Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 04:00

General

  • Target

    T1_软件包_1.0.9.msi

  • Size

    14.3MB

  • MD5

    ff2157d97d849d3bf67fd86d031662bc

  • SHA1

    6310d810f1702177e11029990d1d1441f1b2c562

  • SHA256

    442ab408377978c7d86bc9cb5fd566cac22ad2285a66a64fd173e155d7318abc

  • SHA512

    90e699632d610f38573a77b462d43e04af4e69fd8a7772579dbfc09e8187eaedf1b39353e652a81f60177a12fc41e6baa67b8e9e4b574c5e379544890dbdda2b

  • SSDEEP

    196608:j3KNfuUZj2vtrAZhVXQQv0sOAeym0a2uXRjoYSS3noSC:ON5jOSVXQM0sOAewhOBX

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\T1_软件包_1.0.9.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1444
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 99B685DF49464EDC29A081AAB2AD9627 M Global\MSI0000
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2016
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2824
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005DC" "00000000000003C0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f773046.rbs

    Filesize

    13.7MB

    MD5

    d449266e4ee7329a4ae39687cdb27f2a

    SHA1

    b8d5ddf968913b32ef05d2067c9a221449b5988c

    SHA256

    121ca14d765282229579147deca2adfb242ecbd5f504bec1b924d4a5676029c1

    SHA512

    7be16e0165fb864aa952feae7014da6fa35b422fb9137a0f0acc334f9095a571d6e31f40cab13de6cb6b5a965b1e2aa9f45fb64ed2ed22e4f5c23168e95489bf

  • C:\Windows\Installer\MSI3287.tmp

    Filesize

    13.7MB

    MD5

    9f8a34d5aad84a6cf84b457311aedc79

    SHA1

    5e52ac0f843d3eabd953c074c50bb9d31ea366a5

    SHA256

    2218bdc1a141068e124211828141b5131bf76c71e9f33535fc241febf3f92a05

    SHA512

    8f10be170b5cb5f7ac6a2219251ce98dc0e97181f31f0655d24c2a6182b8fc480cca3834567c1b17d105530372141174718f323bff4a35b30f68fd7ae641ffe6

  • C:\Windows\Installer\f773044.msi

    Filesize

    14.3MB

    MD5

    ff2157d97d849d3bf67fd86d031662bc

    SHA1

    6310d810f1702177e11029990d1d1441f1b2c562

    SHA256

    442ab408377978c7d86bc9cb5fd566cac22ad2285a66a64fd173e155d7318abc

    SHA512

    90e699632d610f38573a77b462d43e04af4e69fd8a7772579dbfc09e8187eaedf1b39353e652a81f60177a12fc41e6baa67b8e9e4b574c5e379544890dbdda2b

  • memory/2016-19-0x0000000077330000-0x0000000077332000-memory.dmp

    Filesize

    8KB

  • memory/2016-21-0x0000000077330000-0x0000000077332000-memory.dmp

    Filesize

    8KB

  • memory/2016-23-0x0000000077330000-0x0000000077332000-memory.dmp

    Filesize

    8KB

  • memory/2016-28-0x0000000077340000-0x0000000077342000-memory.dmp

    Filesize

    8KB

  • memory/2016-26-0x0000000077340000-0x0000000077342000-memory.dmp

    Filesize

    8KB

  • memory/2016-24-0x0000000077340000-0x0000000077342000-memory.dmp

    Filesize

    8KB

  • memory/2016-29-0x000007FEF42D0000-0x000007FEF5945000-memory.dmp

    Filesize

    22.5MB