Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 13:35

General

  • Target

    amneziawg-amd64-1.0.0.msi

  • Size

    3.2MB

  • MD5

    820f2d66357f5c1d986cbc1a41116d31

  • SHA1

    afc5b70d421b55fc6500698d90f1a4b4a030ce11

  • SHA256

    0f1172401ee28d8bfd15ebd4818e64b6001cd38e04d81ab1d096010eba40c9dc

  • SHA512

    953cc34418782304e121213a64e6de3dc1dc67e96acaf3686f40854c42805f0e12dec8e3ef710b5f00ab195bd4bb16ff1e3ae3413872bc846a0ebbde146bfb62

  • SSDEEP

    49152:DUqcXPxspPbZGfz2qKqmOQKsGc28k0aAfCWop2RYmVXbnD2mNoRv:wpXcDMfz2qtmOGGcjdy2OfYo

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 19 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 48 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\amneziawg-amd64-1.0.0.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2748
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Loads dropped DLL
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 56B6DCDCCEF454B2468E5162C2ADC003
      2⤵
      • Loads dropped DLL
      PID:112
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 33A581F17185275724B20E491747D020 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      PID:2632
    • C:\Program Files\AmneziaWG\amneziawg.exe
      "C:\Program Files\AmneziaWG\amneziawg.exe"
      2⤵
      • Executes dropped EXE
      PID:2644
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1244
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005D4" "00000000000005DC"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f7717e6.rbs

    Filesize

    7KB

    MD5

    41346ef9fd14a7e001caeec19ee000de

    SHA1

    b9e4ec545e2b92a22bf75660ddc299decbd81b68

    SHA256

    cd5600f00b36ef1d1d64906a03579051d94ff552f9fc5408c4db3bf942eb20f3

    SHA512

    3f6cee0f6b3f38546853da3ca30d6cedf4dc7adbf7917302c0cb8ef4dac1c967799a61c6dedeca6ef9f8f024ca34672b439d1e665d2486c2ad8d29e8739c79e3

  • C:\Config.Msi\f7717e8.rbs

    Filesize

    417B

    MD5

    f59f6f064c41ace69942717927d97f45

    SHA1

    bfe85f17cc2e24a61a0755e1b8f1bdd7958a14ac

    SHA256

    ccbcc8bc15bcc2be10f2062600f12122147e3ec3a4829dee1d58a53d5421900e

    SHA512

    4f605dd0429c8184c84e8d1cfcbabd9769dc3f55cc1ceeec8e1d4048e7b995fcd95cc9c51f748c944a0e3cc5d07e588ab05d6b2667d4449894267b61080f37b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

    Filesize

    765B

    MD5

    8ca89c4c44ce7a18f2fd38cc7dffa4e7

    SHA1

    fa36c1285bc049c697d71dd5f94bcc8fc5a3289d

    SHA256

    4dbdc5b97cb0ff50e6e758dd38983545bd73f1b0c1b6aac3268ff3959b94544f

    SHA512

    0a84354264bb33fc4fec10fe8683259a20aedcea3255fe5c70e3fb1e679434bd30929f68968341144914668a25e0dbfdef7952a6e68964e22c480897a270dc35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_94116ABD187039A686207174FF4E0089

    Filesize

    638B

    MD5

    f4b12fdaa43941da38309f51766b98c6

    SHA1

    4b4b38c9836b377a01657746700c35b6ac19cb0b

    SHA256

    ab14758aeb14bb98319e14f7fca6501c2953aceb98b4f432eb794c9c1fea867c

    SHA512

    23652fbb8300539b08c28bd4eb2a8f2983e688746164ca90a124a817aecd8d7b5cdc0b168220becd95cbdb97f7b780646aa7a630169fa8ea201e04931a434959

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

    Filesize

    1KB

    MD5

    d3f8af8039313b70ce02f513f344a11c

    SHA1

    56e5fad71036ce3bdad4283059f32f1272f26a2a

    SHA256

    dbc0b049cc1591ac8d26845e0a626dc4e6d53fa43435bd649d5a5a1e2dd8ab2f

    SHA512

    8f3e4fc87018ba556052cac92280b311f7d06445bd89dccc0982800def60bc8901dba87e6b2270f1bf2d09efda5c43560cc973ba4865cb2a4562229e4904c469

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

    Filesize

    484B

    MD5

    14b8ca4f85554076bb71faa54c0e016b

    SHA1

    0ef2643c6fc5138075cc0d662454efd5b36eaaf2

    SHA256

    219fc50d0506163f94273a709a2ce918c6035def1cf13d6291aead88ab4d4846

    SHA512

    0fcca7df73ee8341fadf22512065ef7968117a3302b55137de94bb01c0ce3bedc6fe9051de5b87f1dd933c74edff4bb79259666c0ff76e04ccfa4fb67fe93613

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b36e0f3e43ea5b88f33370a08626fe99

    SHA1

    aacd2b55a031e7ba6d4f257b1d7536e59a47e405

    SHA256

    d31e1c726e43f3abcb48f00f34570d98a3164194b0b6086525b46ae257b5ce28

    SHA512

    1099903502fedfeb8dc66c416505aeaad1acce4c40961c8a680c7c5b1405a78dbae451b61793fef9288d8c318ffbd7301c692e41ac973e23fbd017235b917afd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_94116ABD187039A686207174FF4E0089

    Filesize

    480B

    MD5

    9a8c20521d86b0c814bfec3b94d05e46

    SHA1

    c92b23df9a794d4657cfc5f16d853cf999913793

    SHA256

    b8d545278d5dbe0b84133311a07a9092a1dcd351210a5f7065d9a914e1bd7eb9

    SHA512

    79f5aefc9a2e5dea91403275b4ddc3498e2b033c6130450842f464e18213d8b199ab0174b988ff2aee7930eab219e73c644f5c1a79733ae0f40ca88151a6ba39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

    Filesize

    482B

    MD5

    c2e579b35d5b0c163391a11c13148859

    SHA1

    bd2df0623886b4c38397567604b5bcb8ac4a4892

    SHA256

    0874a4111ec5100ef376cbe6a79464a136057fdc337e50ef85f569a8a80b046b

    SHA512

    5124661a41f6d45032583653eccf734fc636efcff837c732908d95b535cfd10835e254f13580948f68f12f6d8583912d26218628854bbbcf83278d77fe10b367

  • C:\Users\Admin\AppData\Local\Temp\CabF6B0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF6C3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI1930.tmp

    Filesize

    36KB

    MD5

    811cfc3e9e1df71228e30aa77ed9f718

    SHA1

    a12758985729c86868ed099c04ee177591e47dc7

    SHA256

    400f7be58edf92533c08d1e1157c6216f5e3c80054e9974c6dc0aae0a895cb3d

    SHA512

    14428979b51088f692241505f52d269558db65e7c7733b000dd4d744f1b71fbe9b7fae9753cb3d7047c941f1ba9f13d58e8a20b88ef784673530a19b11c40554

  • C:\Windows\Installer\f7717e4.msi

    Filesize

    3.2MB

    MD5

    820f2d66357f5c1d986cbc1a41116d31

    SHA1

    afc5b70d421b55fc6500698d90f1a4b4a030ce11

    SHA256

    0f1172401ee28d8bfd15ebd4818e64b6001cd38e04d81ab1d096010eba40c9dc

    SHA512

    953cc34418782304e121213a64e6de3dc1dc67e96acaf3686f40854c42805f0e12dec8e3ef710b5f00ab195bd4bb16ff1e3ae3413872bc846a0ebbde146bfb62

  • \Program Files\AmneziaWG\amneziawg.exe

    Filesize

    7.9MB

    MD5

    9c3859eba6a53e9df1d885c8147337bd

    SHA1

    2adb6cc21f9973f1aa7a083fe86c4b88a9a5f58c

    SHA256

    ba23f928c64cca759bbf6f1f8318300ea384662f8b0c40bf22eb059beefc37af

    SHA512

    3824cb357c508f7a87894af928d97ad99d543e950af19bd82c0edda2196f36d272d27b54f1315a85921a41fb346b75b261e1fd366021f2b9623f810229300b93