Analysis
-
max time kernel
78s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
98e12e68c45dc1b540c7f1c87e4293e3f0f0fecae98d3f49b60fdb4f646082d11.msi
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
98e12e68c45dc1b540c7f1c87e4293e3f0f0fecae98d3f49b60fdb4f646082d11.msi
Resource
win10v2004-20240802-en
General
-
Target
98e12e68c45dc1b540c7f1c87e4293e3f0f0fecae98d3f49b60fdb4f646082d11.msi
-
Size
2.2MB
-
MD5
0a86f111f1e8ec51d2ce46864f7f4576
-
SHA1
7f3065bca7f7d261b431a909c7bb051c7bd79eae
-
SHA256
98e12e68c45dc1b540c7f1c87e4293e3f0f0fecae98d3f49b60fdb4f646082d1
-
SHA512
f5528f4039eeae866edbe378a54f1480e0ad621fbe895e01d933699ab7361e529720b23b98587a02b78571f5b45ce71840295697a2a1a34b77aec7fd067c5be9
-
SSDEEP
49152:lEiJT5NKpt6ikhfxm2C6VQQQe/dJLXgiTRsanWzywHB5PML5YmbKF:lEiJVNut6zhfxo6aArs1yg5P4bKF
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSOneDrive = "C:\\Users\\Admin\\AppData\\Local\\MsOneDrive\\client32.exe" reg.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 4696 msiexec.exe 6 4696 msiexec.exe 8 4696 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\Installer\e580923.msi msiexec.exe File opened for modification C:\Windows\Installer\e580923.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{5FE62CC3-0C02-41FE-96AE-EEEECA11AE27} msiexec.exe File opened for modification C:\Windows\Installer\MSI9FE.tmp msiexec.exe File created C:\Windows\Installer\e580925.msi msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 5032 client32.exe -
Loads dropped DLL 6 IoCs
pid Process 5032 client32.exe 5032 client32.exe 5032 client32.exe 5032 client32.exe 5032 client32.exe 5032 client32.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 4696 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1068 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3092 msiexec.exe 3092 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4696 msiexec.exe Token: SeIncreaseQuotaPrivilege 4696 msiexec.exe Token: SeSecurityPrivilege 3092 msiexec.exe Token: SeCreateTokenPrivilege 4696 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4696 msiexec.exe Token: SeLockMemoryPrivilege 4696 msiexec.exe Token: SeIncreaseQuotaPrivilege 4696 msiexec.exe Token: SeMachineAccountPrivilege 4696 msiexec.exe Token: SeTcbPrivilege 4696 msiexec.exe Token: SeSecurityPrivilege 4696 msiexec.exe Token: SeTakeOwnershipPrivilege 4696 msiexec.exe Token: SeLoadDriverPrivilege 4696 msiexec.exe Token: SeSystemProfilePrivilege 4696 msiexec.exe Token: SeSystemtimePrivilege 4696 msiexec.exe Token: SeProfSingleProcessPrivilege 4696 msiexec.exe Token: SeIncBasePriorityPrivilege 4696 msiexec.exe Token: SeCreatePagefilePrivilege 4696 msiexec.exe Token: SeCreatePermanentPrivilege 4696 msiexec.exe Token: SeBackupPrivilege 4696 msiexec.exe Token: SeRestorePrivilege 4696 msiexec.exe Token: SeShutdownPrivilege 4696 msiexec.exe Token: SeDebugPrivilege 4696 msiexec.exe Token: SeAuditPrivilege 4696 msiexec.exe Token: SeSystemEnvironmentPrivilege 4696 msiexec.exe Token: SeChangeNotifyPrivilege 4696 msiexec.exe Token: SeRemoteShutdownPrivilege 4696 msiexec.exe Token: SeUndockPrivilege 4696 msiexec.exe Token: SeSyncAgentPrivilege 4696 msiexec.exe Token: SeEnableDelegationPrivilege 4696 msiexec.exe Token: SeManageVolumePrivilege 4696 msiexec.exe Token: SeImpersonatePrivilege 4696 msiexec.exe Token: SeCreateGlobalPrivilege 4696 msiexec.exe Token: SeBackupPrivilege 1812 vssvc.exe Token: SeRestorePrivilege 1812 vssvc.exe Token: SeAuditPrivilege 1812 vssvc.exe Token: SeBackupPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe Token: SeTakeOwnershipPrivilege 3092 msiexec.exe Token: SeRestorePrivilege 3092 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4696 msiexec.exe 4696 msiexec.exe 5032 client32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3092 wrote to memory of 3704 3092 msiexec.exe 94 PID 3092 wrote to memory of 3704 3092 msiexec.exe 94 PID 3092 wrote to memory of 1068 3092 msiexec.exe 97 PID 3092 wrote to memory of 1068 3092 msiexec.exe 97 PID 3092 wrote to memory of 5032 3092 msiexec.exe 96 PID 3092 wrote to memory of 5032 3092 msiexec.exe 96 PID 3092 wrote to memory of 5032 3092 msiexec.exe 96 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\98e12e68c45dc1b540c7f1c87e4293e3f0f0fecae98d3f49b60fdb4f646082d11.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4696
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3704
-
-
C:\Users\Admin\AppData\Local\MsOneDrive\client32.exe"C:\Users\Admin\AppData\Local\MsOneDrive\client32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:5032
-
-
C:\Windows\system32\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v MSOneDrive /t REG_SZ /d "C:\Users\Admin\AppData\Local\MsOneDrive\client32.exe"2⤵
- Adds Run key to start application
- Modifies registry key
PID:1068
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1812
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD525012765798c58c478a394862191dbc6
SHA1bcf968c6aa7b91c8b1156ffcf9211d11e4cca531
SHA2563686b97ff8c159d96174129c3972cfd7d90a5faa1f34ce1f7aa2d126b8bf79ad
SHA512ffaaa4131436d4dffe6b9face6f72eb5de0de93a2026d5dd23600260ae1a2aee5a265db554a5cf8f3f9f9c710fd7b1bf4487fd99365f55d52a3d15613a2c894e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_E55ED4737D009406C9A7181799A97235
Filesize1KB
MD550affbdc9934618f2c5d79dbf9a51820
SHA114e8ab8a079802233ced92d9b057ab394cdb6dd7
SHA25638e48c681d560b21946204046d9e8f33e21e644003168dc97db4323ee7e09d97
SHA512495d99e8f4816821bdc2127c7113e85c8a06e79a6f003288740b5fb130ac753b2b749a1f68202a868f090893a86f650c11da17089193e3f7fd88953853f59007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize1KB
MD5b616265beef47cb1d86b7b37bc7f43e8
SHA1198ef7db423cb1ab164eefd327089526d9d59a0d
SHA256d7ca7b07934333665fc304e79d706e9cadac1a53ae86b7278842292a6e294a5e
SHA512e01d057a177433d18481d2726d08d86072c4f00149f1009e8a718cf61d70ebf48651c7a796995fa7a27bb2909d9ea551880a84b6f25c2a4197451e1ed6e215c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_E55ED4737D009406C9A7181799A97235
Filesize536B
MD5a5d3b81a41c1aa2e4cd0ecfbdde76c78
SHA17922cf07f4b712b25eca2413bcd3bcdf19646b2e
SHA2562162201608e64a36b77b1376fbe8088e4ad3769ba9a33ee204933a7d37fe3fe6
SHA512c4294fc09e8aecc959c4382fa9fc8b5dc1a23f452215d525b01471fbeaa2185ba8a1cb37b52d866ad269a2cee46582715b617b7731a9a1af647d6628986758d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize536B
MD50e91cf359a454c12932235ac35dfcca8
SHA1d9bc499c966e8cd57bc28ceb9a3326f4686193a5
SHA2567d9c7830098aed988dd85ea71455f507dd4d26d6cc570593e468d26885f2ceb7
SHA5125c820822e2de431cab2af2c14839d75415baa68048d7ec7845ee91c2908b6ff7266e4e307619893a35352a1eb2bd1dfcd99518a33a93c5989f91a92552f26783
-
Filesize
306KB
MD53eed18b47412d3f91a394ae880b56ed2
SHA11b521a3ed4a577a33cce78eee627ae02445694ab
SHA25613a17f2ad9288aac8941d895251604beb9524fa3c65c781197841ee15480a13f
SHA512835f35af4fd241caa8b6a639626b8762db8525ccceb43afe8fffc24dffad76ca10852a5a8e9fc114bfbf7d1dc1950130a67037fc09b63a74374517a1f5448990
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
262B
MD5b9956282a0fed076ed083892e498ac69
SHA1d14a665438385203283030a189ff6c5e7c4bf518
SHA256fcc6afd664a8045bd61c398be3c37a97536a199a48d277e11977f93868ae1acc
SHA5127daa09113c0e8a36c91cc6d657c65851a20dff6b60ac3d2f40c5737c12c1613c553955f84d131ba2139959973fef9fc616ca5e968cb16c25acf2d4739eed87eb
-
Filesize
27KB
MD5e311935a26ee920d5b7176cfa469253c
SHA1eda6c815a02c4c91c9aacd819dc06e32ececf8f0
SHA2560038ab626624fa2df9f65dd5e310b1206a9cd4d8ab7e65fb091cc25f13ebd34e
SHA51248164e8841cfc91f4cbf4d3291d4f359518d081d9079a7995378f970e4085b534f4bafc15b83f4824cc79b5a1e54457b879963589b1acbcfe727a03eb3dffd1c
-
Filesize
3.3MB
MD5f782c24a376285c9b8a3a116175093f8
SHA1b8fdb6e95c7313cf31f14a3a31cc334b56e6df09
SHA256c7baf1647f6fef1b1a4231c9743f20f7a4b524ca4eb987a0acbeeef7e037d7e3
SHA512256385a6663dcf70a5a9a1b766d1f826760f07efa9b9248047dc43d41f6a9f4dd56ca2b218c222ea1d441e2f7ba9bb114cde6954827b9761ebb1f23bba7ad1bb
-
Filesize
104KB
MD5f6abef857450c97ea74cd8f0eb9a8c0a
SHA1a1acdd10f5a8f8b086e293c6a60c53630ad319fb
SHA256db0acb4a3082edc19ca9a78b059258ea36b4be16eee4f1172115fc83e693a903
SHA512b6a2196ebfa51bb3fb8fb2b95ad5275828ab5435fd859fc993e2b3ed92a74799fe1c8b178270f99c79432f39aa9dbc0090038f037fcb651ab75c14b18102671f
-
Filesize
664B
MD514f6ebed5e1176f17c18d00a2dc64b2e
SHA1cb9c079373658ce098e1d07d4a2c997bf3141b4b
SHA256d4c1f00382f01abbb3142ef6d9c3e51557d0ced12a52861d8c5df44d1ce723ac
SHA512e5f24a695749d693e873ea60b8caaff5cb3b306887721e3f9f308afe697fba37f3a6226322aedebb46764d6bbbaf21df44d4c6a02db49b067437d7e7d0cceaf9
-
Filesize
44KB
MD59daa86d91a18131d5caf49d14fb8b6f2
SHA16b2f7ceb6157909e114a2b05a48a1a2606b5caf1
SHA2561716640cce74322f7ee3e3e02b75cd53b91686f66e389d606dab01bd9f88c557
SHA5129a98e0d9e2dda8aefa54bddb3c7b71501d638dff68863939de6caa117b0e7bf15e581a75419ef8a0da3f1c56a19f1b0f4c86d65f8581773ab88ff5764b9bb3aa
-
Filesize
2.2MB
MD50a86f111f1e8ec51d2ce46864f7f4576
SHA17f3065bca7f7d261b431a909c7bb051c7bd79eae
SHA25698e12e68c45dc1b540c7f1c87e4293e3f0f0fecae98d3f49b60fdb4f646082d1
SHA512f5528f4039eeae866edbe378a54f1480e0ad621fbe895e01d933699ab7361e529720b23b98587a02b78571f5b45ce71840295697a2a1a34b77aec7fd067c5be9
-
Filesize
23.7MB
MD589f94986538bcd33a80c8ac4f2e31fbd
SHA170c1c3965363860f02ffffb0dfa55cfcb847f53f
SHA256cd27555e9a04dd529b55331f80474f8f2bd5bc7da7a3d11aad782ebcba807b0a
SHA512d2ba68968bfe740b7ed3f986a8a17568d96d871a99d5b77266796d7f1ac07e906417114523ef89e73c4754f3838247ee4799b39685924357ab3ed4a1152932b9
-
\??\Volume{fa3589b5-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{b0b261f5-adf8-4a03-a442-dba1129caf73}_OnDiskSnapshotProp
Filesize6KB
MD59ccd943aecd8582746884d3e7d0c2d2a
SHA1e05e3b5204c667f1c8335fc382cbf12730716257
SHA256a1432ef34e673750cb39848af50a84d1aa017395e0347701740b474539c764b2
SHA512862080207e86bbcd0eba68ed3114deb2d86847f1ecf02959b3453826ed4ef1c004a693a4d046b6316be2801145299a75f6caf2e94a29b84d0db65b1e970e1efc