Resubmissions

20/06/2024, 14:28

240620-rsy5sswgjq 9

20/06/2024, 11:28

240620-nlc27sygrl 9

Analysis

  • max time kernel
    163s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 11:28

General

  • Target

    CncSimProSetup3_2.exe

  • Size

    118.0MB

  • MD5

    b37448f063619a786605e964d1f7aa23

  • SHA1

    78f41f9513d21c37d7fabc3a722ecc72a220c89a

  • SHA256

    75fe48123ecf5b2710630f93490d5ed81f27b02239c84fe03ea8ed747b6263ad

  • SHA512

    10f2de05fce245ec4362b6bb73f7080e96c6ad26d2d652bdfc32ae513bd27df9ee9d141f33b3e7c7b5e84f430786f7c97d2fa7b1d3b228a599d62a458f293e4b

  • SSDEEP

    3145728:PcCOv2JvF+rEoQC8CcgJq6K1Ghq9Nzfd0IZ979omO:ECekvF+rEoQC8CcZl59PZ9pomO

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 14 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\CncSimProSetup3_2.exe
    "C:\Users\Admin\AppData\Local\Temp\CncSimProSetup3_2.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3660
    • C:\Windows\system32\msiexec.exe
      /i "C:\Users\Admin\AppData\Roaming\CNCSimulator.com\CNCSimulator Pro 3.2.0.0\install\CNCSimProSetup3_2.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\CncSimProSetup3_2.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\" EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2744
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3420
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A86D3DDA84C394AB286197D2E0838C35 C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:5100
      • C:\Program Files (x86)\CNCSimulator.com\CNCSimulator Pro\CNCSimulator.exe
        "C:\Program Files (x86)\CNCSimulator.com\CNCSimulator Pro\CNCSimulator.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:4648
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2188
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 4BF83BD334EB8F4F910CEA7DCA05D63F
        2⤵
        • Loads dropped DLL
        PID:1500
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:3388

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\e57e446.rbs

            Filesize

            88KB

            MD5

            c13559db00013831de97c98e0700c683

            SHA1

            038a72d5d111f66cb9b0edd278fdbaccfb72b3f3

            SHA256

            50ad68f72b604e8ea4c237f85aa2a840eaed2ce137e18e2b8529a9dc97cb6769

            SHA512

            ec34b1d003e0585e2bb49c18a02936e5c05ede8e11d0d1a24c4c7fd5c9843b61bffdbb3c374dcb1fecfcc96ad22276b52341875608b352f9bf7be7cc816de24c

          • C:\Program Files (x86)\CNCSimulator.com\CNCSimulator Pro\Blocks.dll

            Filesize

            412KB

            MD5

            605a72ba6f7a72ddc59c60c407c03292

            SHA1

            74aa9038e61101294ca85f96ad099efd329d88ad

            SHA256

            1bb0cc0c0c1e82c4f757e1caae3191d33e07fbb65915ad09b94a7da7279eb81a

            SHA512

            b8c2917115c46c878d5b36c5fb5e57810f0aa0e574f4aa5525e7c7a394b28366447a06deb2792f73b7838f59d557affbdc89d4f35033a09917b384e6f9013d5f

          • C:\Program Files (x86)\CNCSimulator.com\CNCSimulator Pro\CNCSimulator.exe

            Filesize

            23.4MB

            MD5

            68f5d9a1802b0b26bae6f4b62980be87

            SHA1

            197c795b1e33f1ca50610f87be491c52e956cf5f

            SHA256

            03f8b2c389b98aa0bf8e3548a45d86964b3a0a8345f8494226d0d6406c8b89fb

            SHA512

            2810636807b43bb096ddbff005ab5878521fda4681bc80438f9186e15035747ceb490d2203f8b55125d6ff433ff47405b8bbe187eb467e400e3520e4ee28388d

          • C:\Program Files (x86)\CNCSimulator.com\CNCSimulator Pro\LatheTools\ToolDefs.simcam

            Filesize

            52KB

            MD5

            827900d9204c3ab0a63bb3600fe1087d

            SHA1

            05ad5eacbe4755b0b5a27b3da3c22309784e126a

            SHA256

            934decb6730191bcedd1fc9811129484f33fa4ba9e74baa5e8ccc4a004536154

            SHA512

            8144212748162d3c20306391af68332f4c245d53eac7341fb9eabcfc71bfaba17554b0d364441ca6765d07d87cdf4b1eb360cda875f0f84f893f6d9230bab4be

          • C:\Program Files (x86)\CNCSimulator.com\CNCSimulator Pro\Misc\lighting.defs

            Filesize

            2KB

            MD5

            60545cb036db79cfd9c616cd889866a5

            SHA1

            8f047b4eb5da9fda92a126bc6a5ebd0842b9caab

            SHA256

            792355723a91e94cd0868f68637e99018470066a7cf3fc3fa82d4e09946c9cd5

            SHA512

            10945d8fc5911113511312d1eeeb09475c16077033089d0dd54b7df1e8e9780e0b3a84657d894942493fdec7a5e134562d076feee7642c61c2d8f911a60af271

          • C:\Program Files (x86)\CNCSimulator.com\CNCSimulator Pro\Scripting.dll

            Filesize

            328KB

            MD5

            906d7ee527adc8f3ea539e3bfab3e9af

            SHA1

            bdd18cf7945574760b7f1e9c1cb41567c855560f

            SHA256

            d1bb262dabfbf85515bef48ba08d4bc482ddbdb585d57f905c636c28788f4058

            SHA512

            ab029b474bfedb1cb984e222b4759ba85e01b7cdaf05b8ecc7368c17961ad20df48dc74cd1db063c22c5422dc6e5644a839098a615a6b7d05bb3aacc334053d6

          • C:\ProgramData\IsolatedStorage\hdrokpd0.imq\nvvn3mvo.wp3\StrongName.grtodwwjivz0qvyei05pa5gmrvobafpc\identity.dat

            Filesize

            516B

            MD5

            b8022ba3cd19a563183e3f38c45cf6e1

            SHA1

            fa6f1c0cca84ce2abfb2dc0f2ad947106b4f5e35

            SHA256

            cef30736d4bb592484be891f24e50fa812d3df1122521a4f482947bb22d997bc

            SHA512

            a9586b9afae4ca330a708904cbf462bf9ab88dee6e2a96d2bf8dbae89ded7572e5250f4a5fea9d7626f14ea6e19cdfa8a4b79325286dff4fcc079a94d1950d2f

          • C:\Users\Admin\AppData\Local\CNCSimulator.com\CNCSimulator.exe_StrongName_k0pezz2pb0o02mipejfbza32bg1u2gl0\3.2.0.0\user.config

            Filesize

            1KB

            MD5

            af6151bb31d68f2a3ef5859773a5fec4

            SHA1

            aacb88223aa131bbfeac4046f920bd1a4189ae79

            SHA256

            9655a40f9f5cbe85222e89095c71c22ec726dfb03648bc62a1907ad8b7748450

            SHA512

            0f5495b0a8ed7c76b18cec1a4c206f15fe5b8c69ed59875e86c8f358f07c959cae99fbd4e0d738f99d8442bc8807d18d434bba60fbe3101ebad0cfa0022e41f2

          • C:\Users\Admin\AppData\Local\CNCSimulator.com\CNCSimulator.exe_StrongName_k0pezz2pb0o02mipejfbza32bg1u2gl0\3.2.0.0\user.config

            Filesize

            1KB

            MD5

            eecdab44e28bba8561aaab759b16d3b4

            SHA1

            6fb957edda43474ec5d0fb36161d232d56f711af

            SHA256

            ac9fe1e2d9f85c1aa42857bba7293da4b6ccdf944d26b65324c8bdd7241077dd

            SHA512

            858a8f8b98a0fa10302b7a19ca4327c519dde5d1eae3121d257cb9c8d1102161c5839652574d7c920cde90c2a76c206fb849b322944d15775370932435328df9

          • C:\Users\Admin\AppData\Local\Temp\MSI7A7F.tmp

            Filesize

            69KB

            MD5

            dcdec2468aa75959f674ccc8dc048c67

            SHA1

            35a7c0e2a8343a30b6962e73b6c8a6deeff91a9b

            SHA256

            5964196cc4374474b0c8b1d664bd661816f3094c5f93dd9c830a542252e4672e

            SHA512

            82851ae0e64dcf70da02b6e0f60cf1e30aa0e20a4b0e9f8721645430af897baf4392944432b54247ff06ab90ec231250679c3f61a8f49fed8d89d3083139a127

          • C:\Users\Admin\AppData\Local\Temp\MSI7C46.tmp

            Filesize

            264KB

            MD5

            3634df76c7dc74c8736391fb6ae01dcf

            SHA1

            4059c792d8777c9c4b04f7d2b9f7e69d90e70b61

            SHA256

            82c01150821e8274141e77e5dc5926e33d19e12f195e679fc4dd51b07e508eb1

            SHA512

            fbba4a43a5b8eba8a4d0730ea4014f720c3cae92860fea2a9698dafaefd7319358a48501d6363b320e539550a3f897e0e5d23a5a0e5a0925b846e4488d9ce808

          • C:\Users\Admin\AppData\Roaming\CNCSimulator.com\CNCSimulator Pro 3.2.0.0\install\CNCSimProSetup3_2.msi

            Filesize

            751KB

            MD5

            bd4c301ca43735305c739fe69d9bb90b

            SHA1

            38a311dfe30357fe6db76d2761e058f397c00497

            SHA256

            981ae8ac08144e3ec90e6b462efb5de71d240fdfa362ae502dac21a41d26a307

            SHA512

            8b6c05060db1aa0119c932885dcb43d116cf1abedb139cf00ecf23304ec722299bf56dfb4dac0e1b20443b0a1fdf78026fcf4cac9a54a2e2b196744fddbc1c31

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

            Filesize

            23.7MB

            MD5

            097494d4095eb83cd8acf2f11cd93b57

            SHA1

            aaf7cd614b6f382cfa0bed8521f2a7ac497d137f

            SHA256

            59ee32ad1076aca6c43100008ff14fb36e29a3834478de33f4ce5c850461bd4f

            SHA512

            52e5543ea3e8332770128cf23c4cdb55abca2421183c2caabc3345bd108189991ff286fe4b6043c43d41fd376708f32131a17fc95e7b08578d4edc2df94b3355

          • \??\Volume{2497e243-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{00da9a7c-aa5e-4f90-af9c-183152cdd6c8}_OnDiskSnapshotProp

            Filesize

            6KB

            MD5

            2dee4c22e3efac6bbe001b5ae0529f81

            SHA1

            fddaff1f7a0f170b547190de2a107dbf22448c73

            SHA256

            091967c66aba593b03a2037e4b105aeca4192707b1ef0bbe3e0aaca9d90726fa

            SHA512

            4f929579b2f9f59c14a4cbacdcf75a634d7cf8686bfce36a8074988f68c8869b3332b6a2757086f31a1e77b5aa609bfe59be51170fd9ab5431ea451d2c78ccfd

          • memory/3660-24-0x00000000020E0000-0x00000000020E1000-memory.dmp

            Filesize

            4KB

          • memory/3660-0-0x00000000020E0000-0x00000000020E1000-memory.dmp

            Filesize

            4KB

          • memory/4648-636-0x000000000A1B0000-0x000000000A6DC000-memory.dmp

            Filesize

            5.2MB

          • memory/4648-646-0x0000000010E40000-0x00000000112E6000-memory.dmp

            Filesize

            4.6MB

          • memory/4648-626-0x0000000009630000-0x0000000009984000-memory.dmp

            Filesize

            3.3MB

          • memory/4648-627-0x00000000099B0000-0x00000000099CC000-memory.dmp

            Filesize

            112KB

          • memory/4648-628-0x00000000099E0000-0x0000000009A40000-memory.dmp

            Filesize

            384KB

          • memory/4648-633-0x0000000009AC0000-0x0000000009B2E000-memory.dmp

            Filesize

            440KB

          • memory/4648-625-0x0000000009530000-0x000000000962C000-memory.dmp

            Filesize

            1008KB

          • memory/4648-629-0x0000000009A40000-0x0000000009A4C000-memory.dmp

            Filesize

            48KB

          • memory/4648-634-0x0000000009B30000-0x0000000009BA2000-memory.dmp

            Filesize

            456KB

          • memory/4648-635-0x0000000009C10000-0x0000000009C76000-memory.dmp

            Filesize

            408KB

          • memory/4648-623-0x0000000008B40000-0x0000000008B98000-memory.dmp

            Filesize

            352KB

          • memory/4648-637-0x0000000009D20000-0x0000000009DBC000-memory.dmp

            Filesize

            624KB

          • memory/4648-638-0x0000000009C80000-0x0000000009CD8000-memory.dmp

            Filesize

            352KB

          • memory/4648-639-0x0000000009BF0000-0x0000000009C12000-memory.dmp

            Filesize

            136KB

          • memory/4648-640-0x0000000009E90000-0x0000000009F5E000-memory.dmp

            Filesize

            824KB

          • memory/4648-642-0x0000000009F60000-0x000000000A082000-memory.dmp

            Filesize

            1.1MB

          • memory/4648-643-0x0000000009E40000-0x0000000009E4A000-memory.dmp

            Filesize

            40KB

          • memory/4648-644-0x000000000A0E0000-0x000000000A10C000-memory.dmp

            Filesize

            176KB

          • memory/4648-645-0x000000000F090000-0x000000000FE3E000-memory.dmp

            Filesize

            13.7MB

          • memory/4648-624-0x0000000008D20000-0x0000000008D58000-memory.dmp

            Filesize

            224KB

          • memory/4648-647-0x000000000A800000-0x000000000A820000-memory.dmp

            Filesize

            128KB

          • memory/4648-648-0x000000000C9A0000-0x000000000C9C8000-memory.dmp

            Filesize

            160KB

          • memory/4648-649-0x000000000DC60000-0x000000000E81C000-memory.dmp

            Filesize

            11.7MB

          • memory/4648-650-0x0000000006440000-0x000000000645C000-memory.dmp

            Filesize

            112KB

          • memory/4648-651-0x0000000011DE0000-0x0000000012102000-memory.dmp

            Filesize

            3.1MB

          • memory/4648-652-0x0000000012100000-0x0000000012208000-memory.dmp

            Filesize

            1.0MB

          • memory/4648-655-0x0000000011D30000-0x0000000011D3A000-memory.dmp

            Filesize

            40KB

          • memory/4648-656-0x0000000012230000-0x0000000012266000-memory.dmp

            Filesize

            216KB

          • memory/4648-657-0x0000000012BB0000-0x000000001307C000-memory.dmp

            Filesize

            4.8MB

          • memory/4648-659-0x0000000014670000-0x00000000146FC000-memory.dmp

            Filesize

            560KB

          • memory/4648-619-0x0000000008A10000-0x0000000008ACC000-memory.dmp

            Filesize

            752KB

          • memory/4648-618-0x0000000008870000-0x0000000008902000-memory.dmp

            Filesize

            584KB

          • memory/4648-617-0x0000000008D80000-0x0000000009324000-memory.dmp

            Filesize

            5.6MB

          • memory/4648-616-0x00000000001A0000-0x0000000001D20000-memory.dmp

            Filesize

            27.5MB

          • memory/4648-680-0x0000000015810000-0x00000000159D2000-memory.dmp

            Filesize

            1.8MB

          • memory/4648-681-0x0000000012950000-0x00000000129CE000-memory.dmp

            Filesize

            504KB

          • memory/4648-615-0x00000000001A0000-0x0000000001D20000-memory.dmp

            Filesize

            27.5MB

          • memory/4648-690-0x0000000017380000-0x0000000017B26000-memory.dmp

            Filesize

            7.6MB

          • memory/4648-699-0x00000000001A0000-0x0000000001D20000-memory.dmp

            Filesize

            27.5MB