer\MSI205.tmp

      Filesize

      202KB

      MD5

      ba84dd4e0c1408828ccc1de09f585eda

      SHA1

      e8e10065d479f8f591b9885ea8487bc673301298

      SHA256

      3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

      SHA512

      7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

    • \Program Files (x86)\ScreenConnect Client (d7180ea7753db304)\ScreenConnect.WindowsClient.exe

      Filesize

      584KB

      MD5

      dbd7c0d2cf1bf5cec608648f14dc8309

      SHA1

      5241f5bec67a5e6ec2ee009c4f2e0f6f049841cb

      SHA256

      1145fac110c18d2cd228a545ec4fcb7d3aedd3c072b19c559d6e7067f7cf3f5f

      SHA512

      cc14bd533c63791f885dec7aeb75d4e0bc5b51299e8f09f98ccb2a03ee7877daa42768585e0b824a842a2df8e09f86ac483f970c17d6ae2d4bb4a28670a7c99d

    • \Users\Admin\AppData\Local\Temp\MSI99B0.tmp

      Filesize

      1.1MB

      MD5

      fbeb822a9e120144d376522d86f09b1c

      SHA1

      f47e309400ec9889aff31231af5dc65e3e793995

      SHA256

      5ff305d16ba9672d0ad11b0173502bacc877fa2c3c2395932473a88a7e534cb5

      SHA512

      ac41a348955802e14b279537292e1356e5978945b88cb5f8371707b59a639d5e4a360f0f669b1b0f24bd94e686897b384d73a85fff186ef761636b5654f2d30b

    • \Users\Admin\AppData\Local\Temp\MSI99B0.tmp-\Microsoft.Deployment.WindowsInstaller.dll

      Filesize

      172KB

      MD5

      5ef88919012e4a3d8a1e2955dc8c8d81

      SHA1

      c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

      SHA256

      3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

      SHA512

      4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

    • \Users\Admin\AppData\Local\Temp\MSI99B0.tmp-\ScreenConnect.Core.dll

      Filesize

      533KB

      MD5

      5c259da933c9261944afb6aa9a7e858b

      SHA1

      cad0ecb9ac68694cc601a7c980f985d9c29afa88

      SHA256

      0d04ef4b196e5ce3412e58474ff5303ccbdc0a2f32487946b382b0b672615833

      SHA512

      f7e6c778943771fa1830805021dc7e64e47a30895ab9d5bf3708d82abd2bfccaba58ca86cfed8d38c879df9e41999054838abd6b55e7dd400daec84480dc5041

    • \Users\Admin\AppData\Local\Temp\MSI99B0.tmp-\ScreenConnect.InstallerActions.dll

      Filesize

      21KB

      MD5

      23310f425a59c6d6b7d1814e84789542

      SHA1

      b45a9f3a472848f95b885c09b9856d0d0f99d391

      SHA256

      0eae8b0b1467bcf247c415f905fd72ad4a585aa04c9ba0d7fcbb9db9d22b3bf2

      SHA512

      fdbbabc0a0c65975c9f58b9f777eeb34c744177a6c244fc071a20e5224ef61cc946b2cfd2ea052b2e18ec051c385d88ff1c21db59c98c777311db289a7b7c884

    • \Users\Admin\AppData\Local\Temp\MSI99B0.tmp-\ScreenConnect.Windows.dll

      Filesize

      1.6MB

      MD5

      ab11c92301bd6b916f51eb3c6ba1f348

      SHA1

      edbcea68f4d7b06aef28a9e631fa0a5cfbb7889f

      SHA256

      ea86c15300b8cc311de257456ea8b281ab7b5f231a4fcbcff07e6f300e9ade14

      SHA512

      9a42a8f6a71f55e8f85ff97593ffa2d3935ff80142ce6a57a9a104ee6d97043cf20c29f386007929da31496e270ea9d5c0c7766d687d36d0e5523391e1b68e17

    • memory/2260-159-0x000000001B1A0000-0x000000001B34A000-memory.dmp

      Filesize

      1.7MB

    • memory/2260-161-0x000000001A720000-0x000000001A738000-memory.dmp

      Filesize

      96KB

    • memory/2260-160-0x0000000001F70000-0x0000000001F88000-memory.dmp

      Filesize

      96KB

    • memory/2260-158-0x0000000002010000-0x000000000209C000-memory.dmp

      Filesize

      560KB

    • memory/2260-157-0x0000000001E90000-0x0000000001EC6000-memory.dmp

      Filesize

      216KB

    • memory/2260-156-0x0000000000960000-0x00000000009F6000-memory.dmp

      Filesize

      600KB

    • memory/2448-43-0x0000000000830000-0x000000000083C000-memory.dmp

      Filesize

      48KB

    • memory/2448-51-0x0000000004B70000-0x0000000004D1A000-memory.dmp

      Filesize

      1.7MB

    • memory/2448-47-0x0000000000C40000-0x0000000000CCC000-memory.dmp

      Filesize

      560KB

    • memory/2448-39-0x0000000000790000-0x00000000007BE000-memory.dmp

      Filesize

      184KB

    • memory/2804-2-0x0000000074280000-0x000000007496E000-memory.dmp

      Filesize

      6.9MB

    • memory/2804-8-0x0000000074280000-0x000000007496E000-memory.dmp

      Filesize

      6.9MB

    • memory/2804-7-0x0000000004FB0000-0x000000000515A000-memory.dmp

      Filesize

      1.7MB

    • memory/2804-1-0x0000000000280000-0x0000000000288000-memory.dmp

      Filesize

      32KB

    • memory/2804-6-0x00000000003D0000-0x00000000003F2000-memory.dmp

      Filesize

      136KB

    • memory/2804-5-0x0000000074280000-0x000000007496E000-memory.dmp

      Filesize

      6.9MB

    • memory/2804-4-0x0000000002570000-0x00000000025FC000-memory.dmp

      Filesize

      560KB

    • memory/2804-0-0x000000007428E000-0x000000007428F000-memory.dmp

      Filesize

      4KB

    • memory/2804-3-0x00000000052B0000-0x00000000055A8000-memory.dmp

      Filesize

      3.0MB

    • memory/2804-10-0x0000000074280000-0x000000007496E000-memory.dmp

      Filesize

      6.9MB

    • memory/2884-143-0x0000000000A00000-0x0000000000A36000-memory.dmp

      Filesize

      216KB

    • memory/2884-123-0x0000000003AE0000-0x0000000003C8A000-memory.dmp

      Filesize

      1.7MB

    • memory/2884-119-0x0000000001080000-0x000000000110C000-memory.dmp

      Filesize

      560KB

    • memory/2884-112-0x0000000000590000-0x00000000005A8000-memory.dmp

      Filesize

      96KB

    • memory/2884-115-0x0000000000590000-0x00000000005A8000-memory.dmp

      Filesize

      96KB

    • memory/2884-145-0x0000000003300000-0x00000000033DE000-memory.dmp

      Filesize

      888KB