Analysis

  • max time kernel
    63s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2024, 21:28

General

  • Target

    747d8af.msi

  • Size

    180KB

  • MD5

    5611efd8725e779c15bf3220d2efb77c

  • SHA1

    517c154429d5430452994d13bdbe7be8ba4da666

  • SHA256

    b5d66e8ab0d2b33278d2cabb055be5a5043022bd0c36fe07d9d64a3830dd255a

  • SHA512

    d301f553ae5c8152cf9c5310ed9ddc330fddedce6ca858aedc31fec4e1e6aed40aa8917030f060c101f0af543e7b4b306bc8422bc7231bf50da61b14fcb1fa30

  • SSDEEP

    3072:QHviOApBgbxkK3zoGCK4Kr1kNM+BxWy2bDZRJdnp:wvipBaTDo1j//SZh

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 5 IoCs
  • Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\747d8af.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3056
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2196
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1652
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005A8" "00000000000003F0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FE

    Filesize

    1KB

    MD5

    cba2426f2aafe31899569ace05e89796

    SHA1

    3bfb16faefd762b18f033cb2de6ceb77db9d2390

    SHA256

    a465febe8a024e3cdb548a3731b2ea60c7b2919e941a24b9a42890b2b039b85a

    SHA512

    395cce81a7966f02c49129586815b833c8acfe6efbb8795e56548f32819270c654074622b7fa880121ce7fbd29725af6f69f89b8c7e02c64d1bbffbfe0620c68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C0018BB1B5834735BFA60CD063B31956

    Filesize

    1KB

    MD5

    fc1193c6345ac35188aa3de0f824ceb7

    SHA1

    8fb5606f5380ac6ace7bb4e7c71b6750362e8c5f

    SHA256

    bdfb8faff4c0c0a15c642890a5544bd32f930f55ca199470dbd4736a32d6e200

    SHA512

    480a3ad52cf215db3cede6ad93293f8f031c2cb7a190c6f4cbcd0f3eb06f5c81c7f13d304a495945192e759ab5403245acef7be0149b8615ce2b194927f3dec4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FE

    Filesize

    264B

    MD5

    bab48c43e08178b37c55fbf4dbcacf51

    SHA1

    25538900eda198c83d3a142a8b1a65f4035fcec2

    SHA256

    af4e0afbfa8210526b79f92facc0ab361db749bae82fad98c0f2199abc183bb9

    SHA512

    cf12412c0f78e82fbab5f1230c42eb4adb5b5ef2d9a495f930102eda7cb27626dc97bbae4cb9bdb206ed2e34be0da602efc29326ed5f48b8e784fae40f3485e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62ea5a63ec24fd1680a2453609124404

    SHA1

    c6ab99a05c318bfaba4e958f9521650ce5748ad8

    SHA256

    e8cd47e9f5df363062d92b8693fec845153bc023d262abc9935cb33645daddb4

    SHA512

    ae95777526329805fa77c685b32d3837fe4ac762dfde69282c4b24b89bd4d87aa86b86a7d23423a2b742aa53e25f3b511e961f535edd73725b022fd66d0d5257

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C0018BB1B5834735BFA60CD063B31956

    Filesize

    252B

    MD5

    d983e8b04555af19ec26146ace096622

    SHA1

    2edc7efca2edbf3937557690fac7b00095590e8f

    SHA256

    b83facff5f00179d4328a486ebce79f94c4bcaaf2854664167ae5ff86e3fa45c

    SHA512

    4930cae0241b31e6d28d7048fbad44628a722621e788282f6f99253c427d9c18f12096b5c09e5991b1203a84730aa2509b31495f69ca01753787d36ca9d59e54

  • C:\Users\Admin\AppData\Local\Temp\CabA585.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\MSI6a4e7.LOG

    Filesize

    20KB

    MD5

    60ccf433cc254f9d9bccac267ec0912d

    SHA1

    18dc02f15b6a43bd69daff1061ab73203cca2c91

    SHA256

    7ddd0a939aef31e9e767726026cdbd695395b5307cbbd4f3ef2d7b56eb98aa04

    SHA512

    fb91f8ff5c452ea2a78ecdb60b9bb94f943d8f1536d6209e42e07adca251e7d0f27c5c52dbb8dfe1d5b1569fba25311fe992de0d20aec418859f3e8d4115580a

  • C:\Users\Admin\AppData\Local\Temp\TarA597.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\TarA90B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b