Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2024 19:57

General

  • Target

    2345pic_x64.msi

  • Size

    79.4MB

  • MD5

    fe984489b63aa7cd7aee6c48fe69e08d

  • SHA1

    b5cac8c66311b7601e0ef2a1d134bf06a8079497

  • SHA256

    092ff5eeddfd265d8f37c5a9afbf7c3018ba65fcd0dd59c0237f7e04d1915060

  • SHA512

    806872b46c843727d4a980e46fef0a662115a6429868e74c8889d9363323008797c5b11ad54bb524709cb26087a8bec42b0051f701af4766ee7227068a7a0e92

  • SSDEEP

    1572864:NmsJ8LVVmCjLbWQVZq/5u3dOdYMBWkAhIo/qQXAbJqWOm9uUQerttNG2MZ7dE:ojyCjLLZq/5ukpBVMWchl5erttNXMZ7S

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 50 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\2345pic_x64.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2380
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding F8B2810EDC175D422430A8293CC181B6 M Global\MSI0000
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\EnableMagneticOverseer'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1948
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start "" "C:\Program Files\EnableMagneticOverseer\wBtkOfXYmrXB.exe" x "C:\Program Files\EnableMagneticOverseer\oFRhddqMXWXkbbeDGqHg" -o"C:\Program Files\EnableMagneticOverseer\" -phZJcWScQuNgsiGBeBDtN -y
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1676
        • C:\Program Files\EnableMagneticOverseer\wBtkOfXYmrXB.exe
          "C:\Program Files\EnableMagneticOverseer\wBtkOfXYmrXB.exe" x "C:\Program Files\EnableMagneticOverseer\oFRhddqMXWXkbbeDGqHg" -o"C:\Program Files\EnableMagneticOverseer\" -phZJcWScQuNgsiGBeBDtN -y
          4⤵
          • Drops file in Program Files directory
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of AdjustPrivilegeToken
          PID:1916
      • C:\Program Files\EnableMagneticOverseer\aAvapbvtIRjv.exe
        "C:\Program Files\EnableMagneticOverseer\aAvapbvtIRjv.exe" -number 182 -file file3 -mode mode3 -flag flag3
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:592
      • C:\Program Files\EnableMagneticOverseer\2345pic_x64.exe
        "C:\Program Files\EnableMagneticOverseer\2345pic_x64.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        PID:1496
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2360
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004C4" "0000000000000494"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76ca24.rbs

    Filesize

    7KB

    MD5

    9b731d9ade910ba8bbe24aa9a1e61803

    SHA1

    f2fc32c9f835142db2a428c1020e8238fef22e50

    SHA256

    d849741a3b6292089b41a794d8cd1e089a06419241791b351e9a6161cd232b4d

    SHA512

    35c4de631dc53ec5c060a740f09423c4d546171fe4059f43e8b7b7faceb5a510f4da516cf6c401c4e758327ab0f2f3c8c5430f6ba748cf6296e9406e2423a2d2

  • C:\Program Files\EnableMagneticOverseer\aAvapbvtIRjv.exe

    Filesize

    3.2MB

    MD5

    90a521d21169049fdf1a244fc2989377

    SHA1

    e9b0db47e89683444ba886fa8091167e160f6b30

    SHA256

    7dd65fb863051edda07d0f84c65c36cd7388aa28464eb3f6c541f73c9f195f41

    SHA512

    e20e25cf49489861dcb00cb4b38f9c96b26b016b55a9b92ab082ef422db98dad3936b6918b65f1874ba4fe1a0208e8bae701aaf3d7e3bdcca3f046eb0826f8dc

  • C:\Program Files\EnableMagneticOverseer\oFRhddqMXWXkbbeDGqHg

    Filesize

    2.4MB

    MD5

    5ac34b87f21ae7fedf4dc629181decf0

    SHA1

    3890201e28d44a46b6e810b5bc5eddfec78d92b9

    SHA256

    ffc5b747ee4183aa7b298e7e296981d19321c208ae40b0052f1965033da5ebb4

    SHA512

    fbfee20bf2795f2e67ef24a1add342d61c131226ab74638447c5be70f4acd0ad9e51db1f58e69e4785446e2af71208a729636c0a79db1415712e67ebad8c2eda

  • C:\Program Files\EnableMagneticOverseer\wBtkOfXYmrXB.exe

    Filesize

    577KB

    MD5

    c31c4b04558396c6fabab64dcf366534

    SHA1

    fa836d92edc577d6a17ded47641ba1938589b09a

    SHA256

    9d182f421381429fd77598feb609fefb54dcaef722ddbf5aa611b68a706c10d3

    SHA512

    814dcbc1d43bc037dadc2f3f67856dd790b15fc1b0c50fa74a169c8cc02cdc79d44f1f10e200ef662eee20cd6b5ca646ec4e77673e3fe3cb7dfb7649243f6e99

  • C:\Users\Admin\AppData\Local\Temp\nsjF29B.tmp\FileInfo.dll

    Filesize

    624KB

    MD5

    cc7eab4f83339cca63f763114ca04c6c

    SHA1

    4da526e8b270dc16865813801dc5bcda8162c09d

    SHA256

    a1c9c3b3bc8e75aa91f639da10835210e81aeb7fb5db79ac0703e1594e516b5b

    SHA512

    d1df9bdb61dcc95e579adf4891c000feee83f9f4a3f82debca617fb62afff16707707681c2f2655aa02756873d5251db74d5b843ec56c3e12ab1120355360ef0

  • C:\Users\Admin\AppData\Local\Temp\nsjF29B.tmp\RCWidgetPlugin.dll

    Filesize

    2.4MB

    MD5

    2f2ae26fd88c512ac0feb39fa42ee894

    SHA1

    ac50a5fd61933bdd2a54e6503e39438f05af3304

    SHA256

    9117cafe403e445a291141ee898845799a165c383d3dfcf76c1870f66782e6b1

    SHA512

    b919244cd08118a2258cb062e5ce3a4626d82ed0ca3600a018bdb97962b9f96d57d1a08d338fd41fbae4af72debf7840707f67d442e53ec8a15cb8002ee725e6

  • \Users\Admin\AppData\Local\Temp\nsjF29B.tmp\System.dll

    Filesize

    27KB

    MD5

    a568feaa357f44dd50c5e447fa8ee1b2

    SHA1

    5c765fad342b756d5ea522087c6f7567b5f3ed57

    SHA256

    57947a15ad3215185c7e15a5f0da393570845a13ab7b184a07fcefbf97537e48

    SHA512

    7c8c36c0123de839e677beeba65c1af56c5e85d8f1ff2c94950aed33e026dff3fbda8c49859012862110117977c928b814c0d91c477583a2b8f83d73f3cdf174

  • \Users\Admin\AppData\Local\Temp\nsjF29B.tmp\libcurl_x86.dll

    Filesize

    2.1MB

    MD5

    a26e75c0407c87786eea42febdb32532

    SHA1

    27e52fdca023cb8f031cd55ac37965d93f7f7da7

    SHA256

    635f988beb849c6510f54f681387bf810c2266bd27834c5a9c160cbfe6df44d4

    SHA512

    fdd9760442579ad2a3df4f31464f9e66bc19a4390fa1c81afb516cce817097b5324024f712d9c1bf1a11ad30324f5a8aa83c72a732e1197e8804ab806d3859e6

  • memory/592-61-0x0000000002160000-0x000000000218F000-memory.dmp

    Filesize

    188KB

  • memory/1948-17-0x000000001B570000-0x000000001B852000-memory.dmp

    Filesize

    2.9MB

  • memory/1948-18-0x0000000001E00000-0x0000000001E08000-memory.dmp

    Filesize

    32KB

  • memory/2288-12-0x00000000001F0000-0x0000000000200000-memory.dmp

    Filesize

    64KB