Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 17:45

General

  • Target

    EZFN Launcher_1.2.5_x64_en-US.msi

  • Size

    7.1MB

  • MD5

    e418e4a9cb75024e14e1ec3e6e91e0a0

  • SHA1

    6d82c663a6dcbe522c2cec7152be8acf53832196

  • SHA256

    641082b5805ad60fe6493dd36bae8dfc390940bd1d15add162bef02345ff3f0e

  • SHA512

    b921d77f1dafe44a6018c9552c3e216fd86cbd6e3e0c758dee0db3e7cb142c0178b8aad11dd2432696a121cb6d496b49431e79d8fe024afe58e987890a855c7d

  • SSDEEP

    196608:FrBn5fZ9AA/AwF532R11xsNqe7I85IYYF1V:FLrdFgzsNB7I2IYY

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 12 IoCs
  • Loads dropped DLL 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\EZFN Launcher_1.2.5_x64_en-US.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2224
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Loads dropped DLL
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:616
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5CD74E86A02789FC1C03817D86719917 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:988
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -NoProfile -windowstyle hidden try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 } catch {}; Invoke-WebRequest -Uri "https://go.microsoft.com/fwlink/p/?LinkId=2124703" -OutFile "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" ; Start-Process -FilePath "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" -ArgumentList ( '/install') -Wait
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1424
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2448
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000598" "00000000000005E0"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2772

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\EZFN Launcher\EZFN Launcher.lnk

      Filesize

      2KB

      MD5

      83a8d1b9f0373d535000ec0cbcaf2447

      SHA1

      2dbc25a817ad607e5fc0eae85bd52544e796ef23

      SHA256

      e356df142548d343d92860729a896916f07ea3fe04a5ca6d76a1d594c378b022

      SHA512

      0e30b51012482d7151d7246d5b0febc9ee930327f8ff61c59473be70f82981a7d74fa503b30238dca62de57d9778404a4229ebd5c04bdd743ee0127b1bdcfafc

    • C:\Users\Admin\AppData\Local\Temp\MSICA70.tmp

      Filesize

      113KB

      MD5

      4fdd16752561cf585fed1506914d73e0

      SHA1

      f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424

      SHA256

      aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7

      SHA512

      3695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600

    • C:\Windows\Installer\f76e9f2.msi

      Filesize

      7.1MB

      MD5

      e418e4a9cb75024e14e1ec3e6e91e0a0

      SHA1

      6d82c663a6dcbe522c2cec7152be8acf53832196

      SHA256

      641082b5805ad60fe6493dd36bae8dfc390940bd1d15add162bef02345ff3f0e

      SHA512

      b921d77f1dafe44a6018c9552c3e216fd86cbd6e3e0c758dee0db3e7cb142c0178b8aad11dd2432696a121cb6d496b49431e79d8fe024afe58e987890a855c7d

    • \Program Files\EZFN Launcher\EZFN Launcher.exe

      Filesize

      8.3MB

      MD5

      95cf8c442bc70aca96b084d92e9b7ea7

      SHA1

      9b1892061796eb3cd0659e79d5d0012015a04513

      SHA256

      a733c515622fe402415ad61df3abc80768fe3e1fb87739bffd07c08d439fd9ee

      SHA512

      dc62282ab762a75e829056c024a14377c73beed7b92df22927bf18d1888c2020a919f5043572261fada2d1e4e823cd41ef1a01a5dc9f3e50fb16d26a66a35195

    • memory/1424-52-0x000000001B760000-0x000000001BA42000-memory.dmp

      Filesize

      2.9MB

    • memory/1424-53-0x0000000001D20000-0x0000000001D28000-memory.dmp

      Filesize

      32KB