Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
wpsupdate.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
wpsupdate.msi
Resource
win10v2004-20240802-en
General
-
Target
wpsupdate.msi
-
Size
18.0MB
-
MD5
a73709d320e1160a965987bd3298b0bc
-
SHA1
2b1942cad548a048f62eb643573baf671696c5ea
-
SHA256
d5d245b5e9d6b56778fcad5bd8154779074e891df0455ae8cc77e14595f0df8c
-
SHA512
78844102b9d83f5f8f3dc3c1b83217bb0a6a69579168dca0e4740afd1f9f4e8864b9203570b031e9ce47a8f9a2a6db98b558634708fd828727365f0271a5f686
-
SSDEEP
393216:0vd1NDtHWaIhF5AfrpW4+SRxqwIxgFU1elj6iY9Q4mG3WX0X9Jnbx:0fWaIFaFWdqjle1xB99kC/nbx
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3932-73-0x000000002B660000-0x000000002B81B000-memory.dmp purplefox_rootkit behavioral2/memory/3932-75-0x000000002B660000-0x000000002B81B000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3932-73-0x000000002B660000-0x000000002B81B000-memory.dmp family_gh0strat behavioral2/memory/3932-75-0x000000002B660000-0x000000002B81B000-memory.dmp family_gh0strat -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\L: TpuaDVwAtO28.exe File opened (read-only) \??\R: TpuaDVwAtO28.exe File opened (read-only) \??\W: TpuaDVwAtO28.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: TpuaDVwAtO28.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: TpuaDVwAtO28.exe File opened (read-only) \??\Y: TpuaDVwAtO28.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: TpuaDVwAtO28.exe File opened (read-only) \??\P: TpuaDVwAtO28.exe File opened (read-only) \??\U: TpuaDVwAtO28.exe File opened (read-only) \??\X: TpuaDVwAtO28.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: TpuaDVwAtO28.exe File opened (read-only) \??\K: TpuaDVwAtO28.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Q: TpuaDVwAtO28.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: TpuaDVwAtO28.exe File opened (read-only) \??\S: TpuaDVwAtO28.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: TpuaDVwAtO28.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: TpuaDVwAtO28.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\M: TpuaDVwAtO28.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: TpuaDVwAtO28.exe File opened (read-only) \??\T: TpuaDVwAtO28.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: TpuaDVwAtO28.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 wpsupdate.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\OrganizeSupporterNimble\wpsupdate.exe msiexec.exe File opened for modification C:\Program Files\OrganizeSupporterNimble\TpuaDVwAtO28.exe YElwbdcCOAiT.exe File opened for modification C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.wrapper.log YoctSidXXbav.exe File created C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.xml YElwbdcCOAiT.exe File opened for modification C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.xml YElwbdcCOAiT.exe File created C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.exe YElwbdcCOAiT.exe File created C:\Program Files\OrganizeSupporterNimble\qRnXMHAQiKBugDENYhOR msiexec.exe File created C:\Program Files\OrganizeSupporterNimble\YElwbdcCOAiT.exe msiexec.exe File opened for modification C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.exe YElwbdcCOAiT.exe File opened for modification C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.wrapper.log YoctSidXXbav.exe File created C:\Program Files\OrganizeSupporterNimble\node.dll msiexec.exe File created C:\Program Files\OrganizeSupporterNimble\TpuaDVwAtO28.exe YElwbdcCOAiT.exe File opened for modification C:\Program Files\OrganizeSupporterNimble TpuaDVwAtO28.exe File opened for modification C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.wrapper.log YoctSidXXbav.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\Installer\e57ef25.msi msiexec.exe File created C:\Windows\Installer\e57ef23.msi msiexec.exe File opened for modification C:\Windows\Installer\e57ef23.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{39A92A4F-ABC4-47A7-9E7F-64CBCFFA18BB} msiexec.exe File opened for modification C:\Windows\Installer\MSIF00D.tmp msiexec.exe -
Executes dropped EXE 8 IoCs
pid Process 548 YElwbdcCOAiT.exe 4992 TpuaDVwAtO28.exe 2836 wpsupdate.exe 3552 YoctSidXXbav.exe 5008 YoctSidXXbav.exe 1876 YoctSidXXbav.exe 1724 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2896 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YElwbdcCOAiT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TpuaDVwAtO28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpsupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TpuaDVwAtO28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TpuaDVwAtO28.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 0000000004000000a2808484d8f468e90000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff000000002701010000080000a28084840000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff000000000700010000680900a2808484000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1da2808484000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000a280848400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TpuaDVwAtO28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TpuaDVwAtO28.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" TpuaDVwAtO28.exe Key created \REGISTRY\USER\.DEFAULT\Software\Kingsoft wpsupdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Kingsoft\Office\6.0\Common\InfoHDt = "20" wpsupdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script\Settings\JITDebug = "0" MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Kingsoft\Office wpsupdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Kingsoft\Office\6.0\Common\khdinfo\InfoCurHardInfo = "29a56b8a14940c3acb7a4a6443907c56|46d6b9d559155ff80a046745c0b58b1e" wpsupdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Kingsoft\Office\6.0\Common\khdinfo\InfoHDModifiedType = "hdidRecalByOldHdidFromRegIsEmpty|2024-9-20" wpsupdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Kingsoft\Office\6.0\Common\InfoHD3t = "20" wpsupdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Kingsoft\Office\6.0\Common\InfoHD3_C = "dbf287fe22353f2216aeabdccf1ef0d3" wpsupdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E TpuaDVwAtO28.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" TpuaDVwAtO28.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wpsupdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Kingsoft\Office\6.0\Common wpsupdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Kingsoft\Office\6.0\Common\InfoHD3Verify_C = 32003000320034002d0039002d00320030007c00570044004300200032002e0035002b00320033003200310033003800380030003400310036003500200020002000200020002000200020007c00460041002d00350042002d00390036002d00440042002d00300036002d00430042000000 wpsupdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Kingsoft\Office\6.0\Common\khdinfo\InfoLastHardInfo wpsupdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script\Settings MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Kingsoft\Office\6.0\Common\InfoHD = "dbf287fe22353f2216aeabdccf1ef0d3" wpsupdate.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Kingsoft\Office\6.0\Common\khdinfo wpsupdate.exe Key created \REGISTRY\USER\.DEFAULT\Software wpsupdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Kingsoft\Office\6.0 wpsupdate.exe -
Modifies registry class 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\SourceList msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F4A29A934CBA7A74E9F746BCFCAF81BB msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\PackageCode = "CEA73F1C5C6787349AB3A11C771E1A2B" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\91E4850C13A5A9040811EA7CEA18D148\F4A29A934CBA7A74E9F746BCFCAF81BB msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F4A29A934CBA7A74E9F746BCFCAF81BB\ProductFeature msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\ProductName = "OrganizeSupporterNimble" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\Version = "17039361" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\91E4850C13A5A9040811EA7CEA18D148 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\SourceList\PackageName = "wpsupdate.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F4A29A934CBA7A74E9F746BCFCAF81BB\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2612 msiexec.exe 2612 msiexec.exe 2836 wpsupdate.exe 2836 wpsupdate.exe 2836 wpsupdate.exe 2836 wpsupdate.exe 4992 TpuaDVwAtO28.exe 4992 TpuaDVwAtO28.exe 1876 YoctSidXXbav.exe 1876 YoctSidXXbav.exe 1724 TpuaDVwAtO28.exe 1724 TpuaDVwAtO28.exe 1724 TpuaDVwAtO28.exe 1724 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe 3932 TpuaDVwAtO28.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2896 msiexec.exe Token: SeIncreaseQuotaPrivilege 2896 msiexec.exe Token: SeSecurityPrivilege 2612 msiexec.exe Token: SeCreateTokenPrivilege 2896 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2896 msiexec.exe Token: SeLockMemoryPrivilege 2896 msiexec.exe Token: SeIncreaseQuotaPrivilege 2896 msiexec.exe Token: SeMachineAccountPrivilege 2896 msiexec.exe Token: SeTcbPrivilege 2896 msiexec.exe Token: SeSecurityPrivilege 2896 msiexec.exe Token: SeTakeOwnershipPrivilege 2896 msiexec.exe Token: SeLoadDriverPrivilege 2896 msiexec.exe Token: SeSystemProfilePrivilege 2896 msiexec.exe Token: SeSystemtimePrivilege 2896 msiexec.exe Token: SeProfSingleProcessPrivilege 2896 msiexec.exe Token: SeIncBasePriorityPrivilege 2896 msiexec.exe Token: SeCreatePagefilePrivilege 2896 msiexec.exe Token: SeCreatePermanentPrivilege 2896 msiexec.exe Token: SeBackupPrivilege 2896 msiexec.exe Token: SeRestorePrivilege 2896 msiexec.exe Token: SeShutdownPrivilege 2896 msiexec.exe Token: SeDebugPrivilege 2896 msiexec.exe Token: SeAuditPrivilege 2896 msiexec.exe Token: SeSystemEnvironmentPrivilege 2896 msiexec.exe Token: SeChangeNotifyPrivilege 2896 msiexec.exe Token: SeRemoteShutdownPrivilege 2896 msiexec.exe Token: SeUndockPrivilege 2896 msiexec.exe Token: SeSyncAgentPrivilege 2896 msiexec.exe Token: SeEnableDelegationPrivilege 2896 msiexec.exe Token: SeManageVolumePrivilege 2896 msiexec.exe Token: SeImpersonatePrivilege 2896 msiexec.exe Token: SeCreateGlobalPrivilege 2896 msiexec.exe Token: SeBackupPrivilege 1028 vssvc.exe Token: SeRestorePrivilege 1028 vssvc.exe Token: SeAuditPrivilege 1028 vssvc.exe Token: SeBackupPrivilege 2612 msiexec.exe Token: SeRestorePrivilege 2612 msiexec.exe Token: SeRestorePrivilege 2612 msiexec.exe Token: SeTakeOwnershipPrivilege 2612 msiexec.exe Token: SeRestorePrivilege 2612 msiexec.exe Token: SeTakeOwnershipPrivilege 2612 msiexec.exe Token: SeBackupPrivilege 1088 srtasks.exe Token: SeRestorePrivilege 1088 srtasks.exe Token: SeSecurityPrivilege 1088 srtasks.exe Token: SeTakeOwnershipPrivilege 1088 srtasks.exe Token: SeBackupPrivilege 1088 srtasks.exe Token: SeRestorePrivilege 1088 srtasks.exe Token: SeSecurityPrivilege 1088 srtasks.exe Token: SeTakeOwnershipPrivilege 1088 srtasks.exe Token: SeRestorePrivilege 2612 msiexec.exe Token: SeTakeOwnershipPrivilege 2612 msiexec.exe Token: SeRestorePrivilege 2612 msiexec.exe Token: SeTakeOwnershipPrivilege 2612 msiexec.exe Token: SeRestorePrivilege 2612 msiexec.exe Token: SeTakeOwnershipPrivilege 2612 msiexec.exe Token: SeRestorePrivilege 2612 msiexec.exe Token: SeTakeOwnershipPrivilege 2612 msiexec.exe Token: SeRestorePrivilege 2612 msiexec.exe Token: SeTakeOwnershipPrivilege 2612 msiexec.exe Token: SeRestorePrivilege 2612 msiexec.exe Token: SeTakeOwnershipPrivilege 2612 msiexec.exe Token: SeRestorePrivilege 2612 msiexec.exe Token: SeTakeOwnershipPrivilege 2612 msiexec.exe Token: SeRestorePrivilege 2612 msiexec.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2896 msiexec.exe 2896 msiexec.exe 2836 wpsupdate.exe 2836 wpsupdate.exe 2836 wpsupdate.exe 2836 wpsupdate.exe 2836 wpsupdate.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2836 wpsupdate.exe 2836 wpsupdate.exe 2836 wpsupdate.exe 2836 wpsupdate.exe 2836 wpsupdate.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2612 wrote to memory of 1088 2612 msiexec.exe 96 PID 2612 wrote to memory of 1088 2612 msiexec.exe 96 PID 2612 wrote to memory of 4324 2612 msiexec.exe 98 PID 2612 wrote to memory of 4324 2612 msiexec.exe 98 PID 2612 wrote to memory of 4324 2612 msiexec.exe 98 PID 4324 wrote to memory of 548 4324 MsiExec.exe 99 PID 4324 wrote to memory of 548 4324 MsiExec.exe 99 PID 4324 wrote to memory of 548 4324 MsiExec.exe 99 PID 4324 wrote to memory of 4992 4324 MsiExec.exe 101 PID 4324 wrote to memory of 4992 4324 MsiExec.exe 101 PID 4324 wrote to memory of 4992 4324 MsiExec.exe 101 PID 4324 wrote to memory of 2836 4324 MsiExec.exe 102 PID 4324 wrote to memory of 2836 4324 MsiExec.exe 102 PID 4324 wrote to memory of 2836 4324 MsiExec.exe 102 PID 1876 wrote to memory of 1724 1876 YoctSidXXbav.exe 108 PID 1876 wrote to memory of 1724 1876 YoctSidXXbav.exe 108 PID 1876 wrote to memory of 1724 1876 YoctSidXXbav.exe 108 PID 1724 wrote to memory of 3932 1724 TpuaDVwAtO28.exe 109 PID 1724 wrote to memory of 3932 1724 TpuaDVwAtO28.exe 109 PID 1724 wrote to memory of 3932 1724 TpuaDVwAtO28.exe 109 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\wpsupdate.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2896
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 79693286EF1079034A0B0FE01A226E43 E Global\MSI00002⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Program Files\OrganizeSupporterNimble\YElwbdcCOAiT.exe"C:\Program Files\OrganizeSupporterNimble\YElwbdcCOAiT.exe" x "C:\Program Files\OrganizeSupporterNimble\qRnXMHAQiKBugDENYhOR" -o"C:\Program Files\OrganizeSupporterNimble\" -ptLyXGitilIeFgXMurmJK -y3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:548
-
-
C:\Program Files\OrganizeSupporterNimble\TpuaDVwAtO28.exe"C:\Program Files\OrganizeSupporterNimble\TpuaDVwAtO28.exe" -number 143 -file file3 -mode mode3 -flag flag33⤵
- Drops file in Program Files directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files\OrganizeSupporterNimble\wpsupdate.exe"C:\Program Files\OrganizeSupporterNimble\wpsupdate.exe"3⤵
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2836
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.exe"C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.exe" install1⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:3552
-
C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.exe"C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.exe" start1⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:5008
-
C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.exe"C:\Program Files\OrganizeSupporterNimble\YoctSidXXbav.exe"1⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files\OrganizeSupporterNimble\TpuaDVwAtO28.exe"C:\Program Files\OrganizeSupporterNimble\TpuaDVwAtO28.exe" -number 174 -file file3 -mode mode3 -flag flag32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files\OrganizeSupporterNimble\TpuaDVwAtO28.exe"C:\Program Files\OrganizeSupporterNimble\TpuaDVwAtO28.exe" -number 362 -file file3 -mode mode3 -flag flag33⤵
- Enumerates connected drives
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Installer Packages
1Pre-OS Boot
1Bootkit
1Defense Evasion
Pre-OS Boot
1Bootkit
1System Binary Proxy Execution
1Msiexec
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5ee93b0f10e514ddf18f956c96282a844
SHA1034bcb400ed73fb93268b17147dc43c71df6f081
SHA256a297d0ca576cc5d765d3aad8e15da0f6c473d06b3a931d39b9e8c6e12eb55320
SHA512446bc70b71e0c8fe803e8ab374e3c472598fd0879712f17b72e2f117d9bd3c6ff364d65a0dd44a829a552446ca86b379f9e00057674df8158fb9358977c0ec7d
-
Filesize
3.1MB
MD5cab83f4897ba305ccf1b3811d0d46b46
SHA1f9b0a859ccfd545ca4794d2e37f0fe92e7469c88
SHA25645265ec03d03272fbda8eca896bdc2f72f8ac0ab862d41f7a97cd823525c0a9c
SHA512e018957a52075c203d48a59b2e049ed0d6980fefe467bd1b49bdd2a9b7aa5efb2d0d84a2b9e24f9b3ce680d424da137a2a7c3bc14f060960fba4cfbd900431ac
-
Filesize
574KB
MD542badc1d2f03a8b1e4875740d3d49336
SHA1cee178da1fb05f99af7a3547093122893bd1eb46
SHA256c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf
SHA5126bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c
-
Filesize
832KB
MD5d305d506c0095df8af223ac7d91ca327
SHA1679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a
SHA256923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66
SHA51294d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796
-
Filesize
270B
MD54d6f01e2ea288711eb8fbd70614bf69f
SHA1af366738217231369421e99122ddccf201e9342b
SHA25677cd4049dffbbc0350e3e5d92fcd7cd83e402516c3c4632e3366846317d7cbab
SHA51227d1c7283c313ba67de491728b59272079587683871ac6bc794ec84b3e452ac3a7d68b6c65b9f9cacaf6e6095d2e6ea5fbb2852a1ac4bfe4c70baf608f15e063
-
Filesize
428B
MD55123dd13eda91dca61e8be0a5e539622
SHA1032a9f333ce2c36126a1a41e266f423e21082383
SHA256ce7b83bf87f48b1360a1b96958e1a6d6c0ccc0d2a356106eee51fde8d0ff7536
SHA512ec037fb2f443d519a6308ef3c192448bbc6045f2f6b489131130c02fa50575e50a7d842921eff8b11159a80911264c1c16c3cb555beb7254ced8881188aeb5be
-
Filesize
492B
MD5a036ee62e7e4e2c95fcda776bb4b64d3
SHA13a2c65d0766c89e73961e7ec7e5e2d43344a56a1
SHA256491af0319ceb983bb7976eb2cebb41c6e1b9878d56201f782e6ee8a82b37528e
SHA51270684155787b4d62008cf0dea41e5adb4965d347a4509041cc2791524dacccf8fdb06c1166f8458dcd118dd236662b8bda58820c277c4564fa18aadf3fbd080d
-
Filesize
783B
MD5fcbad18c2b6a6ea6e8baf22050dcabe4
SHA14886b7f206a3f2f8f566939e72a447863295e79c
SHA25621e0e73870ee8259c9ef702a2ef70e2e7f96d512373cf9a44e17c958a7f1e347
SHA5128be5b8d2114feceb2fb4d42592b54b38d7f9200f908d450f271969899d3072286ed9c7e69b5284495a07e010dd4744bdbb70ed95584bb3d936f10ad41d8a3a33
-
Filesize
445B
MD592abd924fa27bb08e129a8bb0ac23fee
SHA1fdb569c5d01e64f7c5a786d57511c0853d196aa6
SHA2567ccf598d801e67c722bcdb422c1abeb6278c0293964c13b49df9cf8ac240490c
SHA5121ae6b8d8f61c8db656ad231d94a429bddb63aa5228fb0b1003b3dc878fd66a7ce90792cfab64f3cd24c9e3951d13174fa28a82c179c8123ab4c3e01c1cffe653
-
Filesize
1.9MB
MD5b40f2629f6045761ca8acf21ec4341e7
SHA1082326d152d2d13a5981ad9f4c3cf7906ec842bc
SHA2562699edad6ae5d99914c94f54075ff20ffce1a6f13e83d4f2e807f614466fd28f
SHA512d70d54d21bd4eb69a9748ca48f246dac236d06996da792818d188ae3a55a2f060a6fbb4421e27fdcf8aa7fd37f60951ef073d79fee1be6bac90d7e4d89dcdacc
-
Filesize
6.0MB
MD557dadd6a929f64c2b1efe2d52c1c4985
SHA1962cb227f81f885f23826c3e040aa9dbc97659cf
SHA256996b5d59cce7955b4374bd00d83c422d3a1d9ffebba59c66074c37ab28cfaeb5
SHA5123f64c35e72698ea6a7e708a4367277f3ab62c27f0652e0c55bab6e02239ee37c4f0a21503c0688301fb77bbf8e59e3c5c8aa2df8d62a4ab8a9b9cdf6f0a775cf
-
Filesize
1KB
MD5122cf3c4f3452a55a92edee78316e071
SHA1f2caa36d483076c92d17224cf92e260516b3cbbf
SHA25642f5774d1ee4cae5d7a4e83970da42bb17e61ae93c312247211b5ee3535662e0
SHA512c98666fb86aaff6471c0a96f12f037b9a607579c5891c9d7ba8cd4e90506ca7aa5b5f6264081d25f703c88fb69d8e2cd87809d508e771770550d0c5d4d17d91c
-
Filesize
2KB
MD55644bc0ef264d8fa14559cbfbfe93059
SHA116df67e3511dab5cc1e88a91c74c9a863721afee
SHA25670a5e0e35fdaf4781f43d8f9687f17a79d70d4d2735f64676146d4c345b1cce5
SHA512db1740a3e1a7cf1ed26a2e35579df1522ed666c6587fdb1a9699ae0867dce2a54a56646b8b4b4b9a4afc957997fac01fb357d85ddd3a5e0de2e3f676beb5cb7f
-
Filesize
18.0MB
MD5a73709d320e1160a965987bd3298b0bc
SHA12b1942cad548a048f62eb643573baf671696c5ea
SHA256d5d245b5e9d6b56778fcad5bd8154779074e891df0455ae8cc77e14595f0df8c
SHA51278844102b9d83f5f8f3dc3c1b83217bb0a6a69579168dca0e4740afd1f9f4e8864b9203570b031e9ce47a8f9a2a6db98b558634708fd828727365f0271a5f686
-
Filesize
23.7MB
MD52ce38c409c255e1823e9853060f7f9af
SHA143ded72581bee7edbd30dec8a2b63ef628914121
SHA256ae479bb9172315391b03d66b61eef178be67577e911638c1dd784b4ec8a4455d
SHA512edf454788993fda74d894f96e54f0054dce102f962901696ed2728bddd68dc88f26f99d3fd0c01bbedcf7884b946bc9e2dcc9eafdda9fc03e77931eb8295c192
-
\??\Volume{848480a2-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{a7c4148d-de72-42ce-8f18-9f26652a054d}_OnDiskSnapshotProp
Filesize6KB
MD57431db0f897ce489ff5231727661f209
SHA1e5c801ce7ef87d165133fb076d9bb049bf5846ef
SHA2564c344824419628994ff51a7886b47eb7821f9cab2273da6cabcfd8624d26f11e
SHA51248174cb2210330ab8180976defb1b747836db258b8114da755168f3c715b1b610e1f433a7a2963d572a2c260bece332d2ec6b5e5791668218b3cab0824b3a3fa