Analysis

  • max time kernel
    90s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 13:10

General

  • Target

    WPS_Office_PPT_PDF-_Setup.msi

  • Size

    235.0MB

  • MD5

    c133af8d7143792b5aa031cbb309911c

  • SHA1

    37b422febc70760fd4fced0274d95318a6c618c3

  • SHA256

    32bd3d0af943aafb44165de5791d6e3338eb5b3e93548383c6d04fada69f7411

  • SHA512

    af6e21fc6b1e1bc05aaa9d34896c3142b793c4a070a6112b5d123108322f56a4ec3009d868aeacf9accd72dc2d4bfc8b9f55140f7915840c73dae6fd1f09190f

  • SSDEEP

    6291456:Sn1t4VK0dF9sQyMGulGZ0PbOs9mGUdCqGFGwhJHDO:s1t4kOXRa0Cs9/UdCqkX

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 10 IoCs
  • Loads dropped DLL 10 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\WPS_Office_PPT_PDF-_Setup.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1252
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:468
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C4C9609B0C2B73053A767CB3D6764C19 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:732
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4520
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 3E76BB7EDBCBF30A710A5EFB8EAAFCFD
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:3688
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 6C91DCCDB2EE541AF576F257B6B579EF
        2⤵
        • Loads dropped DLL
        PID:4796
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:2584

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\e5810c5.rbs

            Filesize

            26KB

            MD5

            5b95844b25edd54f3fe37b5e6c524b8e

            SHA1

            468a9305568362e24ed0ddb0689e6e96f20e27a1

            SHA256

            307d1a0c5947df687ca3745c44f5447e413d3ab8215918f4a008239418b22a43

            SHA512

            af82c02b3fe4b790316d38450b0ee70e380a726cf361f24790d2e1317480a3088338cbdb2cd94538a779f81297f0f6430c1ced0d2704ab86ea59e4874cff3a60

          • C:\Users\Admin\AppData\Local\Temp\MSIBCF7.tmp

            Filesize

            557KB

            MD5

            db7612f0fd6408d664185cfc81bef0cb

            SHA1

            19a6334ec00365b4f4e57d387ed885b32aa7c9aa

            SHA256

            e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

            SHA512

            25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

          • C:\Windows\Installer\MSI1F00.tmp

            Filesize

            25KB

            MD5

            81902d13c01fd8a187f3a7f2b72d5dd0

            SHA1

            0ac01518c5588eb2788730c78f0c581f79cf2ed4

            SHA256

            eef31e9195cfacde7b4e7eb7384c8178d8811063b375fd4a28ae897cc180c6a6

            SHA512

            04d6e2e937328477803084e0ef9da2c3636cdc9d34af74e2d1871d7190be21cbb2771ae835175e104e24eccba52add1ba6f58407bfd522ef82b81d76e977f24c

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

            Filesize

            23.7MB

            MD5

            9af17681170b1334108ffb08b10bc40d

            SHA1

            069b4a578a17a2bc8a91e200277c1a74bcd502fb

            SHA256

            f849c5415b2a715a22f9f08b566d0cb2c4e9a18e753ce590b2488133f08ee20c

            SHA512

            3b4629ffca9fc39aac00154eb5f467990208456105b132d143483655f00252f1d652e3c83d7cd7438179ef359756026d4c9950cf800817de17df506ea02dfe82

          • \??\Volume{f1c9ec80-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{e8d64bab-fc9e-4dd9-af77-1179a29fff3c}_OnDiskSnapshotProp

            Filesize

            6KB

            MD5

            e1f8182920904aa71ec070e7fc5e1316

            SHA1

            bbed1120be7ffac7faf0951a5638b9d7f709bb26

            SHA256

            1f3ccb288e6585b948836d2e94484f6a1aebacbf8b2840ead3a59257e555154e

            SHA512

            8cbe8bcf38b2e5e025a1cb8a7e2d46210977365592d934489620fb199585b19e4f76d7839a4ccab45f59cb51003d8b6f00b014fd998d9326df64a8db248080ad