Analysis

  • max time kernel
    147s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 23:38

General

  • Target

    i.msi

  • Size

    28.2MB

  • MD5

    adad9dc1c3a779bc9f189dcaad4f3736

  • SHA1

    09b4530a586478183a6ec47bf931593ac6368777

  • SHA256

    be2f50d49e8eb863aa3e4aa47c414beffdd6b126837dadf40483de0f2ef254d8

  • SHA512

    8b077ae6512e2edf8d957cfb807a24e0038560d997862f65ed5ccd6998ac58ab4c943c8af42d1b166edce8523223786136ba80f2e6c3221e4274406e3dae1120

  • SSDEEP

    786432:fmjD4lNUa68C1NpRojPmJsUQOIe/oyUFvpOBsB0Qe:fLHUrR1NpRozmJsUue/TUbe

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\i.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2060
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Users\Admin\AppData\Local\Programs\VDownloader\ProfessionalTagEditor.exe
      "C:\Users\Admin\AppData\Local\Programs\VDownloader\ProfessionalTagEditor.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2236
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3052
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004B4" "0000000000000578"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f77566c.rbs

    Filesize

    10KB

    MD5

    13aedda9c0363fc2ee8c823d1dcf44c5

    SHA1

    4ada2a88b4a172f017a8afc49e67356ac1204b4d

    SHA256

    f97ee2b2a3fa93025283ddc66afc1db15440f278ffbe262e2b861275bce4fc0e

    SHA512

    9f8c10455edfcedd6b8b425678f79ba7b34ed97d191417407cfa413fb04cf0bf9195d728b55b37235c6a2e43c9a2bb1547ca92cacc5848560f892340152efe33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    448b7971b68bc712ed92fcb71d73b8c5

    SHA1

    7ba11ed5473466f42a1ee22e01932914af242d60

    SHA256

    49d75de97ecc1019d51e112e3c459abd9bdbf4af6001bddf6b4edc869a1571dd

    SHA512

    ef0e58203469ac89bbd0ad125cd765a081bbda4debd645951f4874b9f5b517147d52fe219e0450420e6a8924dd92b722ba2677ec22e78bcc69725e99f945fd1e

  • C:\Users\Admin\AppData\Local\Programs\VDownloader\FilesystemDialogs.dll

    Filesize

    15.4MB

    MD5

    757e61e2ffc68b1040659dd0517a469f

    SHA1

    ca4b763379383b5a11332ef82cbe84a2ef7b9e4b

    SHA256

    47fb445f40b042aa4c41ed423da92e9e8b99156918564e08e57716eb6f6e8979

    SHA512

    f5118e184fc7d302b5b8e0d0659b6b208cadcce716f52d734abef6da3be12672b679f81898ac66d82755ee8257156bc941bfed068f690017590574924d3fac83

  • C:\Users\Admin\AppData\Local\Programs\VDownloader\MediaInfo.dll

    Filesize

    4.8MB

    MD5

    68d314050a796563ddcd7302ce0f25d2

    SHA1

    25e2e5471667166f8ad319c80a92463d728f8f94

    SHA256

    98d0ab5ede77ffe0f51e02f5380d487a791f601563e9d67c86a37b5bd4c7ecf8

    SHA512

    9e1a03132479e7e7b7ccd34f9c9bfed32be51370b0625d84f081649875580039a1dd75352827f6442cc7d0dbd5f855bf51cd92ff4e133bb5672695b6394c3848

  • C:\Users\Admin\AppData\Local\Programs\VDownloader\ProfessionalTagEditor.exe

    Filesize

    15.1MB

    MD5

    5da6728795945b0e1d5f56c192feda83

    SHA1

    2ec63eace161477c839a36df60b62e8493021341

    SHA256

    a40cbbefc592d053086a56b39a26b803159acded807c82bc7ec195565ef8402e

    SHA512

    7af07da57805a3d0479b2e9873ef9cb510468292f4cfe3f645d1e3a7c580b21e8e2b95bc0ae0e4d63bdd49bb2b2bd2bcae3022059f021b704eb8050c3d0674cc

  • C:\Users\Admin\AppData\Local\Programs\VDownloader\bass.dll

    Filesize

    126KB

    MD5

    f2a113b6ee24d9382953c9729ae357af

    SHA1

    749f4512a02287095a53db634783f7e399cd31b9

    SHA256

    0738dc614d751b3b08125c03a920fc243a3e5eea4f16d3374d8d94a6e2454477

    SHA512

    f9f366515b337c9df48ff1a21fb124091b2bec94c8a2d94de9c17c210b24931222a11d5b9914ea2fa40807ff7d4322d72d7779f34d07ce3ca2a44795718d047b

  • C:\Users\Admin\AppData\Local\Programs\VDownloader\model1.1.dll

    Filesize

    10.1MB

    MD5

    235f1638a95f769d22a2c9ef30a79537

    SHA1

    177f8cde7873b70d212d9f7a9c330f7ebcab3125

    SHA256

    a0b49a4855720341f9fce6ee0457a710159423a6ba2dde1ca48fa43a270498fb

    SHA512

    9ce6dc84b03ffd3084bba1ece999ba2be5b3c50d853b22e6933f1e4651274841a422da8fb99be5dc5e9f6f24b1d69c5839b1c17dc250546ea6ed66c56fc43290

  • C:\Users\Admin\AppData\Local\Programs\VDownloader\ssleay32.dll

    Filesize

    330KB

    MD5

    16b5d4d7641cddfc28748f48ae46ae4b

    SHA1

    9b4b30d36e816212da72313854dbabde80d2034a

    SHA256

    f82e938935108f9ed8411f8b567a618e24a0e25c63e36435538f3ac4f49822dc

    SHA512

    88c0e07ae26bf7d2e5fc1671cd37180089709416064b488d68e1700b9f5e2c7472a368baf96a60f369373612ca9d1d503b8d0a5ffe050862f306d8174a1ef7ef

  • C:\Users\Admin\AppData\Local\Temp\CabDEBD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE0C3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\f77566a.msi

    Filesize

    28.2MB

    MD5

    adad9dc1c3a779bc9f189dcaad4f3736

    SHA1

    09b4530a586478183a6ec47bf931593ac6368777

    SHA256

    be2f50d49e8eb863aa3e4aa47c414beffdd6b126837dadf40483de0f2ef254d8

    SHA512

    8b077ae6512e2edf8d957cfb807a24e0038560d997862f65ed5ccd6998ac58ab4c943c8af42d1b166edce8523223786136ba80f2e6c3221e4274406e3dae1120

  • memory/2236-110-0x0000000074E30000-0x0000000074E7B000-memory.dmp

    Filesize

    300KB

  • memory/2236-119-0x0000000000400000-0x0000000001356000-memory.dmp

    Filesize

    15.3MB

  • memory/2236-120-0x0000000072E60000-0x0000000073DFE000-memory.dmp

    Filesize

    15.6MB