Overview
overview
8Static
static
3au.exe
windows7-x64
7au.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$R0.dll
windows7-x64
3$R0.dll
windows10-2004-x64
3Data/sqlite3.dll
windows7-x64
3Data/sqlite3.dll
windows10-2004-x64
3Office2007Blue.dll
windows7-x64
1Office2007Blue.dll
windows10-2004-x64
1au.chm
windows7-x64
1au.chm
windows10-2004-x64
1au.exe
windows7-x64
7au.exe
windows10-2004-x64
7au32.exe
windows7-x64
1au32.exe
windows10-2004-x64
3clearpasti...ry.vbs
windows7-x64
8clearpasti...ry.vbs
windows10-2004-x64
8createsrpoint.vbs
windows7-x64
4createsrpoint.vbs
windows10-2004-x64
1da.exe
windows7-x64
3da.exe
windows10-2004-x64
3hstdel.exe
windows7-x64
1hstdel.exe
windows10-2004-x64
3rc.chm
windows7-x64
1rc.chm
windows10-2004-x64
1rc.exe
windows7-x64
3rc.exe
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
au.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
au.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$R0.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$R0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Data/sqlite3.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Data/sqlite3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Office2007Blue.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Office2007Blue.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
au.chm
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
au.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
au.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
au.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
au32.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
au32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
clearpasticonhistory.vbs
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
clearpasticonhistory.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
createsrpoint.vbs
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
createsrpoint.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
da.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
da.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
hstdel.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
hstdel.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
rc.chm
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
rc.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
rc.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
rc.exe
Resource
win10v2004-20240802-en
General
-
Target
createsrpoint.vbs
-
Size
283B
-
MD5
bb87f875b79156bffee6707ca4dee575
-
SHA1
16840d1edeb24c0b38e9a3b9b70d63782fecd87b
-
SHA256
31a7831b55d8060c28993aeb1e759b8000c3e65adaae3e593de64b5416e44f55
-
SHA512
257a4ad4ee309cc6fa74763c8c08219ddef3d071b825979133f7db10c9cb69b5f56296e111f32f0be31c087dfbc100acf8676f6b1c7c15746452ac7aacb67170
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeBackupPrivilege 1564 vssvc.exe Token: SeRestorePrivilege 1564 vssvc.exe Token: SeAuditPrivilege 1564 vssvc.exe Token: SeBackupPrivilege 940 srtasks.exe Token: SeRestorePrivilege 940 srtasks.exe Token: SeSecurityPrivilege 940 srtasks.exe Token: SeTakeOwnershipPrivilege 940 srtasks.exe Token: SeBackupPrivilege 940 srtasks.exe Token: SeRestorePrivilege 940 srtasks.exe Token: SeSecurityPrivilege 940 srtasks.exe Token: SeTakeOwnershipPrivilege 940 srtasks.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\createsrpoint.vbs"1⤵PID:3212
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:940