Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-06-2024 12:21

General

  • Target

    Visual-C++/vcredist2005_x86.exe

  • Size

    2.6MB

  • MD5

    ce2922f83fb4b170affce0ea448b107b

  • SHA1

    b8fab0bb7f62a24ddfe77b19cd9a1451abd7b847

  • SHA256

    4ee4da0fe62d5fa1b5e80c6e6d88a4a2f8b3b140c35da51053d0d7b72a381d29

  • SHA512

    e94b077e054bd8992374d359f3adc4d1d78d42118d878556715d77182f7d03635850b2b2f06c012ccb7c410e2b3c124cf6508473efe150d3c51a51857ce1c6b0

  • SSDEEP

    49152:rqGRIgg2SirwkF9xdtb43lyGKCafpKkiwnaDahmPzpY4FPyaza:rxxLFfY/KCCpKk9aWMzZyau

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 57 IoCs
  • Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Visual-C++\vcredist2005_x86.exe
    "C:\Users\Admin\AppData\Local\Temp\Visual-C++\vcredist2005_x86.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec /i vcredist.msi
      2⤵
      • Enumerates connected drives
      • Event Triggered Execution: Installer Packages
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1584
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4316,i,15721081447618313297,6839074028983272033,262144 --variations-seed-version --mojo-platform-channel-handle=1336 /prefetch:8
    1⤵
      PID:1312
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
          PID:3644
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 10E107E16844B06C83622CBC032A10F4
          2⤵
          • Loads dropped DLL
          PID:1636
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:1736

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e583b32.rbs

        Filesize

        73KB

        MD5

        a4dff0b05a516b7bdf17f8eee5b1a3cc

        SHA1

        32f0b19cebc29bb0eac4f55553b0c18c97c862ed

        SHA256

        6dee579a4c04ec968e095bb7565515408f86259dd2a3681a42ce3384d20a331c

        SHA512

        279d501492c840d41de2c412e95b0ac87dcda30aeee9f9b7ec40a9cd744ae9332c4b30ffe670ea3dbf6dbff1694ae66f1897518f5bd8316df648b0ff757591ee

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredis1.cab

        Filesize

        247KB

        MD5

        cc064d4b81619991de8131a86ad77681

        SHA1

        88d80d86cc20c27d7d2a872af719300bd2bb73f9

        SHA256

        913ee5a1cae3e5a1872b3a5efaaa00c58e4beb692492b138f76967da671b0477

        SHA512

        5aff0eb26cfc187bf58721b2b6d73357d9f1e66d1ac5340ad9ddc08b40ad0eda27a144cb3b650604637a7476c282ded83ed890de98a73ccaf0cc021da3a9eb25

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist.msi

        Filesize

        2.6MB

        MD5

        b20bbeb818222b657df49a9cfe4fed79

        SHA1

        3f6508e880b86502773a3275bc9527f046d45502

        SHA256

        91bdd063f6c53126737791c9eccf0b2f4cf44927831527245bc89a0be06c0cb4

        SHA512

        f534bc7bf1597e728940e6c3b77f864adfaa413bb1e080458326b692b0f96bddf4fbd294eeed36d7764a3578e6c8e919488bbf63b8fe2d4355ab3efd685424a4

      • C:\Windows\Installer\MSI3F85.tmp

        Filesize

        28KB

        MD5

        85221b3bcba8dbe4b4a46581aa49f760

        SHA1

        746645c92594bfc739f77812d67cfd85f4b92474

        SHA256

        f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f

        SHA512

        060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.7MB

        MD5

        64e058b9e96cea74a9d4aab4b0e53b7c

        SHA1

        5308fec26562ebe7034c3df85039b66c780b256f

        SHA256

        600278ff7b585a59c88aec8d046de03fa06adad91b8edb1dc253c83b7c3306ec

        SHA512

        aa88947b8a2603134bbad9a955ca9fa5eb8d88761b17e97b0bf6eaca82fdae9e68b885a975781122bad5effd004c0bb9c9f3dae3a248ae237f2bc4b46823189a

      • \??\Volume{8a2ad7b7-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{9a9d77f8-5fae-4b74-b239-b0ae3a0ab320}_OnDiskSnapshotProp

        Filesize

        6KB

        MD5

        174d669bb1fd8a5a559051aa4f5143b5

        SHA1

        c599db72d6607574268d515f7b7d3eeeeffb24d3

        SHA256

        3e37e0d198cffdaf20fed0baf44f356ede58a549dfe476df05a27287850e994b

        SHA512

        96fa95aac94117ad5645abd7e18d6f16a97370323a2fcbf8d3e457e540df9623129f295280738b61174873c138b00fc3581d1c5fddbb0baaf0a34b9029c52ebb