Analysis
-
max time kernel
95s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
软件安装包u3.6.9.msi
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
软件安装包u3.6.9.msi
Resource
win10v2004-20241007-en
General
-
Target
软件安装包u3.6.9.msi
-
Size
12.3MB
-
MD5
c69c56b4d13e4200eed11f6fdefaf1df
-
SHA1
9924957cfb023a6d237527aee31e5ba69ae29def
-
SHA256
b7c249a4b4b94dd02bed0f4c878ced4e2285f366b0d01584ac49092ace76d610
-
SHA512
e093c0cce241c0066906e6fee8c22f3a45302d4eb11a3aa1713676ed2202349fb0efb8801cc7cb940311622ba3733c94738e5a390455d55f1ad579bdf9915d25
-
SSDEEP
393216:x49ccZUpj4f7eUFVg9UwfegD8ZVCrnRji:GKJpEfqqVg9dfegDCVCrnRG
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\I: msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3844 MsiExec.exe 3844 MsiExec.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\7za.bin msiexec.exe File created C:\Program Files (x86)\Windows NT\data.bin msiexec.exe File created C:\Program Files (x86)\Windows NT\Update.png MsiExec.exe File opened for modification C:\Program Files (x86)\Windows NT\Update.png MsiExec.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e5826ec.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\SourceHash{58214776-30AA-476C-BBA2-E8F1995A19FB} msiexec.exe File created C:\Windows\Installer\e5826ec.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI2834.tmp msiexec.exe File created C:\Windows\Installer\e5826ee.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2A29.tmp msiexec.exe -
Loads dropped DLL 1 IoCs
pid Process 3844 MsiExec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2580 msiexec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
Modifies registry class 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\ProductName = "Setup" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\67741285AA03C674BB2A8E1F99A591BF msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\Version = "16973828" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\67741285AA03C674BB2A8E1F99A591BF\ProdFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\SourceList\Media msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\PackageCode = "6FB9EEAA2B76EFD4A980BA0024B9CD86" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\ABCBC521D000113428DCA4ABCB7D434C msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\ABCBC521D000113428DCA4ABCB7D434C\67741285AA03C674BB2A8E1F99A591BF msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\SourceList\PackageName = "软件安装包u3.6.9.msi" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67741285AA03C674BB2A8E1F99A591BF\DeploymentFlags = "3" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4972 msiexec.exe 4972 msiexec.exe 3844 MsiExec.exe 3844 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2580 msiexec.exe Token: SeIncreaseQuotaPrivilege 2580 msiexec.exe Token: SeSecurityPrivilege 4972 msiexec.exe Token: SeCreateTokenPrivilege 2580 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2580 msiexec.exe Token: SeLockMemoryPrivilege 2580 msiexec.exe Token: SeIncreaseQuotaPrivilege 2580 msiexec.exe Token: SeMachineAccountPrivilege 2580 msiexec.exe Token: SeTcbPrivilege 2580 msiexec.exe Token: SeSecurityPrivilege 2580 msiexec.exe Token: SeTakeOwnershipPrivilege 2580 msiexec.exe Token: SeLoadDriverPrivilege 2580 msiexec.exe Token: SeSystemProfilePrivilege 2580 msiexec.exe Token: SeSystemtimePrivilege 2580 msiexec.exe Token: SeProfSingleProcessPrivilege 2580 msiexec.exe Token: SeIncBasePriorityPrivilege 2580 msiexec.exe Token: SeCreatePagefilePrivilege 2580 msiexec.exe Token: SeCreatePermanentPrivilege 2580 msiexec.exe Token: SeBackupPrivilege 2580 msiexec.exe Token: SeRestorePrivilege 2580 msiexec.exe Token: SeShutdownPrivilege 2580 msiexec.exe Token: SeDebugPrivilege 2580 msiexec.exe Token: SeAuditPrivilege 2580 msiexec.exe Token: SeSystemEnvironmentPrivilege 2580 msiexec.exe Token: SeChangeNotifyPrivilege 2580 msiexec.exe Token: SeRemoteShutdownPrivilege 2580 msiexec.exe Token: SeUndockPrivilege 2580 msiexec.exe Token: SeSyncAgentPrivilege 2580 msiexec.exe Token: SeEnableDelegationPrivilege 2580 msiexec.exe Token: SeManageVolumePrivilege 2580 msiexec.exe Token: SeImpersonatePrivilege 2580 msiexec.exe Token: SeCreateGlobalPrivilege 2580 msiexec.exe Token: SeBackupPrivilege 4120 vssvc.exe Token: SeRestorePrivilege 4120 vssvc.exe Token: SeAuditPrivilege 4120 vssvc.exe Token: SeBackupPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe Token: SeTakeOwnershipPrivilege 4972 msiexec.exe Token: SeRestorePrivilege 4972 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2580 msiexec.exe 2580 msiexec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4972 wrote to memory of 2280 4972 msiexec.exe 98 PID 4972 wrote to memory of 2280 4972 msiexec.exe 98 PID 4972 wrote to memory of 3844 4972 msiexec.exe 100 PID 4972 wrote to memory of 3844 4972 msiexec.exe 100 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\软件安装包u3.6.9.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2580
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:2280
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 92E615222D37D9E0CEEF58AC1CE661F1 E Global\MSI00002⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.8MB
MD5772861e6cf43575bc1932f9b3f52865e
SHA1310fa1d157445c029eb8613abf93f1f459521a5c
SHA256995bf3ac272cc68922088d5bbdbc983293795290f971a9cdd451f06396b27865
SHA51248bbd6fe4434ff4a38a66c2d68ca3a5f40e8da85eed83a1f8bcffa10bb9c60e1d780fed26b71b6984dd2b4a58c2e3c3c9c3292690ea68e0c2787ed93851fcff6
-
Filesize
11.8MB
MD5dfb8e9e024e2137c56f4869070994068
SHA1b954b321ce72829a8cb14bbb5fdfe8c3d0c451be
SHA25675c51971b8fc6c8f9303c7ba3c26c89b9cfea20025758a782dab122ebae62147
SHA512dba2ae510fa3780d8d988e2b564de2c60f6824abc3284793bee5ea785f6b951addccadb686c51e14a5b7ed54f13f5a3d29f3fc0324c8ece6c8ed01fbb9dc83a7
-
Filesize
12.3MB
MD5c69c56b4d13e4200eed11f6fdefaf1df
SHA19924957cfb023a6d237527aee31e5ba69ae29def
SHA256b7c249a4b4b94dd02bed0f4c878ced4e2285f366b0d01584ac49092ace76d610
SHA512e093c0cce241c0066906e6fee8c22f3a45302d4eb11a3aa1713676ed2202349fb0efb8801cc7cb940311622ba3733c94738e5a390455d55f1ad579bdf9915d25
-
Filesize
24.1MB
MD5aac800058bb9118109ce081b0a65caf5
SHA1c3980fdf1e8af8bfbfb25f4e8ca8e514ed7e5ec4
SHA2567862ae0a85df16090dbab6485f82299a986ef01c9dafd1d7b280b66cb8b1d370
SHA51251df5adbf7fa05108af41c8760a6530362f47c776c1260506948e62571e51f0191e7a80ff25c45eb9f22fd8190e30ca429f746d876cce75ca922ef84b3a41c76
-
\??\Volume{f9c79713-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{6ab4cd6c-ae23-4d27-9f3a-9b4f03c3a959}_OnDiskSnapshotProp
Filesize6KB
MD5bbab1afc29ba80e976d04465cf228b8c
SHA1563c2c3a2db54652160c1f86e38e12d4e7165ab0
SHA2568438373403cca1a43259bbfda4447932937d2deedd5751508ceb09035d7f287b
SHA5129ef159086f859af6b895d14a437c852af63e115eab42a281f2a5380abe3ad010383a59e467565eb933d96cd38d789c71f0f16aa05dd2355e0de1f0d5d35444ec