Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 12:55

General

  • Target

    软件安装包u5.2.6.msi

  • Size

    12.3MB

  • MD5

    f128e0366847f75148a914540c8d43fc

  • SHA1

    d94a75e313329d7787aeac6c6010cce8c6368bdd

  • SHA256

    570c265082d625f99c178ac6565c18798f614e97d1edbeff6fd5acbdfcafdc9a

  • SHA512

    08875de029a89d5005203883820391695355cffdb0caa819b418bea0bfe4733926a4268684b8bb8ca65777b4b448ca8c47d5028fbbefd9fcc1f0e100fe5e9d75

  • SSDEEP

    393216:e49ccZUpj4f7eUFVg9UwfegD8ZVCrnRji:VKJpEfqqVg9dfegDCVCrnRG

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\软件安装包u5.2.6.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2872
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 33DFFCB6F4B2C1BAD0030EF534C92429 M Global\MSI0000
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2920
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:296
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003A0" "00000000000005DC"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76b9ef.rbs

    Filesize

    11.8MB

    MD5

    b1a512545f2153f9acb805288c09bf39

    SHA1

    5160e00b1f283ead1a62fc889150aa525fd84c7c

    SHA256

    5bb6a98e723333e36cb4ca75f74a97a4886dd432cdcdb5d88a5016dc34f77463

    SHA512

    6af008f5ca3d577d9d0e87227739581b69a29ba2ddc4652d51bffd9dede58f5e4742e6f22aa7470bcdc69e7bfbbd67a0ca6229462777082fe62627e5e5848661

  • C:\Windows\Installer\MSIBC11.tmp

    Filesize

    11.8MB

    MD5

    dfb8e9e024e2137c56f4869070994068

    SHA1

    b954b321ce72829a8cb14bbb5fdfe8c3d0c451be

    SHA256

    75c51971b8fc6c8f9303c7ba3c26c89b9cfea20025758a782dab122ebae62147

    SHA512

    dba2ae510fa3780d8d988e2b564de2c60f6824abc3284793bee5ea785f6b951addccadb686c51e14a5b7ed54f13f5a3d29f3fc0324c8ece6c8ed01fbb9dc83a7

  • C:\Windows\Installer\f76b9ed.msi

    Filesize

    12.3MB

    MD5

    f128e0366847f75148a914540c8d43fc

    SHA1

    d94a75e313329d7787aeac6c6010cce8c6368bdd

    SHA256

    570c265082d625f99c178ac6565c18798f614e97d1edbeff6fd5acbdfcafdc9a

    SHA512

    08875de029a89d5005203883820391695355cffdb0caa819b418bea0bfe4733926a4268684b8bb8ca65777b4b448ca8c47d5028fbbefd9fcc1f0e100fe5e9d75

  • memory/2920-19-0x00000000774F0000-0x00000000774F2000-memory.dmp

    Filesize

    8KB

  • memory/2920-21-0x00000000774F0000-0x00000000774F2000-memory.dmp

    Filesize

    8KB

  • memory/2920-23-0x00000000774F0000-0x00000000774F2000-memory.dmp

    Filesize

    8KB

  • memory/2920-24-0x0000000077500000-0x0000000077502000-memory.dmp

    Filesize

    8KB

  • memory/2920-26-0x0000000077500000-0x0000000077502000-memory.dmp

    Filesize

    8KB

  • memory/2920-28-0x0000000077500000-0x0000000077502000-memory.dmp

    Filesize

    8KB

  • memory/2920-29-0x000007FEF4B30000-0x000007FEF5E96000-memory.dmp

    Filesize

    19.4MB