Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/06/2024, 11:07

General

  • Target

    MTK Setup Yan Sanayi 2023/setup.exe

  • Size

    501KB

  • MD5

    ef88383d678def60df0ecbe0604343a1

  • SHA1

    90abf6ed361e3462ac0267b7f7845dbb1adf1430

  • SHA256

    c065398c50957b851f43f0d4a640dbcb41806f9354f22a14701c47aa0beae5d0

  • SHA512

    5d993f6286071eccba13a3854f4569893785fb2c7d6ae73cbad226d00d8e8eb3023876773e3945834c44d21f45f9dee1387caae65eb1bbc8170edb9c20e31771

  • SSDEEP

    12288:sDPdsil5fCMggBIiMVO26kk+FG9eMb01JQntLOCVMU:sD1s2ts96kTGemV

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\MTK Setup Yan Sanayi 2023\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\MTK Setup Yan Sanayi 2023\setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe" -I "C:\Users\Admin\AppData\Local\Temp\MTK Setup Yan Sanayi 2023\MTKSetup.msi"
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4692
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3864
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding CD30DA386A4C53954B55D7B8569992F3 C
      2⤵
      • Loads dropped DLL
      PID:1700
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1484
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding BF789224BA3FEF85656C05F2E117E72A
        2⤵
        • Loads dropped DLL
        PID:4164
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:4480

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\e596960.rbs

            Filesize

            9KB

            MD5

            a196892065af0408c8b3d0be53a21990

            SHA1

            42ab3db657e320dff14a3c5cb09c42a4af272cdf

            SHA256

            7739edfe1c6912c6d39dcc1029b6f18fff51f345b230c1776eee7539b31a8dff

            SHA512

            6e5cdefb09c3a0aa8559a94eace0cc5ddc009bd45c84926e113fd8b550aefce667cddadc37f88591e6aa54aceee7979da3872bed8225a70b7eaa6d8d7813d06c

          • C:\Users\Admin\AppData\Local\Temp\MSI4BFD.tmp

            Filesize

            325KB

            MD5

            f048cf239cc583f8433634acf23cae55

            SHA1

            7d3a296a05267855cc637c5bf95fe687b7a765a2

            SHA256

            4d6efad25f62f4c34998385819e46569869b09de4d8b3f1e22dc9e8f032ed3bb

            SHA512

            a021d559150338ef823b8749d95ac262ec13d9c9ed80d2d0d67e0d7690ae61713219a5edf88d83832ad673f0d7a1d306b49af4f07020c98bac2cfb006bcf0c53

          • C:\Windows\Installer\e59695f.msi

            Filesize

            1006KB

            MD5

            cd159904e090b9335fd8d172e0c05e2c

            SHA1

            0bd03e10d9a2b9bbac01564443298995a6b54157

            SHA256

            36dc8011068857dee3ffbd9322bca6901623ffe7d49fa5b2d70d116fcb895e69

            SHA512

            b0e95fef2cdeecccde5ee90b5fa8c4a043cc543960f76e85b36c9cf5b0a7a08c2a3e9bcf6948512c6353ca1a56a85f62385e779b55b2db170a3aa68377c0e991

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

            Filesize

            12.8MB

            MD5

            95113f73bf3d8675a7c8c6aa17feec03

            SHA1

            364594b97bbecd00e64e804ad42bf097756c9b03

            SHA256

            0ac96a03b984162f36318e77ea4d2daa278dac23acea41f7cccf756abeeeb692

            SHA512

            4aebcea8ab1300992968d11f2327ef63a3076c86dd226d8ce918bbcd87512dddff59cc3df347bb9424ab32fcfb192a69192555e879713dcd6b72747f51b3086d

          • \??\Volume{2e737fee-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{b9d9bbee-e25e-4f55-b4fb-ecf868d17149}_OnDiskSnapshotProp

            Filesize

            6KB

            MD5

            b51a56fe79728b5b890a8018fd6b3f08

            SHA1

            95791c8ea3e4d9cb8f97a34626ba9acbabe147df

            SHA256

            ac31fe595b7b189db927bea53cba2af1e5c01f3a8ed4db5748cc3e9accb7f8b4

            SHA512

            e21454bafb277885d47d1f359a3db13ac7289a1f2bc98ea9fe589d5f990aba26c1f10e00e8c83cda005066c114c5f81e0097e2eb9c6b75c88b504bf538b86146