Analysis

  • max time kernel
    120s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 12:42

General

  • Target

    edef0a42ef8dede49f47c763238c8caea2ccb45a9af69362c41f1d95e8a19540.exe

  • Size

    49.3MB

  • MD5

    8e169f0eb6ed33bf82ac14f7d84ad860

  • SHA1

    b3b22dc1cea3f661acbe58204c000c5655dcb75e

  • SHA256

    edef0a42ef8dede49f47c763238c8caea2ccb45a9af69362c41f1d95e8a19540

  • SHA512

    8dbcf5181454a8127bf2779e660494bc57e2e978b010dadcf9fe2405e4169ceda912283034d09d61aa34d4f62aedf1db2d99915ab543901bb9db82359ec0b758

  • SSDEEP

    1572864:JwFnY/dq+9BZXziE47iA2PH254gGIzeXtGx30l/:JQ0dqiZXzb3AOIzeX0x3a/

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\edef0a42ef8dede49f47c763238c8caea2ccb45a9af69362c41f1d95e8a19540.exe
    "C:\Users\Admin\AppData\Local\Temp\edef0a42ef8dede49f47c763238c8caea2ccb45a9af69362c41f1d95e8a19540.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Internal UCP rights saver\Rate Confirmation 1.3.3\install\0B30770\Installer.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\edef0a42ef8dede49f47c763238c8caea2ccb45a9af69362c41f1d95e8a19540.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1731933504 " AI_EUIMSI=""
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:2852
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 57B27D46C952D731DCF5C02EC033156E C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:536
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding E9F60F4DA14703DFA5A11BF49F245912
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2588
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:3000
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000056C" "00000000000005C4"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MSIC61D.tmp

      Filesize

      495KB

      MD5

      cfab78ac0d042a1d8ad7085a94328ef6

      SHA1

      b3070cc847ba2739450dc9bd05040df83e7d85d2

      SHA256

      17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

      SHA512

      647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

    • C:\Users\Admin\AppData\Local\Temp\MSIC6BA.tmp

      Filesize

      912KB

      MD5

      b15dbf4b35cd1460ba283795e24878c8

      SHA1

      327812be4bfdce7a87cb00fab432ecc0d8c38c1e

      SHA256

      0ac07db6140408e9586d46727eb32af8f8048cad535eca9052b6ef1149e63147

      SHA512

      95edc60c9658e0e8631604459969a406414902f297b7a14f2be6d3bc18878636167d202530d4ee3b4d7af189a9139a2183929250920196c48c08eda3d6dfdca4

    • C:\Users\Admin\AppData\Roaming\Internal UCP rights saver\Rate Confirmation 1.3.3\install\0B30770\Installer.msi

      Filesize

      2.4MB

      MD5

      37ed84d56983275ad2a600575d048b08

      SHA1

      5e2b45b1dc24f06874fadc93c814276d55ec35eb

      SHA256

      1a1c7168f8008efa7e3d7dcdf15221dda7b796a3b918aee74e924a1f1ceb456a

      SHA512

      e32951d48a9e13e12caf0290cdfe37b908e3a6d39a1cf1c13670d50615b804a465d17858fa7d9069ba51bef7fe562957332dd0e92dccb98596ac4c2308de5fb8

    • C:\Users\Admin\AppData\Roaming\Internal UCP rights saver\Rate Confirmation 1.3.3\install\decoder.dll

      Filesize

      206KB

      MD5

      899944fb96ccc34cfbd2ccb9134367c5

      SHA1

      7c46aa3f84ba5da95ceff39cd49185672f963538

      SHA256

      780d10eda2b9a0a10bf844a7c8b6b350aa541c5bbd24022ff34f99201f9e9259

      SHA512

      2c41181f9af540b4637f418fc148d41d7c38202fb691b56650085fe5a9bdba068275ff07e002e1044760754876c62d7b4fc856452af80a02c5f5a9a7dc75b5e0

    • memory/2424-0-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2424-28-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB