Analysis

  • max time kernel
    252s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    07-07-2024 12:02

General

  • Target

    VirtualBox-7.0.18-162988-Win.exe

  • Size

    104.6MB

  • MD5

    6a046a57ca3dd222d8bf1410b8172f81

  • SHA1

    49888a74780ac09ab6ec99bbcca5950890e5a227

  • SHA256

    4c83894c00aa9f55f7e0f70807210896ba32e1222d4ff1d0b9487af81f328f36

  • SHA512

    cb19129d62253bde686618cba40449ed05d5435ae11dbbb83ebc9a1b308fc7e9387cb964cb4cf26e91d7e38b9e8b75ebcb5de8039379986bf95cc77456a65a4b

  • SSDEEP

    3145728:aTdp/Gww7IEwmuQYIuSwHn9B4mzL8M6Wfwf:aFw70RQYIfwM6Q7+wf

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 23 IoCs
  • Loads dropped DLL 18 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.0.18-162988-Win.exe
    "C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.0.18-162988-Win.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2252
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding A3A02729C2ADE1C0530574A486B21B17 C
      2⤵
      • Loads dropped DLL
      PID:1724
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding B6D5DDA4868C2927C1965AD92E81A5AD
      2⤵
      • Loads dropped DLL
      PID:1920
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 99A58A15DC385624B1CE0C01D4BAFC52
      2⤵
      • Loads dropped DLL
      PID:1928
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 8AD04D12F1E8298FF3A7913146ABD085 M Global\MSI0000
      2⤵
      • Drops file in Drivers directory
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      PID:1640
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:1188
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000394" "00000000000005AC"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:872
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{3969afeb-cb28-049f-f1d0-9e5b89235f5a}\VBoxUSB.inf" "9" "66237d90b" "00000000000005B8" "WinSta0\Default" "00000000000005AC" "208" "C:\Program Files\Oracle\VirtualBox\drivers\USB\device"
      1⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{520d6856-50fe-5f28-4d5d-df36a766bc65} Global\{06a05628-f956-5d57-5a78-e21aba16593a} C:\Windows\System32\DriverStore\Temp\{4771c272-0893-7392-5270-4b2459731322}\VBoxUSB.inf C:\Windows\System32\DriverStore\Temp\{4771c272-0893-7392-5270-4b2459731322}\VBoxUSB.cat
        2⤵
        • Modifies data under HKEY_USERS
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2704

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\USB\device\VBoxUSB.sys

      Filesize

      184KB

      MD5

      1f50fa5bf6487796d2913e78ed8cb8b0

      SHA1

      8be143b0a7d6963e9ab911cfba9d3e4ec508f368

      SHA256

      d38854405d1b7e9602bc288e2db9b8492d82f14410b44f655f5505ba9e41aa90

      SHA512

      bfebbd90662901ea80a2f7eff4446c02bd0549f823b310908fc4e2e11b8cc370fc70a0da6945aa4335de81d61dd95980cd3a7bd58acdd06b015d5b4e163c6a29

    • C:\Program Files\Oracle\VirtualBox\drivers\USB\device\VBoxUSB.cat

      Filesize

      19KB

      MD5

      26e61131eb9dff89b0894fb56564735b

      SHA1

      69695c2502486ab804d8ac167e21a9cdb1d48146

      SHA256

      d3a81fb7ccfaab0914460fb75c831cd3a0af3137e7acac1b32736af83e50769b

      SHA512

      fe79e64c86cabaa230804af2ea1e599a3d7a497f8ef9431586dba22e855c90028b5cbc31251a93133a7c12b868872c72c3466bca73da2ae382e0e84f698e7726

    • C:\Program Files\Oracle\VirtualBox\drivers\USB\device\VBoxUSB.inf

      Filesize

      2KB

      MD5

      35806a0ffff129546450cdcaffafc06b

      SHA1

      11251df1fbe7ab027059768154077eb985cca790

      SHA256

      66a137a1a716e2d673666e74074b69b6f68f46072b359b4c17fee5055a3b98f3

      SHA512

      ac3d4a434b75b22d3334c9e7c6dd2be51e55d5439c78b8e05c83ce84da78016d111a95f3890f950de57431b03cfc136fce7563ef7931b3e1724ada6f19defc4d

    • C:\Program Files\Oracle\VirtualBox\drivers\USB\filter\VBoxUSBMon.cat

      Filesize

      19KB

      MD5

      b0e3b263b754279706ba68202722e4e4

      SHA1

      a05f836b5b04fcbaeedf1bc307b4ff38e378c0c3

      SHA256

      f2e0143ddb584d1c8b300cf483c6a3ed008dba1ad2319a8e956583e15c331706

      SHA512

      9aebc05a8acd2101a59a3bde21f1fc97a4953bbf51c18ead71f53cad65ee27320a8482bd045c7ea24f980752688e934998368dd2b11aaca4a6a4efce00b573a4

    • C:\Program Files\Oracle\VirtualBox\drivers\USB\filter\VBoxUSBMon.inf

      Filesize

      3KB

      MD5

      07bbbda4185e4ee2acc39cbbf3587d39

      SHA1

      690d99470d0611e5d4341f78d468354e24516b45

      SHA256

      4ca28bcb2f7a024df37830aa6314d2f6c0fc0ec6b46231a9255abb32a39502ac

      SHA512

      ed55425344f5158b0e5ad46228a223bfebd246df32ef628c177d514b8e3677c4e12ac4d64f5989329f6283cecf1a5f3a7f5516296ed0dbeec703cb71cc0985e4

    • C:\Program Files\Oracle\VirtualBox\drivers\USB\filter\VBoxUSBMon.sys

      Filesize

      199KB

      MD5

      6bc9768cdd545c056faeaa153e73c686

      SHA1

      8dbfeff04cb7a6a32f3f2a09fbbfaff31dd34792

      SHA256

      2e19d29e7e6b1d1a9093eb7f0bd2e2825ed08785d6042b90e3748f3d087e59c9

      SHA512

      7b4e293dd8c1e7cb466d71c5a2b98814ebc973d717e46fcf5e63dcde925d9905fd5ec87f729c1feace5baba74eef9a8a769b47e191df6651d1122432fb8e6739

    • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.cat

      Filesize

      19KB

      MD5

      b703e14140f90296e49fd36ccd02b031

      SHA1

      90d0b24457308deefa47c280c7b27f2b2bdb34bb

      SHA256

      09c2c814130aa43b86da34517200e4ead6ebafb7188d7c0c17498e31913be8f8

      SHA512

      a606d9f1bd70e0dc5f009ab103f099a6242f37302f0253962241e7385bb4299e5ea7ee4defbb81049ac9748a461563b756fcd1918eb3c98086a221b564a0034b

    • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.inf

      Filesize

      3KB

      MD5

      18344eb15d0a3efb7b72eb6e75b18811

      SHA1

      9f88f5eac5bb5e9a9b6894d1d78ee0887bd94dd8

      SHA256

      80e3772271bf6f6c35062e6e163d81392cfc65b837f638f2ca4808429909cd91

      SHA512

      10458bace0531bba2296bc50fd9e2dba339abb1e04ed8601f958472502552010fb8f5b58b6a351dd51245d056fa2abbf8ea176a21ae051e8e2a4bd3b314add90

    • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.sys

      Filesize

      1.0MB

      MD5

      8dc26c500f411c68a1cbd2523fe85dfc

      SHA1

      c43446b2005130ad83579132c979def6841ff43f

      SHA256

      5eddb05714b93fcbf3d9dc9210f2e29a7d49d738fecb63f89021a2b17cebc382

      SHA512

      78974b608dc671eff7f1d7b31435d3bda4bb7897f8dd835b265cbf4d8a5f1367f1f7e09b387d1199046a44797bac5d180f488400a35d2946373b1f9fa576d0a4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

      Filesize

      471B

      MD5

      ba47fa9dea8a71d1c63709b8aedf6470

      SHA1

      94832444a0942a1eb710b6ea14c32a88befa82bb

      SHA256

      6b98c3ade0aa3b40cf0b26ab2039c92ea513c1a5e8a09c3471d749a3e2450931

      SHA512

      384def7bfe5532d6e3151401b6e3bc847fcf29f4bceb7871756ffd2d58da1328c0bd322300401bf0ec7ef6d44697ca19b7eb6c43a8556e6fe655fed4b82da291

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_D2F6556190F7B1A25A117FFB5467EEBD

      Filesize

      727B

      MD5

      f0920817e695bf85896191695be66369

      SHA1

      34ac0ed680118f704e379e8e92dafbee3a7348a9

      SHA256

      cc458d27daa3c72449446a117646e8bbe8e416b7220b86f9575e37ed56ca34cf

      SHA512

      58080f2fee8b621af242e52f06e69b62a531cc22be8100156bf1dae3a67de3543b22b72599b2e0efe68575b3cc5a9d3fcd3038b219f82c3941b732710aba0a72

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

      Filesize

      727B

      MD5

      92dedb354f34137e0b748c555e3a182b

      SHA1

      5dc92f07fad8701a42b0e25a5b0e6de3e67f3e52

      SHA256

      2aaaac91e9f217f59f423ea35e36154815ddd08fa4126aa4bfe8af66875d0060

      SHA512

      680434722d0d131504bebe7b09bd24b781f091f0b67c787e632f6d355e13da2ca91209ec43544764b48dd3898a559705b97f2d76066447a1b7370ffcfac1efd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

      Filesize

      400B

      MD5

      a03d4ccc026b90255bdae36552ea28c5

      SHA1

      1a0a2053f4b14e62b9c0f12a877cbd1f12fb3259

      SHA256

      1b381e4772894f11286ea519646b1ef6928db4064601b64a1db900e325553a2b

      SHA512

      e33d19b37beff1a1c4f8dbfe7a0c19da8c0fe33f146c1ff65cc077d72a63a062403599274b7d4f1176f664c27b53a1359a6601cf6945ffe4a22957f53e306870

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_D2F6556190F7B1A25A117FFB5467EEBD

      Filesize

      412B

      MD5

      9aa6cfd638bbf55b8b9b145078c596b9

      SHA1

      d4efee83aadb64c17235c7b27be00c635990e6b3

      SHA256

      99bf80e5c4067d439fe43741b29bae52c563c13a31368a6add3c94bec207f998

      SHA512

      229508828321d8368530bcdd175ac235c30caae7c007e4c50cee6c036fd6fd11ee0522ea65fc342ed87f4680590b37b519b805faeccb64518877471d3b7a8bd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b77de091d44127e85ae3eeb1cd780df2

      SHA1

      fce7fbd3762e5a21720272169466fd7fc74f0199

      SHA256

      ac1b645019ab2f5245dae7dd23adb6dc9c7e04befc2652a494f8e08bcab3fec7

      SHA512

      cf3f376e1802e7d6ba1664d36652a09fdb4e3b3f17fc3fd225c06ff23f5ba84c6a2f847808a370aa1c3b951c8cc0517216408aa1c71fe8fc19e6defb2556936d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

      Filesize

      412B

      MD5

      d36028dfce2e3d2e54f12c80bf7969e0

      SHA1

      a9b8bbbae84559c98901dbb199cd137fd99d925e

      SHA256

      16aefc5b23d587ac04998a16aec9d60c99600b064e274850cfd81f83186e1360

      SHA512

      1b150b486e8240ad859deaaf22ca5cd05565b43fcff79a254f5b022b61e0cecc174d99f1f63badc84d0132edc6ce12020ed7ab3c76cca2d13c1041811193350f

    • C:\Users\Admin\AppData\Local\Temp\Cab2BF2.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Cab511E.tmp

      Filesize

      29KB

      MD5

      d59a6b36c5a94916241a3ead50222b6f

      SHA1

      e274e9486d318c383bc4b9812844ba56f0cff3c6

      SHA256

      a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

      SHA512

      17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

    • C:\Users\Admin\AppData\Local\Temp\MSI2ED6.tmp

      Filesize

      324KB

      MD5

      d045098c42378ebe26f6da17977551ee

      SHA1

      80a93acee96419dd9c44d0d15d7518aea21f782a

      SHA256

      92b89b56400e8d01a813513ef8af685fb23adcaba49d7775853e650266b2f63a

      SHA512

      9e110110c6ec6aa43e64069744901c955ac90253a036b9837d2e0150c5da97cb8f927db4a36e9f289684c3b91724a4d93aa189a3fde9d06d07d62dd4b8c08a35

    • C:\Users\Admin\AppData\Local\Temp\Tar2C05.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\Tar5131.tmp

      Filesize

      81KB

      MD5

      b13f51572f55a2d31ed9f266d581e9ea

      SHA1

      7eef3111b878e159e520f34410ad87adecf0ca92

      SHA256

      725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

      SHA512

      f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

    • C:\Windows\Installer\MSI413B.tmp

      Filesize

      234KB

      MD5

      8edc1557e9fc7f25f89ad384d01bcec4

      SHA1

      98e64d7f92b8254fe3f258e3238b9e0f033b5a9c

      SHA256

      78860e15e474cc2af7ad6e499a8971b6b8197afb8e49a1b9eaaa392e4378f3a5

      SHA512

      d26c9dce3c3d17583ffb5dbcd3989f93b096a7f64a37a2701a474c1bf4b8c8b1e922c352d33f24e411f1c793e1b4af11a3aec1de489087d481b1b636df2050cd

    • C:\Windows\Installer\MSI440B.tmp

      Filesize

      149KB

      MD5

      418322f7be2b68e88a93a048ac75a757

      SHA1

      09739792ff1c30f73dacafbe503630615922b561

      SHA256

      ea5d4b4c7e7be1ce24a614ae1e31a58bcae6f1694dd8bfb735cf47d35a08d59b

      SHA512

      253f62f5ce75df3e9ac3c62e2f06f30c7c6de6280fbfc830cdd15bf29cb8ee9ed878212f6df5d0ac6a5c9be0e6259f900eccee472a890f15dd3ff1f84958aeef

    • C:\Windows\Installer\MSI50AD.tmp

      Filesize

      690KB

      MD5

      8deb7d2f91c7392925718b3ba0aade22

      SHA1

      fc8e9b10c83e16eb0af1b6f10128f5c37b389682

      SHA256

      cb42fac1aebb6e1ac4907a38035b218b5f992d1bcd4dece11b1664a588e876e4

      SHA512

      37f2c132b632c8e5a336bdc773d953c7f39872b1bae2ba34fbaf7794a477fd0dcb9ff60a3ddb447fe76abd98e557bd5ee544876584adea152b0841b3e313054c