Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 04:46

General

  • Target

    MicrosoftEdge.msi

  • Size

    436KB

  • MD5

    6ff3f0a2f7f1ec8a71bed37496e2e6fa

  • SHA1

    66a0ba30d846d65bd91b716e1226b15be42958ff

  • SHA256

    455163bfa49326fb7787af85cb0decc84100533da38bbdcbf06b2bdb6f7f521a

  • SHA512

    41641ec872adb885d483a8b229065caf860bde933f7883b158ad47ab0bdddd1a2e92c3d5cf9e7d6161fb251b0020467e5b4db8855fdaa202f0132c658267a2b2

  • SSDEEP

    6144:etO9iRQYpgjpjew5DHyGxcqo8Cs+QVAnjOl4ieipV8VTGUpHN7UjjIU5ei:etVRQ+gjpjegDro8s48yee8VzHigUc

Malware Config

Signatures

  • Detects RPCBackdoor 1 IoCs
  • RPCBackdoor

    RPCBackdoor is written in C++ and first seen in 2021.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\MicrosoftEdge.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2140
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B63C156EDC5951E934963271A474E388
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-57c8231a-51ff-415a-915e-ca935f8129d6\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:776
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1528
      • C:\Users\Admin\AppData\Local\Temp\MW-57c8231a-51ff-415a-915e-ca935f8129d6\files\MicrosoftEdge.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-57c8231a-51ff-415a-915e-ca935f8129d6\files\MicrosoftEdge.exe"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2684
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:536
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003A4" "00000000000003C8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MW-57c8231a-51ff-415a-915e-ca935f8129d6\files.cab

    Filesize

    189KB

    MD5

    ea5e9cf992aa209fe006fb7ca4195b1c

    SHA1

    270447b93d176e7f920a062a7a08eb7947c36163

    SHA256

    cc50776e1e460cbe8f2d9ea083ccc273c79cdeefeef60c04946d759d1d0eb77d

    SHA512

    0210453862c89a4f8e5d03f69bed3cd01a296bd3da31e200b2aefcc089734bdcd7720710643a8e4f58c150c55bced83bef05340c180e1d9ff303736fe11208fa

  • C:\Users\Admin\AppData\Local\Temp\MW-57c8231a-51ff-415a-915e-ca935f8129d6\files\MicrosoftEdge.exe

    Filesize

    147KB

    MD5

    fc860959580c124e7e4781bb08437681

    SHA1

    b551dd88a1d3d5f277dc174f5d9d11eeea0dafb0

    SHA256

    eca127142a480fe51e7748159c8d219313a4730d60dc22c4dbbc1bd4d6a67b66

    SHA512

    abab3d964d5e7b1bdf365a429cbc5b48614f4fb64281d5c0a4b0ce0ab3580fa539ca0f33bc4243dbbe5c6649fa0ce1a2a89de12725a78971001cd768aeb075d2

  • C:\Users\Admin\AppData\Local\Temp\MW-57c8231a-51ff-415a-915e-ca935f8129d6\files\OLMAPI32.dll

    Filesize

    279KB

    MD5

    b1a8d000b6a66f272a5859c405c894b0

    SHA1

    67cd211ad46cf072ddf210631989713e52336789

    SHA256

    c8b93075675b6b90cc5a2f58bdd1c52088a511485efd2f9bb6de54c9736e98e5

    SHA512

    2dcd268e0840febd7eb3e06bc099c29ff3838b5e75cf0b0f21e65e246bb2be8e2508632488a3804dc0d5f4b2456bdf97fb815eadab9641e34fe62a937de9b94b

  • C:\Users\Admin\AppData\Local\Temp\MW-57c8231a-51ff-415a-915e-ca935f8129d6\msiwrapper.ini

    Filesize

    1KB

    MD5

    92448a12f3fab1fd2c6743230123e9b3

    SHA1

    fde4733afb5c9a64292be7adad688178d4e7b17d

    SHA256

    51172549656bddc5acdf0c8269df960e8d0d12422fb5d6ae2ba69849e6a4a683

    SHA512

    1c37574e4fb39a4320519e23c58bdae427d4352dd7a63d07b21065f759176323209327ab460497f41a0e3232d8a40db3b45828ea09a10c37b88f1caecef891b8

  • C:\Windows\Installer\MSIDAD5.tmp

    Filesize

    208KB

    MD5

    0c8921bbcc37c6efd34faf44cf3b0cb5

    SHA1

    dcfa71246157edcd09eecaf9d4c5e360b24b3e49

    SHA256

    fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1

    SHA512

    ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108