Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 06:38

General

  • Target

    dxkqdn.msi

  • Size

    1.1MB

  • MD5

    9794bd903f9baf249251c3beb693fbc9

  • SHA1

    7484ff4f837cad55c85cac20c3597eb683852068

  • SHA256

    71e462aaca0f2d8c8a685756b070d017c796de6ac22021a79d922f2f182d4fb0

  • SHA512

    f0bcd8ad6dd273d19088244c97ca7d1eb25aabebd5be1eafaf35ba0238484d57c7820882a7456862f4d15f773be82e477877a3e2bc0096a9c66df3e6db6608f3

  • SSDEEP

    24576:3XZFaDUZ09brk4FtSVUfTH59GPUvETHFarClEziowgF2JNtfSJJAUQKo:3XKDUC9brNYVULH79vqlExFmNtMXS

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\dxkqdn.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1956
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Local\omYiIL\LDeviceDetectionHelper.exe
      C:\Users\Admin\AppData\Local\omYiIL\LDeviceDetectionHelper.exe
      2⤵
      • Adds Run key to start application
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Meeting request.pdf"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2348
      • C:\Users\Admin\VirtualFile\LDeviceDetectionHelper.exe
        C:\Users\Admin\VirtualFile\LDeviceDetectionHelper.exe 784
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:2796
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2116
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005D4" "00000000000003C0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76b1a5.rbs

    Filesize

    8KB

    MD5

    8f25a1bbb07815dc51a8970dd658d35e

    SHA1

    50fa7d4aceacd0b5c64658a4e5cc5f09985ba711

    SHA256

    ea84cb7be87c6f9ca05a7a7ce498fe53e51d7acac87af5cba0b2448ea76446d6

    SHA512

    79a79e40f500c30d26f0d1e08367d66f09f7bfb4d87f746af81ab3ed7e6c7955aa78abd4720d315dac55c2c7e4b6a074f370783060ef1f509ee16b18eb0ad73a

  • C:\Users\Admin\AppData\Local\Temp\Meeting request.pdf

    Filesize

    17KB

    MD5

    c145592950d5724fcfc2b5da5890b761

    SHA1

    90210e04f48ff60ff0df191e22212d4705fdf28a

    SHA256

    9d844b275725e6241f6e70d17ed68bb7eb90b684832ef5952a91a5040ffe5d94

    SHA512

    ddd4a05168ec650325a05d181fd10cdf9d96153e50a1fc371354feec73e54a3341cd9082ec34400f65190562732816e0ac1a16f0caa231e02c7700c75a0810b8

  • C:\Users\Admin\AppData\Local\omYiIL\LDevice.dat

    Filesize

    673KB

    MD5

    d55000e2cae6781323ce121622529394

    SHA1

    f4891f1997b460170673edff6bc69f2f2fe814a0

    SHA256

    d188e877066f0932440d4cd8e8e2e856d7b92d40b475b7c0f0c996b34a2847a4

    SHA512

    410c8d00123bdaa405f119466d03f67dda983bb152cea672c80137ab3fd956b2b9685f8c8874ab9f93d50b9c7a2a6fccd7698e608bf3117a9d753a270bf8def7

  • C:\Users\Admin\AppData\Local\omYiIL\LDeviceDetectionHelper.exe

    Filesize

    1.7MB

    MD5

    084fe5e54dbf4d7287b48c5695d02d17

    SHA1

    58a2693e67491569e9c8f17730159c64ffb5e6dd

    SHA256

    282fc12e4f36b6e2558f5dd33320385f41e72d3a90d0d3777a31ef1ba40722d6

    SHA512

    15fdad9fcebb45cce0c45fe82b387cd2f2602884f9b7f85d9805e26e7edd442b8ee814f5cdce12d207a74c3b38d524ec61738d45f72d2523d4fad31dabb1e154

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e05f85018867c099b8f2cdfc0c0fa3ec

    SHA1

    a89d45d6b8a8fdb2b4d8b7abe2f420192f59d666

    SHA256

    b0f12229f85f552141bfc928b3782c937be200c57d5320db5b3ed54a1fe61a55

    SHA512

    2a1d2bc669d1d01b078ce5d70ab100a8f0cf04a6a9290507df4ebd2ec4b7f1afed033cb3c48423f1312d268bd757fecf2c50f2a517d32229fedb90d4edcd4a63

  • C:\Windows\Installer\f76b1a3.msi

    Filesize

    1.1MB

    MD5

    9794bd903f9baf249251c3beb693fbc9

    SHA1

    7484ff4f837cad55c85cac20c3597eb683852068

    SHA256

    71e462aaca0f2d8c8a685756b070d017c796de6ac22021a79d922f2f182d4fb0

    SHA512

    f0bcd8ad6dd273d19088244c97ca7d1eb25aabebd5be1eafaf35ba0238484d57c7820882a7456862f4d15f773be82e477877a3e2bc0096a9c66df3e6db6608f3

  • \Users\Admin\AppData\Local\omYiIL\hid.dll

    Filesize

    259KB

    MD5

    46c7df4387eac84be4e81e40cde0d9ea

    SHA1

    7dbb43023a78a1c8eb3412e2463454cece664d41

    SHA256

    c5aa22163eb302ef72c553015ae78f1efe79e0167acad10047b0b25844087205

    SHA512

    16328644688b91d465ca0a5243a93944c7acadcc0f01b58bb7cd5ffb8afbe5c351a6c555e9a71bb9512451a4d178abb9643f49ed901f0f8f464fab1b4c3012f0

  • memory/1828-49-0x00000000749F0000-0x0000000074A28000-memory.dmp

    Filesize

    224KB

  • memory/1828-30-0x0000000003420000-0x00000000070CE000-memory.dmp

    Filesize

    60.7MB

  • memory/1828-31-0x0000000003420000-0x00000000070CE000-memory.dmp

    Filesize

    60.7MB

  • memory/1828-45-0x0000000003420000-0x00000000070CE000-memory.dmp

    Filesize

    60.7MB

  • memory/1828-29-0x0000000003370000-0x0000000003419000-memory.dmp

    Filesize

    676KB

  • memory/2796-69-0x0000000003430000-0x00000000070DE000-memory.dmp

    Filesize

    60.7MB

  • memory/2796-70-0x0000000003430000-0x00000000070DE000-memory.dmp

    Filesize

    60.7MB

  • memory/2796-71-0x0000000003430000-0x00000000070DE000-memory.dmp

    Filesize

    60.7MB

  • memory/2796-72-0x0000000073670000-0x00000000736A8000-memory.dmp

    Filesize

    224KB