Analysis

  • max time kernel
    44s
  • max time network
    46s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 23:47

General

  • Target

    playit-windows-x86_64-signed.msi

  • Size

    2.1MB

  • MD5

    818632a790c6f405474d29e66bd9bcec

  • SHA1

    0140d14851f2a16e37fe4a3b1c126d4b2cead3b1

  • SHA256

    91ff5e398d2c7b7c04e7ddfd58936246839f27d8db7b7474d55e1b38a7b634d0

  • SHA512

    2285fa657cb372e571d3487d68be9b534b8308cfd086e8a0499945f604339a9d71e4103494d41eaed783bb1ff986307ef9e18dfce67c5e53d4b0b5dd53327b04

  • SSDEEP

    49152:2+vdFMXhTj0et/HJQ+rd7OYJCYE312NXNdmVci2wy9SIT7ZGjYTytJPr+VuOSAEq:2+rYxQ+rxOZ12NbmVci2wy9SIT7ZGjYB

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 25 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\playit-windows-x86_64-signed.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:860
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3316
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1944
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3540
    • C:\Program Files\playit_gg\bin\playit.exe
      "C:\Program Files\playit_gg\bin\playit.exe"
      1⤵
      • Executes dropped EXE
      PID:3064

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\e57e511.rbs

            Filesize

            9KB

            MD5

            3c8dce2f3278f3f80b7a9623803ea113

            SHA1

            394be01c4ccf784bda12b5de7c66149047a26ce1

            SHA256

            34f535969b603d4864cdddb497c65ea9ddd830a9d25627ce0db3240ace6397b2

            SHA512

            639459704ea805ea2c301c8fabd2341c58ead4f32c2e7f3e4bf395c9f0db6729ac6cd6e95b921b5fb48cad6f66bfa505e490aa1e1a061fe6985b95d0244cb5a5

          • C:\Program Files\playit_gg\bin\playit.exe

            Filesize

            3.8MB

            MD5

            8af54595d5bdfec004a39451268573b2

            SHA1

            f03fea37148bba2ef7a2d57286a1d85a463287b0

            SHA256

            f87212b62acb8d8f3b1a0ccc1b02d7af44ba09c7d6a8bf3c62bb7ec03f736166

            SHA512

            2473aab6ed691483ca5ad52530c648139d20cc5d55875848adfc92fdb415521031f947a80c5c1cb07316ee904b4651ce3f18cc540010d067dce561f889931393

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C42BC945025A34066DAB76EF3F80A05

            Filesize

            63KB

            MD5

            44dbe3aa02117bdede435e83b2e215ad

            SHA1

            2c6a5a8389b76a6f45879c3a3475253084ad5eb5

            SHA256

            c1eea21d2024ddb7738c29402fb050c7231ecc56fb120852a9fc05c964dc264d

            SHA512

            f8c6d74c8d9e461734c2ae1e90a5e6e90fed1c64917fbe11ec5f56cb57756462758caed757dbf3442a6f6dbe394473b23dface88589511333e8fafc2736d185e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

            Filesize

            727B

            MD5

            7a3b8457313a521e0d44f91765a4e041

            SHA1

            4ea8ecb5e7b4c11f4c491caf6cee7ced5ec4c267

            SHA256

            2b08ecf53bb8b6c430659926148f896102dc80b5f38b0ec5efe122199659651c

            SHA512

            7349fd1b8c490d540a8bb25f40587f9874ff5d9b1f9bdb2ea69db9218ebdbdccea5e4d6645fbd1098d051b008b1ebfd12a619c3a4d6fb54940705ab14933e159

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C42BC945025A34066DAB76EF3F80A05

            Filesize

            314B

            MD5

            dba7ed8860974e3bbbf689823733459d

            SHA1

            a64ef8419b0cd1e6d7ed715eb39f476ac362b831

            SHA256

            874d6e539cc78d3d8a2310e714962e382c46414486c4b3558aaedf44d125f88c

            SHA512

            6ec750202a8624f66c110e9acd3808727bc5daef93aa439de5570922dfe767c8bf771b3f9bdee4538230b9a93f3b928c4b8ad175f9dada0c26081e4c1f5fbf91

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

            Filesize

            478B

            MD5

            81517578d2c1f5aa1d8cccba2f828318

            SHA1

            f67d7e7299a8d24a4efaac85ba288c378c193f33

            SHA256

            7736a6331e571cb6e189128795ec4019c82ded4309e3bb2aea00fdaf65a9ce74

            SHA512

            fb9357c3b9a7868cb74bf98307fe7fc2e526c0d4d58f029a27e9464ea19cc67ca6384e3273d034748cac7ac6a534e78563f3bba068af08dfae37d589168d0ba8

          • C:\Windows\Installer\e57e510.msi

            Filesize

            2.1MB

            MD5

            818632a790c6f405474d29e66bd9bcec

            SHA1

            0140d14851f2a16e37fe4a3b1c126d4b2cead3b1

            SHA256

            91ff5e398d2c7b7c04e7ddfd58936246839f27d8db7b7474d55e1b38a7b634d0

            SHA512

            2285fa657cb372e571d3487d68be9b534b8308cfd086e8a0499945f604339a9d71e4103494d41eaed783bb1ff986307ef9e18dfce67c5e53d4b0b5dd53327b04

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

            Filesize

            23.7MB

            MD5

            49255eb6ae8a975fc1aa9a81f1e06a3a

            SHA1

            23b3fc84b7f8be1d0e7ff4a712cbffbc371869ec

            SHA256

            f7cfec6381369383b2c66bf1c440bbc8ce89a5688487417465a263afa5075252

            SHA512

            c354e6997e469c905c4795be88a665ef32cab1dcd6185e72213811929004406c9ca35ceaa3b5c70cb6d71c5d88fc6f0b3072c9f593adb32de08a847f5aabc911

          • \??\Volume{848480a2-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{e83ffa53-eafc-48f1-9e35-ddad80127965}_OnDiskSnapshotProp

            Filesize

            6KB

            MD5

            d7686fadba20191931cbd0773ea2954f

            SHA1

            02ad092bbabde3a9675cf77596c7d53934d16772

            SHA256

            336b5fdf8f2d2c6837ef278d8d29845c5aef1e87804bd9ed911dbb4fa5551051

            SHA512

            67b0191e820d91a95818a4c4cf6128536f12659fe445b2c81bbd8450c0d91bb3a028ed593d9b5f42ff9226472e743e4716e711ed656a03a76a208c3bf755c204