Resubmissions

03-10-2024 12:59

241003-p8gvca1gme 6

03-10-2024 12:56

241003-p6hc4a1glb 6

03-10-2024 12:53

241003-p4xp1a1gjh 6

03-10-2024 12:52

241003-p4h7ls1gje 1

03-10-2024 12:46

241003-pz17maxhkm 6

Analysis

  • max time kernel
    92s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 12:56

General

  • Target

    GazeRecorder1.9.2.msi

  • Size

    19.5MB

  • MD5

    3e0e430226b9781f0a71356d6b6b8d78

  • SHA1

    cdfc7317daca37e7e0ad6b6091d9284cd6b18dea

  • SHA256

    42c1db18694a798a9248ac6b771fcf7701c6a38a70bd2efbe93828abd896305d

  • SHA512

    4655e4a764ac56a49d45b876bd6717aea18fbea4741b649fa441721937fef23c67e4bc3d2067497c9a91bfb9f0004b06d8473e56fd78656b2e343092f3f5971a

  • SSDEEP

    393216:kQcxyvHncyhhFuQYHfWCzFBhHLP532F7WRGz74ehIbLsTHDPBZW9XJAEUNovd:rcEvpHYxxHchDz0SYLsjDPG9/

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 56 IoCs
  • Drops file in Windows directory 10 IoCs
  • Loads dropped DLL 4 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\GazeRecorder1.9.2.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4704
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 288E4E81656A573C31F82B7AB3F0BAF2 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4832
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4888
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 134642ABDFD237D8E11DC5FA87EE8E38
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4476
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:3420

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e582eec.rbs

      Filesize

      25KB

      MD5

      5dff45f87751aa517997454f676ea925

      SHA1

      7f0d2732e954fba92df6231489faa1e22fea2d28

      SHA256

      a7abbaa47aea4ce610d134bb699594224e1907b640f103b06a4bba3a92c66466

      SHA512

      7d7e0d4a564d36cb819452769d977556c2380b09e32845f8ce6f00af7f6ce0c66fe0cbbf4b66fd4784c2e0c3e02365484a0eb1ba616de570e62689892af2593e

    • C:\Program Files (x86)\GazeRecorder\GazeRecorder\icon.ico

      Filesize

      1KB

      MD5

      0e07a06c3e8444ac835774be6241cb51

      SHA1

      220306a1863f5afb49610c9a3759b9116500095f

      SHA256

      8010ae8b6b0e470b3483638d62a33d0cfb1ce8b1bc64fc087033dfcadb10e8eb

      SHA512

      0e00155923230f7c2c5b820684aa1b2fd009b657e5d1c36f99245fddb31de79996df759573306dc2a06210c464fb2a94c82c6db99c858e832c1f62df36a478d7

    • C:\Users\Admin\AppData\Local\Temp\MSIAF7A.tmp

      Filesize

      231KB

      MD5

      5494165b1384faeefdd3d5133df92f5a

      SHA1

      b7b82805f1a726c4eee39152d1a6a59031d7798c

      SHA256

      ba0ad3a4d2112b269e379a2231128e7ebe23e95d5d04878d6ee8815e657bb055

      SHA512

      ecd5012df2a060fa58664e856a84716f162d3420e7a7a1368612451ec65f2dcd674c7031d780a6c9d357700f6baeb31325748bc29270850ee4070079f15be613

    • C:\Windows\Installer\e582eeb.msi

      Filesize

      19.5MB

      MD5

      3e0e430226b9781f0a71356d6b6b8d78

      SHA1

      cdfc7317daca37e7e0ad6b6091d9284cd6b18dea

      SHA256

      42c1db18694a798a9248ac6b771fcf7701c6a38a70bd2efbe93828abd896305d

      SHA512

      4655e4a764ac56a49d45b876bd6717aea18fbea4741b649fa441721937fef23c67e4bc3d2067497c9a91bfb9f0004b06d8473e56fd78656b2e343092f3f5971a

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      981284f49ab82a1af0cf301632521573

      SHA1

      bfad9be9791e53a60a1bb92eb5ac1a6f736d7278

      SHA256

      4cf2419425b1210642cf60a3a312ec90de5d6d0c8fa134c46653e41d6260b314

      SHA512

      1d3b64aa2cf9e88474ba69b9bb345d305a012ba79b77cccc40629b1bbf86ae34f2478b4c1b31fe0267c53948f2089035f92216653256f5ee72c989c3fa50ae48

    • \??\Volume{f3a72b53-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{0114b156-7492-4ae8-a9ff-9835c2d6a8ec}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      11179dac16fe8ead0516719d525ff32f

      SHA1

      f87d18a5cd5fc214aeeb6d6f3bb24650eb76ccdd

      SHA256

      52452c13050ae7d8ed307a922b4fa78d1200329907f5fe4b000f54a03abdd6bb

      SHA512

      b003ea4be0625dc54670d399bc2ba030c815a7119749e2ead71e0f7ba9fe075bfb91d99e1fd19a7beb88ebddfb79434f2645781487598dd6478955f33c35795a