Analysis

  • max time kernel
    113s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 21:28

General

  • Target

    1cc2ce.msi

  • Size

    1.0MB

  • MD5

    654b4847c1d00bfeaea115fa5df12845

  • SHA1

    66f95004c025d48a8bae158e009a1391a8f33f7d

  • SHA256

    c210e0568528004a0ebf15876edacfa42767249427f06029007c5efe157b9e8e

  • SHA512

    99da0779f2d640353be818e5b253a0119276c7306979d67b20508ae9623ef80d7e9b09978c46befea3508d52ede64af77b890d5fd75029383605fe1988980b67

  • SSDEEP

    24576:Jl/xpovgnzdM1R+KtVv1gg/hHs175FfqNaXTL0W8ABZxVZk:Jl/rovgnzdMRtcg/Y75M4XXH8MZxVZ

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 10 IoCs
  • Loads dropped DLL 2 IoCs
  • Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\1cc2ce.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:208
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4532
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding A37B305E33E14D5015F71F99037D9EF7
        2⤵
        • Drops file in System32 directory
        • Loads dropped DLL
        PID:2324
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e586cfe.rbs

      Filesize

      11KB

      MD5

      ddfd7b66145911d8dc16d7f6cdd13953

      SHA1

      52c68a95aad6e80882495c6a84c0c50a110df6c9

      SHA256

      be4a11ecc650825abdfc40089864c811ed91d2a595744e1e2bc66140c4f448b4

      SHA512

      738d600dfbbf9951563e324066eff09458b91c269402fffbaed54721413f6a8949408fdf635b9d57b653a0461e9c2d1b891d12711457b0502c0d921be5c0815c

    • C:\Program Files\Microsoft Update Health Tools\QualityUpdateAssistant.dll

      Filesize

      497KB

      MD5

      982ead664d02893904aed4b19f466d5e

      SHA1

      80dca50193fe0fe00ab06f1e3d1a0100bce59ebe

      SHA256

      bc23949db1f6d382132ce182ab3d34775ba73d8f423afb9790ccfb25665cb5d0

      SHA512

      424b3b95874ece3744975dcc61fe0fa1e8a14517ae3515e0a32c12ad3f3a18c216943f3632065a879d1c34c02fffcb960654eb3dffffc76d569aa85939b3f9cc

    • C:\Program Files\Microsoft Update Health Tools\sedplugins.dll

      Filesize

      481KB

      MD5

      1f851f0af767ebb8ce51d9a6a80d5202

      SHA1

      1581fe2b3fdf157523eca0013aeca9acbd9b4f02

      SHA256

      ee5d10c9f99ad0eed081a2578c0de1943b79fd09efa526b243ac5456fa841a5c

      SHA512

      6b5a25a12a0144834c40a9d109ff3ec9340539f4012ea3a638acf04b41db82c8218b5687c545f1cc8e1e9a5ab10b8fe52739e0072af49e33814c5bfa30caf201

    • C:\Windows\Installer\MSI6E07.tmp

      Filesize

      197KB

      MD5

      2e01f7636cc403199e1521905ffb9f70

      SHA1

      a1d1018627a953461bf82abc540720c830407ca2

      SHA256

      eb1c77ec0beb999db7c3fd9f3b974b7baba85739f5deff2fa9a70305fa3373a9

      SHA512

      52cc48c7ea87280128f0eb3f63a44aa485fb3b04c2d234ea4dde25bd41a4dac08a27c3c14a1f792e222ef5ee74c547a81a14f3fcebfdef3acad93cdea2144699

    • C:\Windows\Installer\e586cfd.msi

      Filesize

      1.0MB

      MD5

      654b4847c1d00bfeaea115fa5df12845

      SHA1

      66f95004c025d48a8bae158e009a1391a8f33f7d

      SHA256

      c210e0568528004a0ebf15876edacfa42767249427f06029007c5efe157b9e8e

      SHA512

      99da0779f2d640353be818e5b253a0119276c7306979d67b20508ae9623ef80d7e9b09978c46befea3508d52ede64af77b890d5fd75029383605fe1988980b67

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      60934d71d122e7e7321c8d8c7c3b3dc7

      SHA1

      fae5768f3153c7cfea1ffa183897db7a338041ef

      SHA256

      dedb5e5e902cc758fbb710f0600548fd368200d877d00a877bab39a957f2af8d

      SHA512

      85d12cf8993d513ca6016cece6ea1bb85c85c91bb1c89e511791bbcce966c15c66cd3c6eb2933e6393df4e8c899f49349eb200a9c4550a4dd75c6fbbd97cca50

    • \??\Volume{877c6983-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{40166d7b-0c7b-4df4-bdbe-321861c5240d}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      c15770f52f3217a1c18f6a1152ba5498

      SHA1

      dfd78431a01566f0c8a5b0a18cfaee4ad2d7a254

      SHA256

      a6b09281bfd92d2e22511f38373bb33610d2979798b4f012502b877aec030d88

      SHA512

      117f13832090da3b8a3f88d517d842576f89f9f365feb0e4b4bff0185d30d3dd9b182ac19d83d297e34e3872bf69c58fb86e4eec1869d3034770fd4cb5967a2d