Analysis

  • max time kernel
    53s
  • max time network
    63s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-08-2024 21:52

General

  • Target

    SDCardFormatterv5_WinEN/SD Card Formatter 5.0.2 Setup EN.exe

  • Size

    6.8MB

  • MD5

    fe107d7154caab6c0c9b923b026b5ecb

  • SHA1

    ec2897db596e234abca3932ba47e065fb3110f9c

  • SHA256

    cffd14249bc58b3a9f7bca75b32f5f6bbbe12283c93c74133908be2f99c047c3

  • SHA512

    aad70ca57f903d59aaa8061e3da508c99d5b3bdcbfaba107337c578df4f86da720a1d6806a3188da8ec179f2bf1a74d9208a018b87d0094493030d33ca10c0fd

  • SSDEEP

    196608:flq+1Nnnajel1vEEBhR/OjON1Xy6VY91Shpnx/uwk7:XnaiD849OjOJXu91SlWD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 19 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SDCardFormatterv5_WinEN\SD Card Formatter 5.0.2 Setup EN.exe
    "C:\Users\Admin\AppData\Local\Temp\SDCardFormatterv5_WinEN\SD Card Formatter 5.0.2 Setup EN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Windows\SysWOW64\MSIEXEC.EXE
      MSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Downloaded Installations\{2FF5D07D-7CA7-4BD6-8D3E-053A26A24C99}\SD Card Formatter Setup.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\SDCardFormatterv5_WinEN" SETUPEXENAME="SD Card Formatter 5.0.2 Setup EN.exe"
      2⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1040
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 8A4D095BD589D551D87057F22BF795B6 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Program Files (x86)\SDA\SD Card Formatter\SD Card Formatter.exe
        "C:\Program Files (x86)\SDA\SD Card Formatter\SD Card Formatter.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1920
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2412
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 4E36A7D6F88CEC246352E1BF677EFBF9
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2176
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57e9f3.rbs

      Filesize

      9KB

      MD5

      5a9cf0217f45ef798b2ac67703a550ed

      SHA1

      a406da83d7b6ba8220ec3ee8a1960b8ce8420b42

      SHA256

      edf6df6fa68e3a50b7dc939739e469e3813307027dd02e0cb68354eb152d32e5

      SHA512

      5d1661d81cc5ed3361593190c1ed9063364d671f666793a5529f5ac5f903d575168bc6d275fc3d748bfa58aaa4c27b9041cc74af4bb5d0e50ddfb6e74c037532

    • C:\Program Files (x86)\SDA\SD Card Formatter\SD Card Formatter.exe

      Filesize

      3.5MB

      MD5

      be4c31541957e8e31f3b9d3794bd1ad5

      SHA1

      03f85b4f8bbac114c192a308acf3ad2b55ac8f86

      SHA256

      ea210d7ff1d49bf61c55d6ca208277f5fdac8710296714323a37893b97caa0f2

      SHA512

      1d68bcecd1ca7b1e4dd404be511184390c3f5de97879091aede312541119ca632378d41aeaabb9c3df6c22c46f9d67a77f587effccc70a88759c26ab393a1bb1

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\SD Association\SD Card Formatter\SD Card Formatter.lnk

      Filesize

      2KB

      MD5

      d84c87e7dadf5aa5a6844ae880e83498

      SHA1

      8c13f5ae3b6bd1ec58e306ef5ea0904e9ee57853

      SHA256

      69b35a7c42d6f07873f79b3591696cc7415d776666073250f0f80df15ecbb4eb

      SHA512

      d0dbe5b8fff2794e1a2dd892ce93616df209e344bbb5296df59dec98d8fd479d8f2b5da5ebcab1f4c2251521e59a8d167c66260812d34d39cb880dc4cf223b5a

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\SD Association\SD Card Formatter\SD Card Formatter.lnk~RFe57f27e.TMP

      Filesize

      2KB

      MD5

      f305f139b1434fe26232ea4c95796dd7

      SHA1

      40f900a0547429506c4166e059f070b781fd708e

      SHA256

      008119d761e7210bd38fb47c57dfea8120ee85078e0fce595f79e08c368bfc56

      SHA512

      bacb975625d4c7d0b7718414ebfd46e1e31de581f8829488dfeab489e17e32bd4fe5a7e485c01fdc56fe0c16054b37cfdca364eadf6a9b1195e75ac3df22cc88

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44D

      Filesize

      471B

      MD5

      e2604a85305d6ed6ed4596963997e924

      SHA1

      953d6bf3f425c22ed18c4e6bfbbf098d2310ba5d

      SHA256

      e314629074c0653d64db6fe5cbaf22b1702566dcb033ccc21bb4fd0066392610

      SHA512

      ab0cb67a7ce11e7d20028dd77d7912e43e1d9d5c5b5e2e2166a2fc039b215d0ce12acce97b8eb0c00364372ced890520aec27ef9a96fad37c1eb212b046a65ae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DA3B6E45325D5FFF28CF6BAD6065C907_13C665649EC7F70E2E63F7F28DC6D0C6

      Filesize

      471B

      MD5

      4fa747886c5eb4bfcf1febfe36cc01af

      SHA1

      a6931255c6a7da25e9b3b37b6f271246b3342727

      SHA256

      c34887642565230b0c56f4cc86353652283b124625be2bb3d08f470ba69d645f

      SHA512

      47af9530ec3792c46eabb45c9dc535c22204feff4c860d391abbe8b8f881706bec038c992f2c02cffe829e7d0016ab9549ad6ab741a014c66b117b6da2633569

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44D

      Filesize

      396B

      MD5

      10976fcdd1bc7268d20d30e41b755fd9

      SHA1

      26a50cad82a1a77ab41513ba3a9af2a089477280

      SHA256

      589cf2d9e99e9ea89f0b355407daefb905a60efc824075ecfa0fa7be2059bc35

      SHA512

      53e97ad1eed5c95b0b8bdf214a132f59b19405e93301bd715a1b4f9e7deb1b01d3593922d8c1e94cf75216248e6c3a61db387b026731189c44621d1b10a51578

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DA3B6E45325D5FFF28CF6BAD6065C907_13C665649EC7F70E2E63F7F28DC6D0C6

      Filesize

      408B

      MD5

      cb3d09b5f48030a597f73de8522dc67f

      SHA1

      626385d9bf655a237dbcbbdc290acb9e0a2adf19

      SHA256

      3cfdc9ccdf905ba4122e34b26751e40b4e02e8783068a673feb3d3f7ee930668

      SHA512

      0ef0fead2488aa2700fa3679207f3ad050e93bdf1161be94a0bdb42407a70b671883d086206528a0bc511d8af396c7d646ad25822cbc0d7bfcc3bc5e9b9d23f6

    • C:\Users\Admin\AppData\Local\Downloaded Installations\{2FF5D07D-7CA7-4BD6-8D3E-053A26A24C99}\SD Card Formatter Setup.msi

      Filesize

      4.1MB

      MD5

      07bfa577fc716b47d583dd96c3ea84e8

      SHA1

      f1fe68dfb27e08af14dc6a55887bcd377690d563

      SHA256

      a61acf097056004158ba0b12ce38f6f48118b1e2d8ef94722d818a1a2788d351

      SHA512

      bc386973230c61c6c783b8b156939e15f724c7c8a2dfa222dfade1109460a42be7d0b7a975447fe71258c8c43b89345a8912c624a5a48553ab0f8a96cf01ab73

    • C:\Users\Admin\AppData\Local\Temp\MSIA817.tmp

      Filesize

      153KB

      MD5

      c90f51e8f8c547ce8a48c22ecdcf5304

      SHA1

      b7a5831e3678693ebb254b5720a58020c0772551

      SHA256

      226f3e224bfc7d77afff0f3d9048d1727eea7aa5e2e443f8cc55baa7dc5c6473

      SHA512

      ae667b38251f4ec2062a42f8238ac8391a2aed0a2833a5320d3b296347a689e59a4f442add547b6a202aea4ddcab16e3db823452e18714c69585efed0c4e9903

    • C:\Users\Admin\AppData\Local\Temp\MSIFE18.tmp

      Filesize

      103KB

      MD5

      04289ede648990e01435a99f616c8fdf

      SHA1

      bc81ff546d812d0f88ed7a98717e77d5e34b61fb

      SHA256

      6629a2fe72efaded5d12e072a18b0cf065b2c9600a6401645ca1d7804f7edd14

      SHA512

      cacbadaa96d1f6200fa02ff0c643324c870f95b587e27460af0da525105815380fede9d8d196fbdcabfaa007c404b7487e43407b46585b919f6fa68ea8de358d

    • C:\Users\Admin\AppData\Local\Temp\{6338FD6F-EAD3-4CFB-9F51-FDC5403B4BC1}\0x0409.ini

      Filesize

      21KB

      MD5

      8586214463bd73e1c2716113e5bd3e13

      SHA1

      f02e3a76fd177964a846d4aa0a23f738178db2be

      SHA256

      089d3068e42958dd2c0aec668e5b7e57b7584aca5c77132b1bcbe3a1da33ef54

      SHA512

      309200f38d0e29c9aaa99bb6d95f4347f8a8c320eb65742e7c539246ad9b759608bd5151d1c5d1d05888979daa38f2b6c3bf492588b212b583b8adbe81fa161b

    • C:\Users\Admin\AppData\Local\Temp\{6338FD6F-EAD3-4CFB-9F51-FDC5403B4BC1}\_ISMSIDEL.INI

      Filesize

      20B

      MD5

      db9af7503f195df96593ac42d5519075

      SHA1

      1b487531bad10f77750b8a50aca48593379e5f56

      SHA256

      0a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13

      SHA512

      6839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b

    • C:\Users\Admin\AppData\Local\Temp\~9114.tmp

      Filesize

      5KB

      MD5

      8336066b51c5388ac78a6f303bc3b81d

      SHA1

      f133ed15f406350757637af8ca803f3f3d3b0798

      SHA256

      cbc5fecbe82ef986de124fb6f0d00921c015d6508b64bdf2cd8bb9a1a0256752

      SHA512

      e7b79f56d035888e04a7a1fd0bbcbb4c361077411033febfff8f863b71c2ccf41f433f0691fd21ec7d76b4bd5ab3e23c2c0c9d3656e9b8082ed0de97a4845066

    • C:\Windows\Installer\MSIF06B.tmp

      Filesize

      105KB

      MD5

      29e4cb02681bf0780985a429b48903ca

      SHA1

      474acf63ad259fa06164916259a40ffe8909f622

      SHA256

      3dd81287d4318c25ed9f0afa740c3ca59b746d9a587735e1e33107c14e1b40e0

      SHA512

      5c491bf4357bb1cee86ff0eb9662f6046c32b7e8b8fb406f12e4f866885a25994c34e8f46315f98f116be27a6a7a06c21ca52b030aacb1c1216910ac339500a1

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      12.8MB

      MD5

      0e552f5cc7f58eb45d0b6790defafe83

      SHA1

      47885763e3df0281ff25333c39cfcc6e66bd8a94

      SHA256

      660b80bfacb8fda4c8bfd6da29ba4574e233056f7a513f3d8fd051e8992099b8

      SHA512

      562dba39a1f0c135f57aa5a94db53af46896fcc5eb2feb784803fa0607e973d47e8bf697b5a72184c9af820b6131860edef5b52818c97cd0dfb7cc671b916e5e

    • \??\Volume{3a4c38fd-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{a8a68fa2-1f6c-411b-a103-8b2bdb3ae484}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      6dc90426f2e77279510cd4fbba3656af

      SHA1

      ce46d99cc223eb0ff60f94614c5b16b4a9689998

      SHA256

      e9b7be5593a31e3b84ee363222dd3cff52807284949bb7fe24bb6edcf17328eb

      SHA512

      363166e0c2aaac8da0b9188698ed0cb64c8b9ea8e956eee01828e4432ee8041d295c3c6d0f1d5cab3bb47abc85de3da9a8695ea09c6adc4507353f3f5cfe60da