Resubmissions

19-07-2024 08:22

240719-j929savcmd 6

19-07-2024 08:14

240719-j5fj8a1clk 10

19-07-2024 08:08

240719-j1lknstgpb 6

Analysis

  • max time kernel
    26s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-07-2024 08:22

General

  • Target

    gooleo.msi

  • Size

    87.8MB

  • MD5

    e651816dd9240300cf9bd9c565e3b869

  • SHA1

    a4bc6e8f6516f3d549195887d7095b9496ae52f9

  • SHA256

    2c12e2073d0b50369b0b10ebbdb8bf8357fbf7cdca3f97b0b84192339b846c25

  • SHA512

    90646a020b0ea67c912f999690382a44f5649c5f3c2a4a7c060aced6a9a71533b92c04d948db8bafd717dd295ad19bb85a71d73ef86a62613e65053323b108b8

  • SSDEEP

    1572864:MKSA0Q9ilL4UxQUoim6casSZrcBsCWpuFg9O/jAaWFFDp+chVF1luEbtYio0z8+U:MbVQ92TQUooc3Uw2F9HHluEbtpoOKd3

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 16 IoCs
  • Loads dropped DLL 10 IoCs
  • Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\gooleo.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:748
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5665F6FA200741D41379AB26673B36EC C
      2⤵
      • Loads dropped DLL
      PID:3304
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1876
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 1804CFEB310EE53BA9E9F6CB6042233B
        2⤵
        • Loads dropped DLL
        PID:3952
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding B680AD1AC955FD50E6D980D696362AB6 E Global\MSI0000
        2⤵
        • Drops file in Program Files directory
        • Modifies data under HKEY_USERS
        PID:2224
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:4516

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57d070.rbs

      Filesize

      52KB

      MD5

      3d354e45af7dcf7b455660e01acc0c05

      SHA1

      e1aacd78ed6278d1257c3927b5569244c933c205

      SHA256

      3371ffba84f5019c58f651628652a010bd16b27047f5d7896b1f435798054dff

      SHA512

      bfb4d8ac3858a6a1141f7d274a7589e5aabb0fecf3d1262e492bdf48443a924299f516b9c7d0bff639a8c0734abe76cb1ab7c198b962f23e30c660afef4baa13

    • C:\Config.Msi\e57d071.rbf

      Filesize

      2KB

      MD5

      9745e893f7167a12c47ac261bf84e8e3

      SHA1

      a265021a5c08c37e6992906d5684b57c45eb402d

      SHA256

      06a8ea0dd8ba0c695466c634d667a022f2412b6bd894d2e394767eba9f962775

      SHA512

      47ba226c9babe527dfe447b52539cfdeb04dfdcb7279b6cc4dbe326f6e0a7d9291296d569db8247c1b5bd23461018c5aa589faaba503c9591e7364de88938123

    • C:\ProgramData\11

      Filesize

      84KB

      MD5

      97a2b445c8eac7f3b1edd94d67d2e768

      SHA1

      6c1ec795b0abf5fc8b9e4189f87a425624a28dc5

      SHA256

      452b3537cc4fc77acd5821ecdd33ae372e460a7b571f708fd91a6258d69c0149

      SHA512

      3d1eb3d8b1c56ae5b8d5c82380af4544457bc40c9fc6d6fbbdafc8b4f3d53fda2cbddad5aa983a207a708c596da2f00c1c7305093d3b575f6405d8dd064600a5

    • C:\ProgramData\12

      Filesize

      92KB

      MD5

      14f6c81cc6c2c225ca6b44ccb3343d70

      SHA1

      263108bc9f60251e094a7d4d216637d6c1f97f79

      SHA256

      f272d65dd3b608bb6a3d16f96a6cc5de00cd8f653c76ee422a6d452e55c67d9c

      SHA512

      7cacbdafb90cbcbb24365b50734de55432dfae8565d89a126453012a1688b4499ca0979b7ba27e89a116610c168a22219109253d4809195c7c6772cc892e6235

    • C:\ProgramData\12

      Filesize

      92KB

      MD5

      e61e00f904f561ec9e6574ddec3bb65a

      SHA1

      6458b901d065848b44988bff89b8e7933a43d7fc

      SHA256

      25bff93e68ed9086a8effd7c79e01fca7d3ab228b158acd57ebf583d0054e364

      SHA512

      06ee9b0b36de98cceafa938cab3f6523be42a869d4e28ffbb1dcbdcee363eeedbf320923653cc90450d0fb8d14cbaf74768acbe78c7177747f2a637103d043ac

    • C:\ProgramData\15

      Filesize

      978KB

      MD5

      8e945aaf7128bb3db83e51f3c2356637

      SHA1

      bcc64335efc63cb46e14cc330e105520391e2b00

      SHA256

      4fcf6394b14e24d830b04209a0ede1dcc911d199740a55d12c8ab8aeabb84073

      SHA512

      150636eea0cab3e738f5e94ae910d189622fa3221aca1cecc05bf0f5a80f2fab055adeafd99eab7a2a1d3911ff2784cf521a2681e5ddf7737f4363b915b8c2a8

    • C:\ProgramData\a10

      Filesize

      36KB

      MD5

      f0284892937a97caa61afcd3b6ddb6d4

      SHA1

      f3c308e7e4aaa96919882994cdd21cc9f939cabd

      SHA256

      2514913f8a6f4671a058304651289b0babe47d81c044212b3140ed1c1b643b09

      SHA512

      058845e0a9a5892a69f24f3a77086e3f9546493ad40a0e5359aed05cf8882a9f3d7aee0449648d5cb76e51530af3e46af59a9b196cc92318334116c92dde4171

    • C:\ProgramData\a3

      Filesize

      14B

      MD5

      0d59c87827537cdd7727d1f0e4d6cce4

      SHA1

      6067300c20740cf2899d519382f36c453d9b7fca

      SHA256

      270a9ca2cc8d07c58e43466e95a8aedc7bde468b7b5c0c37845cad5f0d2ab6d2

      SHA512

      324aca54d36574f1a3d7ade872bc5d4bca8b6ae78817cefcf6fe74af51e90f67a808757eb3c84d65c2a8c8e0322cad8b30c83f29e0011c374fd114122ae92d7a

    • C:\ProgramData\a5

      Filesize

      56B

      MD5

      6f10d76e583b39191028ab57f8edbed9

      SHA1

      fbaa6e99f3a88d1e4cd606ca45debed661135c1d

      SHA256

      847f6e3577892365fadc94648eabdde48b9660590ba109e8387a9cb984aee476

      SHA512

      17a2f133b321fb9ac992e03da4ada3b3e5f1e507c7656d287ea00efddc50885c9ea9f337dd6b8cd52015060b4f0f4fc7832a7a3603ed5a3b498d8da47916743c

    • C:\ProgramData\a6

      Filesize

      200KB

      MD5

      078c21b8c91b86999427aa349cf5decf

      SHA1

      b939376eaebcf6994890db24ddcb2380c1925188

      SHA256

      ed2c6bc3e77a404b8cf61176844ad19c1fdcae19881206631e3f0831a4bd919a

      SHA512

      a006a36fdcaf4c2403238475163553ba2fe7783fea200f28df46ea980a3907d2b24c854153b45b730195a133fcb28f60c157f33c865ea286ad8c354981cf5885

    • C:\ProgramData\a7

      Filesize

      497KB

      MD5

      c8cf4eb512fadb813f69c3184e4bf44d

      SHA1

      492576912c7c0a224881ea45035a4a9270cd44f2

      SHA256

      678b89a2ca82b0b7803e36601bd6216c7687c4102de7071676390f2c252cb1fb

      SHA512

      006665dcf7cd8ad83f8b5c06c2ec9367ee8caa01c3c1cb9502bd540ac9940d103b84f6620ef8b5aa8e78fbe268994c0d8da5fa7ba550e1c8bd038fd1e43d39dc

    • C:\ProgramData\a8

      Filesize

      21KB

      MD5

      da08e194f9a7045dbb19f6e5d5d7f609

      SHA1

      7884062382bf1e7911f7e74198ca9fecec159c61

      SHA256

      9bd52ec7e7750500de33df995fcc7e68ed1da70d125579cf76ae8f787577ef75

      SHA512

      46720cd0677064b00a9e253953b8b6cd5141a99d0090ff0d7c4a24b830ca621878bcdfec3c56880f940662bd78f408782231bdd3cb370e06dadfee71e3e2b2b0

    • C:\ProgramData\a9

      Filesize

      13KB

      MD5

      37aa892a6f35bcbe9b01f0a424f5d4f6

      SHA1

      e5d60e43a8e0a4b7371bd736e21b1a59546774af

      SHA256

      6feeb95115d7d8a51403996fee1ad219a52151662d3a01a2d17cfb77dbd51f3b

      SHA512

      a5d5ac494cba18bb5b2582310416dc2e146732ba4f2eddab6611393d61ac0ae839bacae0da1e85f0965575e6d6284b1180e2e3adb924f1e19d2d7586d2abbd83

    • C:\Users\Admin\AppData\Local\Temp\MSI9B07.tmp

      Filesize

      588KB

      MD5

      a9941233b9415b479d3b4f3732161eab

      SHA1

      cb2d99af52b3b1c712943b13e45d85c80c732e57

      SHA256

      ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2

      SHA512

      cfd6c425587e5e7c57b6f4655e2a48c871313e2bacf63cc0955ccae1a384610644f26aa76bee0a2a327cd77c2ae7def8ea9cb0c7c7c87fab1c8196bac82037f7

    • C:\Users\Admin\AppData\Roaming\chormeui\chomeui.exe

      Filesize

      1.3MB

      MD5

      84ba3c0d3d383c2676810494a7b5d4d4

      SHA1

      51dc4edee8e6d061dddf557861655079bb568308

      SHA256

      1dce1e3cef651f20cad4f096997407db5b5837b60a52b0abb8ad4c087b6a02e0

      SHA512

      6246e29c25c45258a2f244cb31991202d1b57e9309521296787b90d1662b3e9dd14d27cdd5557fbab39b66e18bbb63c9bf346091d0bf2dcfc798745ce030d079

    • C:\Users\Public\Desktop\chomeui.lnk

      Filesize

      2KB

      MD5

      2fb0e2243f744a8f61e0999da4e4b18a

      SHA1

      da2f1b24a8b06eb747b75cecc5e852bfb0e62579

      SHA256

      f0cfe53234426f576986a74a06801cc3bf4bac63aaf56ecbc6cbd01b0876321f

      SHA512

      875f14d767ac34087265ed6433229febad1f7dc2b739329ad2f447deec22ab726b71235e6cd941988376017e56bc7e5f22a4ef829300beb17ba4e3744ca910e3

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      12.8MB

      MD5

      eef06e0bac518bd09f8c8140d0876ddd

      SHA1

      dc7a19331d09c19d000cfeb2833da15377a9fc9c

      SHA256

      d6b2cfe9887d7f50c58e350c98078b08696a2b0d85ed1cad3b0fcb19c0a7b67a

      SHA512

      e9f73ebada4c159207b98fe7fd71c25270922de58b83063eb04e665f1072feb6edafb5268f44fcf78fdb9e141fc5ec5cdb76216fd87b12274c151f8af20501f4

    • \??\Volume{973b34ea-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{225e2e62-f616-453f-898a-e2ff908072e1}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      22edb30de947e9aad302ab44688679b2

      SHA1

      d26195eba8644fe048d3cb2717723bce6f2ec181

      SHA256

      cfba95fe6dff97d16abbeb1c5890179316c1f94956fa924f2fb71fcffd6feb06

      SHA512

      7f8c1cf1b99aa02e5b07a9d0652dd06d888685446f907cdfc3690e24d86fc0bf3da8bc3ae37897a17e9911052f2418151fafd9beb99d5dd7b37ae4c1346e1aa6