Overview
overview
8Static
static
3au.exe
windows7-x64
7au.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$R0.dll
windows7-x64
3$R0.dll
windows10-2004-x64
3Data/sqlite3.dll
windows7-x64
3Data/sqlite3.dll
windows10-2004-x64
3Office2007Blue.dll
windows7-x64
1Office2007Blue.dll
windows10-2004-x64
1au.chm
windows7-x64
1au.chm
windows10-2004-x64
1au.exe
windows7-x64
7au.exe
windows10-2004-x64
7au32.exe
windows7-x64
1au32.exe
windows10-2004-x64
3clearpasti...ry.vbs
windows7-x64
8clearpasti...ry.vbs
windows10-2004-x64
8createsrpoint.vbs
windows7-x64
4createsrpoint.vbs
windows10-2004-x64
1da.exe
windows7-x64
3da.exe
windows10-2004-x64
3hstdel.exe
windows7-x64
1hstdel.exe
windows10-2004-x64
3rc.chm
windows7-x64
1rc.chm
windows10-2004-x64
1rc.exe
windows7-x64
3rc.exe
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
au.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
au.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$R0.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$R0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Data/sqlite3.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Data/sqlite3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Office2007Blue.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Office2007Blue.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
au.chm
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
au.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
au.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
au.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
au32.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
au32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
clearpasticonhistory.vbs
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
clearpasticonhistory.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
createsrpoint.vbs
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
createsrpoint.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
da.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
da.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
hstdel.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
hstdel.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
rc.chm
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
rc.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
rc.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
rc.exe
Resource
win10v2004-20240802-en
General
-
Target
createsrpoint.vbs
-
Size
283B
-
MD5
bb87f875b79156bffee6707ca4dee575
-
SHA1
16840d1edeb24c0b38e9a3b9b70d63782fecd87b
-
SHA256
31a7831b55d8060c28993aeb1e759b8000c3e65adaae3e593de64b5416e44f55
-
SHA512
257a4ad4ee309cc6fa74763c8c08219ddef3d071b825979133f7db10c9cb69b5f56296e111f32f0be31c087dfbc100acf8676f6b1c7c15746452ac7aacb67170
Malware Config
Signatures
-
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeBackupPrivilege 2692 vssvc.exe Token: SeRestorePrivilege 2692 vssvc.exe Token: SeAuditPrivilege 2692 vssvc.exe Token: SeRestorePrivilege 1656 DrvInst.exe Token: SeRestorePrivilege 1656 DrvInst.exe Token: SeRestorePrivilege 1656 DrvInst.exe Token: SeRestorePrivilege 1656 DrvInst.exe Token: SeRestorePrivilege 1656 DrvInst.exe Token: SeRestorePrivilege 1656 DrvInst.exe Token: SeRestorePrivilege 1656 DrvInst.exe Token: SeLoadDriverPrivilege 1656 DrvInst.exe Token: SeLoadDriverPrivilege 1656 DrvInst.exe Token: SeLoadDriverPrivilege 1656 DrvInst.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\createsrpoint.vbs"1⤵PID:1748
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003DC" "0000000000000304"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1656