Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 10:26

General

  • Target

    5086ebdd4c2027d8841fb0742eadf4b90d52f6f4cde6c2025c1b084722666bf5.exe

  • Size

    115.7MB

  • MD5

    c6e0780d216ce2164645b5f997b8d069

  • SHA1

    ed72be66384bb7ee8ad23a97728ec30acdfae75e

  • SHA256

    5086ebdd4c2027d8841fb0742eadf4b90d52f6f4cde6c2025c1b084722666bf5

  • SHA512

    8a3e851d6419c1f837261d7c3a68327a4972cad6cb0d7ccf8fcbb27d0d8f01f17e19f4027c8dee53757d9689e947b5df55e8a0856a47059531f7fa8d091c9c5e

  • SSDEEP

    3145728:5JGuB/L29NTR7IKF4IcAl61Y/XtSFosm+VxDZL2C8RFuu0:6Y/YNTdF4xK61Y/WJAjR8z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 52 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5086ebdd4c2027d8841fb0742eadf4b90d52f6f4cde6c2025c1b084722666bf5.exe
    "C:\Users\Admin\AppData\Local\Temp\5086ebdd4c2027d8841fb0742eadf4b90d52f6f4cde6c2025c1b084722666bf5.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Google LLC\Google Chrome 128.0.6537.0\install\ChromeSetup.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\5086ebdd4c2027d8841fb0742eadf4b90d52f6f4cde6c2025c1b084722666bf5.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1719570259 " AI_EUIMSI=""
      2⤵
      • Enumerates connected drives
      • Suspicious use of FindShellTrayWindow
      PID:2608
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 1CA0DD42BA2038513C5C7DC9D9C34E0F C
      2⤵
      • Loads dropped DLL
      PID:3060
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C1528996F871D4A4DC47B118C28554DC
      2⤵
      • Loads dropped DLL
      PID:2616
    • C:\Windows\Installer\MSI3B90.tmp
      "C:\Windows\Installer\MSI3B90.tmp" /DontWait "C:\Users\Admin\AppData\Local\Temp\ChromeStandaloneSetup64.exe"
      2⤵
      • Executes dropped EXE
      PID:2956
    • C:\Windows\Installer\MSI4E18.tmp
      "C:\Windows\Installer\MSI4E18.tmp" /DontWait "C:\Users\Admin\AppData\Local\Temp\WindowsProgram.msi"
      2⤵
      • Executes dropped EXE
      PID:1236
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 6BB9194ECFB5515074493BC73A59BB43
      2⤵
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:572
      • C:\Program Files\Windows Defenderr\Phone.exe
        "C:\Program Files\Windows Defenderr\Phone.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:1784
  • C:\Users\Admin\AppData\Local\Temp\ChromeStandaloneSetup64.exe
    "C:\Users\Admin\AppData\Local\Temp\ChromeStandaloneSetup64.exe"
    1⤵
    • Executes dropped EXE
    PID:1920
  • C:\Windows\System32\msiexec.exe
    "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\WindowsProgram.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of FindShellTrayWindow
    PID:1328
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2004
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005AC" "000000000000059C"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2548

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\f7633f0.rbs

            Filesize

            421KB

            MD5

            c1e776c69050a3a2e176b1b62d66fa54

            SHA1

            7e992b2eb4b045e79fcc143e280c2b7da1168a64

            SHA256

            4e61d7ac0e761049081f82ad3a866d841fcc4dc145e9e74df9a97ce4be2b32bb

            SHA512

            0788cc32000cd57ea3dfc0fe723e774f809a91b580753eea2c0f7d23c806d30854367c04910aac99ad5d39298e64f4a1ccca512da866226282fdbda07f9ae76b

          • C:\Config.Msi\f7633f5.rbs

            Filesize

            7KB

            MD5

            057bb931a3f1d19dcab10abded778fda

            SHA1

            103c937de99e52c25f29f70d6bb67e0837aab794

            SHA256

            e187a9f7c1523ebf97a52df7204eff07c1091bb36da858df9e554265938743e3

            SHA512

            f2fadbaf75d621680ec57000f59e0902bd9e5e2b084fdc67d1e2c4c504f6e267430db5b6ce6048dc4a5d2a5eb62fae87c41f498f21869e4d9b63b1532b4f4518

          • C:\Program Files\Windows Defenderr\1

            Filesize

            483KB

            MD5

            778d517a9de9b93f02e92602f1cfcd6c

            SHA1

            9e373cbc1e1cf5e1553896485d7c5701a8e89804

            SHA256

            cad9fcfa069fc7de9f5d2b7c66bd5c4ca714777bf5db253418a664e7723026d1

            SHA512

            05ee9445263ee8312be7947a0b42684564a340f11052f4b2d7aa50681a74d6612675fdac8e973cb4cf84412711d4d087ffd0509e7a91f01b108253930425d5f9

          • C:\Program Files\Windows Defenderr\2

            Filesize

            359KB

            MD5

            fc6993a5498a7af0eab9899d86e393e5

            SHA1

            39bd7657b68677e74046b91393b965942de5f37f

            SHA256

            f066dba6245bdbf9b26884f811bc7facd9c13e299bc55f9fbe4005d45f80ff77

            SHA512

            a50f529e8639ff2cb22c8b118f3f5f5d38f1eb2248d9917cb1689f8bc0b24ce96056e91f62cb0c0cb7e8983715c0a58fe8183073dd3ef8347ee65bf3076c896d

          • C:\Users\Admin\AppData\Local\Temp\MSI3266.tmp

            Filesize

            587KB

            MD5

            c7fbd5ee98e32a77edf1156db3fca622

            SHA1

            3e534fc55882e9fb940c9ae81e6f8a92a07125a0

            SHA256

            e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6

            SHA512

            8691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a

          • C:\Users\Admin\AppData\Local\Temp\WindowsProgram.msi

            Filesize

            1.3MB

            MD5

            4bf494f15fcc172b98abeb5a02ecffed

            SHA1

            e158eb541843a67b11c39e93b2bfd8c1e67e9dce

            SHA256

            019f3f8c33408fcc884f9789ae6db493dc4b8757e12c02d753d3c58b52a2726c

            SHA512

            dde12c1cb3fd8069bced35cddeaa0ff4208056f3eefea4f16082413234cd2b667c16f238214856551aeda2203fda24437760a332aa657d63e17e957f4f0dc6f4

          • C:\Users\Admin\AppData\Roaming\Google LLC\Google Chrome 128.0.6537.0\install\ChromeSetup.msi

            Filesize

            2.2MB

            MD5

            37ec8d53174bc223bcc6a7921a0fd568

            SHA1

            76ee312d96cbecc7a1c1fef6ec780e07f18b40c1

            SHA256

            da9dcb075aff76282af16ea4151e577d12b2529b78a6f324fb053765c3c200e6

            SHA512

            451def2c901b74a9526163076d1de8706889b2b2f914634dfe3af0a1bf02f788a5a0c3cf90da001c949ecac41127523603c1af6c87b1d816c9f8d597d7dc0a60

          • C:\Windows\Installer\MSI35B3.tmp

            Filesize

            709KB

            MD5

            89136bfd28a2e1ec6b6d841214e1e670

            SHA1

            4c6aab98925cb556f7bf2dbbc9f7ed0da92ef2ab

            SHA256

            1a3c0e60aad0a3bb92a6e0b786df93920aed7b0c7ec56ab49f2692102ac5adec

            SHA512

            22237702745fe11a6f23a943f16a12f23b42fe04d87af6383afeccd854320f3a6961590a76ab6a04f020f9830fb3d9f8b34315ad007a5464dbdba2d543851812

          • C:\Windows\Installer\MSI3B90.tmp

            Filesize

            419KB

            MD5

            cac0eaeb267d81cf3fa968ee23a6af9d

            SHA1

            cf6ae8e44fb4949d5f0b01b110eaba49d39270a2

            SHA256

            f1dd0dd1e83b28ffa2ed30f46f98e94a4919ec1f4e9d33720354288b77153774

            SHA512

            8edf9f733dda9000a6e2b70da61912dbc15f74c836d738391ceddcdff20f5b420a678450523cf331aa9bce90217aa92ac6e73d1880ae15c9842ccc7d3296f95b

          • memory/1236-57-0x00000000001A0000-0x00000000001A2000-memory.dmp

            Filesize

            8KB

          • memory/1784-106-0x0000000001370000-0x00000000013F7000-memory.dmp

            Filesize

            540KB

          • memory/2200-0-0x00000000002C0000-0x00000000002C1000-memory.dmp

            Filesize

            4KB

          • memory/2956-50-0x00000000000B0000-0x00000000000B2000-memory.dmp

            Filesize

            8KB