Analysis

  • max time kernel
    0s
  • max time network
    4s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 11:33

Errors

Reason
Machine shutdown

General

  • Target

    Insyde/spoof.bat

  • Size

    39B

  • MD5

    00b669e9102e6055f3ffb59c495f9590

  • SHA1

    33663eeb1eb9dbd1fb9d7d8da05ff682a0b77817

  • SHA256

    9a33bcec16224a280916ee5362c09e5c4b9e23b578802824250710d8cb5e3bdf

  • SHA512

    64564a7c15c35f2a8f2f0490b015461831ceb8db1d23481b2fed6b396333d931663f2fe3684b7d54dc3ca99ea89b8527d570ee19969561a23bf71dcfee93a5f6

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 42 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Insyde\spoof.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\Insyde\H2OSDE-Wx64.exe
      H2OSDE-Wx64.exe -SU AUTO
      2⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2504
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3336
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{f770d823-ab2c-a041-9da4-30c75b5dcff0}\segwindrv.inf" "9" "49f798bf3" "000000000000013C" "WinSta0\Default" "0000000000000150" "208" "c:\users\admin\appdata\local\temp\insyde"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:2844
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "211" "ROOT\INSYDESEG\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:ed86ca1156c0ee7a:Insyde_Device64:6.1.7600.16385:{416c2604-443b-436f-9e1d-607bdc3cc785}\segwindrv," "49f798bf3" "000000000000014C"
      2⤵
        PID:4484

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\{F770D~1\segwindrv.cat

      Filesize

      10KB

      MD5

      43d3603cf918445cbd1d7253b49bf527

      SHA1

      fabfaee55f2c4e6ca508d735b297bdb738ab1c7d

      SHA256

      e830efe7786b0fb9dd84eb647614fa1795ec5caa605d44d9a13f0fdbd0f4d6b5

      SHA512

      183b8498e4c86966050be324a027fc0a7f8179bb77d032ec97cf64ab91dac72c8e7fcdda36c733c2815973b72c91cee19d3263376a7e3b955c616f548690186e

    • C:\Users\Admin\AppData\Local\Temp\{f770d823-ab2c-a041-9da4-30c75b5dcff0}\segwindrv.inf

      Filesize

      4KB

      MD5

      843fb7475608ce359da7cbd48fa3ab1d

      SHA1

      ae16643aa1756b34391e4c615958343ecb17b153

      SHA256

      e1449864c7403b9cd3d828c6fc9710fe1fbb3f35c7b6522a5dcbcf97685f40d7

      SHA512

      9db610ebff1ab1e24147abadf10f978eab95358f2b0806d17fb8df6e53723b0523dd26d0207430d029f5b6826a02c3a5d73ff01d8f6e28d53e82c230075f2b34

    • C:\Windows\System32\DriverStore\Temp\{c1be4084-307a-9b4d-8ecf-2cfa8de5048c}\SET96C2.tmp

      Filesize

      103KB

      MD5

      e46dfe45c1714f4920d3fd2546f2f630

      SHA1

      28cdb0b48c1d88d71421ec9e40ce52836ab79956

      SHA256

      b44f4384f95cc9d3f86f0c27fc0abba9a291a7cc24483f41e70c1234bc61edc6

      SHA512

      97480d19e22ebef836e61f33d5540c41a08a9edc71af97a59fef71b3d60abd9ab78b32896ee0812cae1780da08f875e3cb32c048edf4fcae523fa04e23d2246c