Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 14:57

General

  • Target

    rserv34cn.exe

  • Size

    6.0MB

  • MD5

    bc0ae58455a77f702d76ffebbf092abe

  • SHA1

    5b9469375b98f6e11bb89e4d9a6f68d16552d971

  • SHA256

    e568fc1a9e6a85e872053700d0adefc16c191cbf43b8a75eea1fab647d3cbef5

  • SHA512

    aa6b73006c0d00fe504f312cb5ab615ed445d73f382b6ae4ef9059dce4aa89f80917f41fa1d94ea7abc2317e06056bc992ad32384dfe17641cf4591f0931563c

  • SSDEEP

    98304:2QtoAtWTPEIa+70mnunxZE69LEtD/hgbmrO3J57pKkV4f16D882:2QtAPEj+wmnGTExJym63J5lT4/

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 14 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 56 IoCs
  • Drops file in Windows directory 44 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\rserv34cn.exe
    "C:\Users\Admin\AppData\Local\Temp\rserv34cn.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\SysWOW64\MSIEXEC.EXE
      MSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Downloaded Installations\{ECF6FE39-A8B0-411B-83AC-75A17875FE6F}\rserv34cn.msi" TRANSFORMS="C:\Users\Admin\AppData\Local\Temp\{995A6F18-93D5-4B2D-9340-5B5D32D64AE2}\1033.MST" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp"
      2⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2644
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:552
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B1D7E9B2B681C715FCC015A8DF032949 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:544
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 4CD024D0B2B7CF73915E20851BDB1CC4
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1360
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 7D51698581A49FD431C142F55FC9515C
      2⤵
      • Loads dropped DLL
      PID:2544
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 8EA766C17AEC71B74D4224D9C082125B M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:524
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 6CF99BBF4631BB6D8DA75E5954B6DE76 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Users\Admin\AppData\Local\Temp\{3A8C4C87-D460-488A-A0AA-8993F6D355B1}\rsetup64.exe
        "C:\Users\Admin\AppData\Local\Temp\{3A8C4C87-D460-488A-A0AA-8993F6D355B1}\rsetup64.exe" /stop
        3⤵
        • Executes dropped EXE
        PID:2292
      • C:\Windows\SysWOW64\rserver30\rsetup64.exe
        "C:\Windows\SysWOW64\rserver30\rsetup64.exe" /intsetup
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        PID:1576
      • C:\Users\Admin\AppData\Local\Temp\{3A8C4C87-D460-488A-A0AA-8993F6D355B1}\rsetup64.exe
        "C:\Users\Admin\AppData\Local\Temp\{3A8C4C87-D460-488A-A0AA-8993F6D355B1}\rsetup64.exe" /intuninstall
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1872
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2008
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000078" "000000000000005C"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:1268
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{428bedd7-a332-32ec-ecc1-3d7b9374e026}\mirrorv3.inf" "9" "60bbf019f" "0000000000000060" "WinSta0\Default" "0000000000000078" "208" "c:\windows\syswow64\rserver30"
      1⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2876
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "211" "ROOT\DISPLAY\0000" "C:\Windows\INF\oem2.inf" "mirrorv3.inf:Mirror.Mfg.NTamd64:mirrorv3:3.1.0.0:radmin_mirror_v3" "60bbf019f" "0000000000000060" "000000000000058C" "00000000000005FC"
      1⤵
      • Drops file in Drivers directory
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:1972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4DD39726D4B55AC3B4119B35A893323C_D7897DB58F87E70B5D418519BA8C7C12

      Filesize

      5B

      MD5

      5bfa51f3a417b98e7443eca90fc94703

      SHA1

      8c015d80b8a23f780bdd215dc842b0f5551f63bd

      SHA256

      bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

      SHA512

      4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4DD39726D4B55AC3B4119B35A893323C_D7897DB58F87E70B5D418519BA8C7C12

      Filesize

      404B

      MD5

      74b1e311a46cf058e4b67ef321449e9a

      SHA1

      ad5c6f9f04689561f0b6f053849cab0d1f9fec7e

      SHA256

      71aa3e781079f6c3f22b3f7651a8eb6eb624f860b3531d8bf501fb7bcaedf1e5

      SHA512

      2849743d40af8bd8b97a5fb17753e357c3b4e2713f2c9f37dde04b9a8d2156b90b242683bfaac4193835d1b67c237b20e76905a297707ef29e8690c74656fa43

    • C:\Users\Admin\AppData\Local\Temp\Cab2F1C.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\MSID30A.tmp

      Filesize

      52KB

      MD5

      4a908ee9c6f2f4aad63382cccee731e4

      SHA1

      e572580949f277987fe232757ce88c2ac35e0223

      SHA256

      459f503fb8b4fc4a600261430ac77bf70118d41fa19f7b2620d43ba6e9c8fa5e

      SHA512

      75ba5856df7ed1457b6192e3b12c5dbb9cd0c6860d787357b37d5e2aabdd1dddb1fd6195064cad1b166431a71dee233b76cb6304d8e868050d79c731ef6e567f

    • C:\Users\Admin\AppData\Local\Temp\{3A8C4C87-D460-488A-A0AA-8993F6D355B1}\rsetup64.exe

      Filesize

      70KB

      MD5

      6641ee263466f462f0e302f25c6312d2

      SHA1

      61e5421a46cdb51282b265d7e5366becde7e3673

      SHA256

      7c5ceec18e24518bdd90eccb62bfc058eba9c875b3ef8d9624f525cc3076459a

      SHA512

      49b98530f56eefcc03ba0e1529ef943457024cc7c963342c114738e8f4e6ce9b0712fcf4944f1caf53eb0faaafddd23938d55ec41d70741f1a4f5f3a22240f8d

    • C:\Users\Admin\AppData\Local\Temp\{995A6F18-93D5-4B2D-9340-5B5D32D64AE2}\0x0409.ini

      Filesize

      5KB

      MD5

      52d179ad79966752ec40a678fd8b0062

      SHA1

      f12df9b03090286d1093b5421aea3acc358cc032

      SHA256

      57e020c41ad0566fb55415a40167a0c3da89584bc4e5f961d8e8c646f80c5590

      SHA512

      b5fb5002f1947a765a83c9a960c378b04adfe7acebbd8be79dca07c73d7ff96f5e988d8b6995c8ba6156a74ecdb0084e543090704080ea3095dbb80835cdf9c5

    • C:\Users\Admin\AppData\Local\Temp\{995A6F18-93D5-4B2D-9340-5B5D32D64AE2}\1033.MST

      Filesize

      44KB

      MD5

      040b84af6f426db7bd01ea5d61bea173

      SHA1

      c9547a6638a7853d789a26f4b129d6fd184bd5f0

      SHA256

      254c4c749bcf204f1198cc73ecf3178b6974a64bd6975453217082967df64cae

      SHA512

      ec9eab27b5addf4225144fc34f0e1620cd456ebc53312584412f1d0988aaf53eeb347cd32728e9057ecea9ccc86db4df49ded7c3da4c3f914d26623efb75c4bd

    • C:\Users\Admin\AppData\Local\Temp\{995A6F18-93D5-4B2D-9340-5B5D32D64AE2}\Setup.INI

      Filesize

      2KB

      MD5

      758c5ed62ff71f817b9ab30b8f039f23

      SHA1

      5b657f17aac044d79334b3637457d839a5bde9d9

      SHA256

      1dadaaae9125fce25ee2d0fecc8144e7383c8ddff5d7c7bfef186ec01267dc61

      SHA512

      d793ec47a18ddd6bec26f85af5718a950f33a84202735a938b0fc4881428c48ed76d7359e039f9deffc5293a9dc06f53a35c53cf75bd2b38997c1153c90c2603

    • C:\Users\Admin\AppData\Local\Temp\{995A6F18-93D5-4B2D-9340-5B5D32D64AE2}\_ISMSIDEL.INI

      Filesize

      491B

      MD5

      85ba062060174d890ac4d97c1fd258e2

      SHA1

      6b4d3c378e2ad4b72922d31c06030d24ad4180b3

      SHA256

      8e301bdfdbf239e3e08e247c1d68cccdb1f3cf3e1d2daca4617265d79cf1d710

      SHA512

      cc8e72194dc68bb126a995d68d77216742de60716af0da6edf731ec885643dcc526ce1843324ec0dcb6535b51796df89ed511746610b4d2026bc35ac52b7ac2a

    • C:\Users\Admin\AppData\Local\Temp\{995A6F18-93D5-4B2D-9340-5B5D32D64AE2}\_ISMSIDEL.INI

      Filesize

      11B

      MD5

      3fdd2635aa94921522af8186f3c3d736

      SHA1

      0fe63553e9f993c0cb2cb36b8cdcfba4f4a2650d

      SHA256

      17ad78845c9c6a8e97a5bd14be56700a51ee85867c979ed6cf538e1fed82cf7c

      SHA512

      ebdbeefbdc777937fce516a1cbd9af7c305fc242091d695ad919a27c98fac5b6b16b44130bdf97dbfd10561cce701180b1fbb303d848944c3b33b8a3c058653a

    • C:\Users\Admin\AppData\Local\Temp\{995A6F18-93D5-4B2D-9340-5B5D32D64AE2}\rserv34cn.msi

      Filesize

      5.6MB

      MD5

      1dac3f062b5fc9554700ef99ec0b6abf

      SHA1

      d08f114421bf8797db4eb5f01b86a977e7434f43

      SHA256

      cc0f6531d0afe6c0fc94b0491e3efd5de5e40ad06273fefab8349866e52fa33d

      SHA512

      672322e1c21cddf1efe03deb9264c58dfb476fd6d032f215431b87db0dfbbe95cece46de462568c6385ee849569f27f2569b228e358f799c1eef0769a6e432ee

    • C:\Windows\Installer\MSI2F6C.tmp

      Filesize

      101KB

      MD5

      4f3085722bf0e18a988034455b53dca1

      SHA1

      32ab2e7d9fd7dd3f9cf2f1b92f6568523ca6218f

      SHA256

      fea1f42e9ebc078204339afa4c0774162c730cbebf27fa86b9e695d55da110ab

      SHA512

      d046f8a9d0a4b061647c808895c5c4fe6921a4a484700c4894a5c0f771448a841a514b083fc3c94bc720e91b51dcf30ca50f6161b70376dad4b39452668b1233

    • C:\Windows\Installer\MSI319F.tmp

      Filesize

      89KB

      MD5

      0ffa26a6b269361f11dffe6cd4b99352

      SHA1

      ef432c3ebfde99a9ec08d76f80b0fc727f79248a

      SHA256

      e2d9a590ba293cea1d55a3886c81d55ffd4217568cd5c0584b52f50f1629c6b2

      SHA512

      3cf3b4473318134ec9c935821edb8c7634b823337babbf41c892250f40d46c5cf32094fc7fe14da228811ad65134c43fb46fba848c07c97f205cddb00ad392f3

    • C:\Windows\Installer\{3A8C4C87-D460-488A-A0AA-8993F6D355B1}\NewShortcut4_6BF1780B36EA432B9451DD84FF5C9D52.exe

      Filesize

      64KB

      MD5

      c20a2a9314375588db5eab2f4fe1487b

      SHA1

      c0ac75101d3f73d57a120e3e65c68bc707a22c1a

      SHA256

      565175e156b9f0dd577187ef927d669be023aee54904c9f8bd743e05e6263f0a

      SHA512

      e80eb1ca76e8cfce3fdfd73611a0e1fd64ea650307fc04e78244d9686f43215bed8a4e9bc1857af58e5514a34a03f7610fd32c697492496b4199b7c7567be8f6

    • C:\Windows\SysWOW64\rserver30\mirrorv3.inf

      Filesize

      2KB

      MD5

      f5273aae90874a5ba71b05642dff86af

      SHA1

      f532d104c395600492d4bf21951cceea42fe9178

      SHA256

      ebee10f12b7fc2d102b8cd1c173afb7494d9f77b938caeafe0873c4dabf86e4d

      SHA512

      7d26877b9af860db40ab16da0886889ede8a751f9ff77dabac0365751da02db5212f0fd413ae0b4bcf960bc515551e28f3301fc12e61690783c0ee8a42f303d6

    • C:\Windows\SysWOW64\rserver30\rserver3.exe

      Filesize

      1.2MB

      MD5

      7f4e16384fa3bdc035015148e768a87a

      SHA1

      81d62f525ca7ba1c765e15d08bd17d13f12b1457

      SHA256

      f4ef76d02e723d6533f524b42920b7ad319f9fabc7b4f398d2e9099978c94c84

      SHA512

      1e52951be927d8dfb73a018b54c8594adab4f6aeb9bad7aa96b991e95c56b74cc6fd77d9b3a989f04a963f15f3c05d75bbe1755067d5b46346d47f825b5a16fc

    • C:\Windows\System32\DriverStore\FileRepository\mirrorv3.inf_amd64_neutral_464860d34203ec0c\mirrorv3.PNF

      Filesize

      8KB

      MD5

      d69002dd8d6353798d9a26450a1a53e2

      SHA1

      213026331e1d35ec4ff80d8524bee0f38596f124

      SHA256

      a6011fb661a1e2a7bdf91b2823aef87576658819dae4aef24357f3b883fd7502

      SHA512

      9ad107a2748b907264dcdf0295e016cb24f39e2c284830f7ead2a7af485b16d925ef5a65513a844670467dab2a0914f4983b1f80036245c3b6d2cfe04ac6e5f3

    • C:\Windows\System32\DriverStore\INFCACHE.1

      Filesize

      1.4MB

      MD5

      892500d717e5e3cd9cb782041946b7b4

      SHA1

      24b742dfe8d6a361045436ee95ab9786cb708beb

      SHA256

      afd30ed22de416119a8d6dba86d790cb4ca15b7b1b4f380d4b4393bd6ef76183

      SHA512

      2fd3438addc43a6e193808605edbb6606145c92907f0d138f578d012f14eb82bf6a5068c519245eb96b323c71636e7f11681afc614d8f113b1ab7aaf4524ef84

    • C:\Windows\inf\oem2.PNF

      Filesize

      8KB

      MD5

      f210f274244d821b5ca24de3b0c1fa61

      SHA1

      ee377f442324f31d80484db6228455cd451d85c0

      SHA256

      51fd2d9da7ebaca77c13d13f0d187c92f162827d1da982b6a91d1cf573bce4eb

      SHA512

      945e3cc6fa8669d2a010f560ace38ed77002b4c9a4ad117db9ce4fec9bdabe5ff42329880e0be207189fce558c74764bccc9d7f4a1bce45674f293beb6f82a1d

    • \??\c:\windows\syswow64\RSERVE~1\mirrorv3.dll

      Filesize

      16KB

      MD5

      116bbd9926614070f4f01393d10eca08

      SHA1

      505ceba65e29daa4e091f7d4c497cf654344795d

      SHA256

      3cbe182b0828ef0e9533beecdad674f06dddc30b73a2c621e2460dadebd9b407

      SHA512

      ff426e88d850dd8da2f68109c7c69ce3da92287a307cfb7883c857c4f29ba8e7192b897c9851fca4943038eab0149fc259f2c997e4744fe40e32066437098e65

    • \??\c:\windows\syswow64\RSERVE~1\rminiv3.sys

      Filesize

      5KB

      MD5

      090ee52afdff9932909c480bdda0c8ce

      SHA1

      ae787dbf6a539818bccd1df037cdfe50ad5d08c2

      SHA256

      91be40f2b4d9912979611e0545f6a1e9d8af81ac149a11f46180ef5015e58cdf

      SHA512

      9b36d5afb6023d9d6a83b7d95d63ee2cfaa86e79021fda8400131c0ea742fab5e485a1eb226397d1677145295c897da248610aeb1a13211aa67d5af839431ac3

    • \??\c:\windows\syswow64\rserver30\mirrorv3.cat

      Filesize

      10KB

      MD5

      73b8eb012919dace778b41145c6df3ad

      SHA1

      0253ebc34886237d5a5d469ec48eb48077842aa5

      SHA256

      26d93aeacad81c893000e86dfe7fbaf6e6972861656567e211ac9db6f065812d

      SHA512

      a460d473dd76ecae59b29569f3eb4f81ac60aada07a7a609006969fc63236a3625570e54b6bf73adf403190cef0256746a1256850d28364a9067752ba7258653

    • \Users\Admin\AppData\Local\Temp\MSID359.tmp

      Filesize

      84KB

      MD5

      abb81f7897bb48a036686ccf840287ae

      SHA1

      d6d648782584340bfa56c8e6d34fd70707af5d36

      SHA256

      9dc871199cc9e96067a32401d225af50683ac14efaf35edc61aa45f346374494

      SHA512

      4769d555b95ad593eae41e1cb91a9c7539b1c115b9b19a4954dec791f4d662388b459e3b7ad2964d5e0db4270406816582986d5a184bf55fd6c067906c2e0b25