Resubmissions

29-10-2024 07:28

241029-jawmysxfmk 6

29-10-2024 07:21

241029-h6xz8avnek 6

Analysis

  • max time kernel
    134s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2024 07:28

General

  • Target

    Koalageddon-2.0.1.msi

  • Size

    46.4MB

  • MD5

    155295f8dbaae190dd34adadecfb302e

  • SHA1

    c720229eb480dadd40649a2447b3e618a83d568c

  • SHA256

    793a6b5980872bc0c16c53ee550f860b90e8955fbbf2f0bd15734e05e9b4c3b8

  • SHA512

    cd6d4405bf387faa538426a2cfefdecd4c7f3a649f4cfce1eab85cea22a345f304525d222a48785528b7e19f83b76a536a1895e3f32ea8153d93ddae29850dd7

  • SSDEEP

    786432:EdQiEpqgLHk81Ywf/9gK7rhd8cHcSQAw8Luh1CKGSsKN4PgGagUiNaLFRB3p/n4U:GXEvE81vCjSE8yhAc1TgUiNaLFRdlx0e

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 13 IoCs
  • Loads dropped DLL 3 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Koalageddon-2.0.1.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:536
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4688
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding E89E1BA75BCED028310FDE04DA4C6EBD C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3328
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding F6ACF243DF499EF5FDADA1E1CD14E072 C
      2⤵
      • Loads dropped DLL
      PID:1380
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1560
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding D99D14A8B313F9D71338A415DF586AAB
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:3824
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:2512

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e582e8e.rbs

      Filesize

      56KB

      MD5

      6cc7b5f9934222667a33320dff252687

      SHA1

      0bcf814bd326a66da6b6c4109db3c757c4fa9ce9

      SHA256

      2b335c0fa9489e097064fa6e42e1a0de10fe91b901650c05de1201b43d07c9b9

      SHA512

      91939aae253ff4ec9eac486926427487c20ee937117240099e63d670c8058c04ce6f1de772fb6073c8e9612265c7638ca2d84d4b6ea8dd358e3abf5eb8bc4f73

    • C:\Program Files\Koalageddon\Koalageddon.exe

      Filesize

      448KB

      MD5

      f3fee249c9335225e3af98f11d805f34

      SHA1

      1d5065a559c156c11caf81ebfa9f3366caba76b2

      SHA256

      edfc0e68e302b33410c0bcddca6bd2112f0816861cc9360e22b80c0004852e24

      SHA512

      f0652631f55e2530ff6e4b5462a48df7109a1969f14af8c9778b413fea84a0113e30c9281ff772921a981d45e8dcb9150d141cbc9b33d0fb98d3fec7a62e4896

    • C:\Program Files\Koalageddon\runtime\legal\java.prefs\LICENSE

      Filesize

      33B

      MD5

      16989bab922811e28b64ac30449a5d05

      SHA1

      51ab20e8c19ee570bf6c496ec7346b7cf17bd04a

      SHA256

      86e0516b888276a492b19f9a84f5a866ed36925fae1510b3a94a0b6213e69192

      SHA512

      86571f127a6755a7339a9ed06e458c8dc5898e528de89e369a13c183711831af0646474986bae6573bc5155058d5f38348d6bfdeb3fd9318e98e0bf7916e6608

    • C:\Program Files\Koalageddon\runtime\legal\jdk.unsupported\COPYRIGHT

      Filesize

      35B

      MD5

      4586c3797f538d41b7b2e30e8afebbc9

      SHA1

      3419ebac878fa53a9f0ff1617045ddaafb43dce0

      SHA256

      7afb3a2dc57cb16223dddc970e0b464311e5311484c793abf9327a19ef629018

      SHA512

      f2c722ae80d2c0dcdb30a6993864eb90b85be5311261012d4585c6595579582d1b37323613f5417d189adcd096fa948e0378c1e6c59761bf94d65c0a5c2f2fd3

    • C:\Users\Admin\AppData\Local\Temp\MSIEC35.tmp

      Filesize

      113KB

      MD5

      4fdd16752561cf585fed1506914d73e0

      SHA1

      f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424

      SHA256

      aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7

      SHA512

      3695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600

    • C:\Users\Admin\AppData\Local\Temp\MSIECE1.tmp

      Filesize

      104KB

      MD5

      e76ab52d50197baddbc0d921e1d8eea5

      SHA1

      3789e237ad3b07ef43f4014e99099a0b43b1392d

      SHA256

      6e3dae02524f00ee37f33123f7fac943ed2a8617988ec4a667fcddb7764c634c

      SHA512

      f21b9b45a3b8b079c26568962559d56377fe0cbefde287f4fb763c8fd85df72220858bca598dcbaaa47c0fa23ea9c4ed90375a40d6a55ca062dc373cfbe80c6e

    • C:\Windows\Installer\MSI2F0A.tmp

      Filesize

      211KB

      MD5

      a3ae5d86ecf38db9427359ea37a5f646

      SHA1

      eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

      SHA256

      c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

      SHA512

      96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

    • C:\Windows\Installer\e582e8d.msi

      Filesize

      46.4MB

      MD5

      155295f8dbaae190dd34adadecfb302e

      SHA1

      c720229eb480dadd40649a2447b3e618a83d568c

      SHA256

      793a6b5980872bc0c16c53ee550f860b90e8955fbbf2f0bd15734e05e9b4c3b8

      SHA512

      cd6d4405bf387faa538426a2cfefdecd4c7f3a649f4cfce1eab85cea22a345f304525d222a48785528b7e19f83b76a536a1895e3f32ea8153d93ddae29850dd7

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.1MB

      MD5

      3fca7e2ac8c7ca56ce91edd9aa560d08

      SHA1

      05952459be8848bccf8e8a2b6fdb87d84b6828f3

      SHA256

      d411ee3745826f51815226fed38c2fb4029ee12db46c87d73bad27eda5907c10

      SHA512

      cc8024d43bbea441f0091cb0a576028eb9ed208aec52f2e3e265cf02b1d22437d86986d413bd10c1153a43b2aec6e76ba79f956e6423b088bdafaed74d66d01e

    • \??\Volume{77a2731a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{23b604f6-a3ae-4e01-b06d-0cd13ea44874}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      83f88802be5028f01d87de46a470405c

      SHA1

      722f67485f7a9787ec2e116e5d9aa36702f3325c

      SHA256

      9064378b517d48b370d1dbb4c200fe52f8268a5e9b223c42ad0e89d95ee09a82

      SHA512

      32cfad974b4cc09e5560093d37d72765428d48d7ac619837614cb8730645e6d61e7c981c11e162a38b6b279dedaf30b82ccb5a0de705d36e24d2d9c85d15c05e