Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-09-2024 13:58

General

  • Target

    WPS Office_104693057_401556.msi

  • Size

    13.0MB

  • MD5

    a8f0f41ccc09254856bc1bbd2151a15d

  • SHA1

    4926bf9e1ca27835ee5a077565979111614c3e25

  • SHA256

    745ae5ef809909bdda166d758a529907f4175f3131c451717ca22a536eec57a9

  • SHA512

    8371939ad373cb6b6a5bf2cc20158fd60e7ebf91bdc67e8326d63d12aac7efd2600296e52ef1b5ef7acaa8f061a343e3ad45b5f7c1f8ff72f2113ce1f0815524

  • SSDEEP

    393216:oGS3skS0F5Ky7pfJY/+LXwwhCtZRZ5bz/ueWr8bf:oG8S0F5N7pfJu2XwwhYZRDbz/uFUf

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\WPS Office_104693057_401556.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2240
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 86FC38DEF41B33035E8127E92763F815 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Program Files\CommunicateSupervisorGentle\TAMBkPWjDlUR.exe
        "C:\Program Files\CommunicateSupervisorGentle\TAMBkPWjDlUR.exe" x "C:\Program Files\CommunicateSupervisorGentle\RklfmdhbCMtmUxRFJWah" -o"C:\Program Files\CommunicateSupervisorGentle\" -pvZPJIQIwTATDNSQOnwpY -y
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2924
      • C:\Program Files\CommunicateSupervisorGentle\QRdpObipxd29.exe
        "C:\Program Files\CommunicateSupervisorGentle\QRdpObipxd29.exe" -number 165 -file file3 -mode mode3 -flag flag3
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1416
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:400
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005C4" "00000000000005C0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76ced5.rbs

    Filesize

    7KB

    MD5

    d2d6ab9b29f3181d007d4f0fc0a21637

    SHA1

    6f330e8c56aec5463c5633b3deb84e42a07b59e8

    SHA256

    c1f87284f52fa08d1c1db471ed70534c10c0ec2c470a7a0a2fbf28c7fdec9100

    SHA512

    f4efce4da87b937ad89db4fb8e570ae8c1ab9d51417ca35649c6eebb08b2ea3d3320e049613fde143529e35dc45274cc287aadc93b566415e9fbd9534e544477

  • C:\Program Files\CommunicateSupervisorGentle\QRdpObipxd29.exe

    Filesize

    2.0MB

    MD5

    b52576273e38bf9285ae6c4cc6c2949d

    SHA1

    e2a8bbe6420b53ddaa0b644e6d60e5643617c459

    SHA256

    34dce8d0cdb26cb18557dc37874f0eeb9d1125a76777fc4f794c9afcd061d17a

    SHA512

    3a0d4a7baf8647d603cb832694f6d58b116c49fefbcbc857d29831b8f47cefef6e60a12b795a3022a17110a8b1f5bbc146ae9745bcad280dfa91cf3d1ecdd1a2

  • C:\Program Files\CommunicateSupervisorGentle\RklfmdhbCMtmUxRFJWah

    Filesize

    735KB

    MD5

    e930add428550f33a9dd8ec3c3e731a9

    SHA1

    82c3d0fcc3dbefc590a95497e69ee0713a9b65ac

    SHA256

    4a82706a491f1da255a6c331d10d3901cb495b0df90ba5f205280eb93745274e

    SHA512

    c9464ce4fd5000522e74ec87ff63713db7ed404c9dba15264a1501933a36fdb584613a9b69d882c0d0ac6f0f8acc9ef2540e1d086aa2dde0da70b9587be1e681

  • C:\Program Files\CommunicateSupervisorGentle\TAMBkPWjDlUR.exe

    Filesize

    574KB

    MD5

    42badc1d2f03a8b1e4875740d3d49336

    SHA1

    cee178da1fb05f99af7a3547093122893bd1eb46

    SHA256

    c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf

    SHA512

    6bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c

  • C:\Windows\Installer\f76ced3.msi

    Filesize

    13.0MB

    MD5

    a8f0f41ccc09254856bc1bbd2151a15d

    SHA1

    4926bf9e1ca27835ee5a077565979111614c3e25

    SHA256

    745ae5ef809909bdda166d758a529907f4175f3131c451717ca22a536eec57a9

    SHA512

    8371939ad373cb6b6a5bf2cc20158fd60e7ebf91bdc67e8326d63d12aac7efd2600296e52ef1b5ef7acaa8f061a343e3ad45b5f7c1f8ff72f2113ce1f0815524

  • memory/1416-35-0x00000000002F0000-0x000000000030E000-memory.dmp

    Filesize

    120KB

  • memory/2560-11-0x0000000000260000-0x0000000000262000-memory.dmp

    Filesize

    8KB