Analysis

  • max time kernel
    61s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 04:36

General

  • Target

    软件包安装.msi

  • Size

    1.8MB

  • MD5

    ba615bbffbb5a4604ee2ddf9a2972333

  • SHA1

    229540b47f5248997257946a0fab693c070ed436

  • SHA256

    854f026f4e3071e41c828edcb350c049b74211ce7b653d8161a32d345257afcf

  • SHA512

    6c0b2f108e06873c3d09e8f0f9a20583b134a356b9cb775d44f4ee3a0807ad7d86b30b7aa60eafdd6dbf6fdf18f0f70ec0b45fef66f31ac4adb214511388d4bb

  • SSDEEP

    49152:r3YYgIR6zuEV571wHtGXLTi1Qn0UkFyr:r3cya1wNcMQ9e

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\软件包安装.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1568
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 33AD7DBA5E5C1CDC7E5F2E86B7BBA79E M Global\MSI0000
      2⤵
      • Drops file in Program Files directory
      • Loads dropped DLL
      PID:2460
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1240
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000538" "00000000000004A0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2776

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\f79788c.rbs

          Filesize

          991KB

          MD5

          6c29160e7399f9b4946f6435429730f7

          SHA1

          b341b2c780db589e840379e9fb1c565d09ebd251

          SHA256

          2b380e135cab0a6b3012966f83f6ed38ae17ed6100fc7c017e6f3d9e65f88f98

          SHA512

          503f26b7ff824792292523fdfc14daf538a1cf9357fc4caa61510ba31436104df161253e8da37cb061ec152f61d8fb589146054e2e2f52b58cf8209e7058ea9b

        • C:\Windows\Installer\MSI7C43.tmp

          Filesize

          984KB

          MD5

          2d7cb93530254216475becb691121dfb

          SHA1

          309f5fe7e5114307590cb870ed2be65999092e2d

          SHA256

          a00aefa8248081a627d0b8db0960b9e8a624ca348a3f4a1768727d070d2af4e6

          SHA512

          3658b3b28facf267f06fe1388754c60784e8d2e293c1585a3a07ef97d6f9fe3e28de0cb4a90b1485f47ea034e10e6b550b97ca9af102c7db51ddca155bad8936

        • C:\Windows\Installer\f79788a.msi

          Filesize

          1.8MB

          MD5

          ba615bbffbb5a4604ee2ddf9a2972333

          SHA1

          229540b47f5248997257946a0fab693c070ed436

          SHA256

          854f026f4e3071e41c828edcb350c049b74211ce7b653d8161a32d345257afcf

          SHA512

          6c0b2f108e06873c3d09e8f0f9a20583b134a356b9cb775d44f4ee3a0807ad7d86b30b7aa60eafdd6dbf6fdf18f0f70ec0b45fef66f31ac4adb214511388d4bb