Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 06:43

General

  • Target

    8ef787b0f11fcb0d5d9fe3b209bb5526.msi

  • Size

    1.8MB

  • MD5

    8ef787b0f11fcb0d5d9fe3b209bb5526

  • SHA1

    e5f31bfe6f080679807333760f18281abfd17adc

  • SHA256

    d66bdcb1c0a4f2e5452c852e24e001d153a9c9de1d7a692cb5f1ede5e056f1fa

  • SHA512

    e492f1c086caef83ef92fd8ad8dc569a6ebe8a1d18499845b7ce2cb2dddaed30bb193ee5f7fe581b67e838fee81a8e689cd377e0053b201b2590faff796d00a0

  • SSDEEP

    24576:Mt9cpVDhSsbTnopGR274VCg0MOg44CGgRynfWMSrcJ:rpRhSppGR0ACg0MOWCwnuMacJ

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\8ef787b0f11fcb0d5d9fe3b209bb5526.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2416
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3124
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B62FD081C59736530065BC21ABEF730D
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4816
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-937117ff-c3f1-460d-9bd1-d745065fbfd7\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:4880
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2976
      • C:\Users\Admin\AppData\Local\Temp\MW-937117ff-c3f1-460d-9bd1-d745065fbfd7\files\anterra.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-937117ff-c3f1-460d-9bd1-d745065fbfd7\files\anterra.exe" /VERYSILENT /VERYSILENT
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2528
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MW-937117ff-c3f1-460d-9bd1-d745065fbfd7\files.cab

    Filesize

    1.5MB

    MD5

    3ea8f867c2dad306173d24f0a0f1c763

    SHA1

    e44eef4fc152dc00c2ab01ff3042dfec100bd37d

    SHA256

    33a956fd56612688e6339d4d4486e8767aac967a2ac808eb9fad1af20b4ac9b6

    SHA512

    cb8f4dd7ba9789d4d19c038b6fbcd3412f7315381d56943bbe3c9bad17f1c3bfbef36e3e2564ca4fa0cad3e0f4bebf70ec93a2584dec43b70d13acc6b2a56680

  • C:\Users\Admin\AppData\Local\Temp\MW-937117ff-c3f1-460d-9bd1-d745065fbfd7\msiwrapper.ini

    Filesize

    384B

    MD5

    63c1bbd341a35d62ed8eddc3e64a6d59

    SHA1

    4fa05be08997e7e04ea9e834a61b25be043cabec

    SHA256

    4929fbac313b0554fc6363a0fa6de98b446449102d7d6b66432b193ad0c8d95b

    SHA512

    9bd34373de8a928891b5133343e924eb49003cf6bf1144c342c756f4a769fdd427475e4a584b26ddf9535951562af7ee47adc6ee54dd791c1c3eca8913d5d97e

  • C:\Users\Admin\AppData\Local\Temp\MW-937117ff-c3f1-460d-9bd1-d745065fbfd7\msiwrapper.ini

    Filesize

    1KB

    MD5

    e1c497b3d5a7638b56ab3ec0eefd5741

    SHA1

    0f1beeb637d3a93e591fdb1cd13bd53a25593114

    SHA256

    43a0eaac0a4e6e8dce833188762a3907c1a5fe328241495db042ad58d4d8fb00

    SHA512

    307d9d290939adc82d972d213cf10ef17fe9c5e2c445f8d4c606d9a030910f5be677c6ab280718059336704ee285a125bdf74f0bb7aa252903f56fe9a7508f23

  • C:\Users\Admin\AppData\Local\Temp\MW-937117ff-c3f1-460d-9bd1-d745065fbfd7\msiwrapper.ini

    Filesize

    1KB

    MD5

    0500f8564774846292673c81589beb18

    SHA1

    ba8e746daaf4f4d171653bb18147a94aa0e2f6af

    SHA256

    52a747cbaa3d314083ef1ab88a07eba60735a139e1e850993a84d7a53940f8ff

    SHA512

    cca7dd197d65ad06ee4d64f624b478520a66acb764e0055a424e8ef602d6baad70cfe72cfaea4faa89aed546c3598619cbeba0f936d94c93db862bda308217f2

  • C:\Windows\Installer\MSICD23.tmp

    Filesize

    208KB

    MD5

    0c8921bbcc37c6efd34faf44cf3b0cb5

    SHA1

    dcfa71246157edcd09eecaf9d4c5e360b24b3e49

    SHA256

    fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1

    SHA512

    ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    24.1MB

    MD5

    8adab31f56bb8881df1488767e2f4389

    SHA1

    9145fada9595356f8f9e76b15f830d66b8f4cbf5

    SHA256

    c0058578d513eec350b10b991a7af8c3cb16a14a6981741e52d8b093a59be6a0

    SHA512

    7cd727300bdf37d4035b0bcff74bcf937fc7ba8e5b1e3b6477a28b3f9f544cfeea362e50c8a738b2c276b4efb88f9f3ef2b33dbb3f5d6b85a67cc727a99d132e

  • \??\Volume{0576a638-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{5e091a4f-4426-4c6e-a939-c63f78156b38}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    584a7f214ab7dacea3a2043eb01fd311

    SHA1

    c59714fb549cb26995394f0daa72e1d5e949aeee

    SHA256

    212143f99a3a13239adaa8d9ef97770c297ce3aeba1a4936300c6f6e8a449ed3

    SHA512

    c1dea816785f50b7e6e2b97e41ac29801a6f112fb241d5f42f0ea4a09467743c5c47e870b885bfe7b435b8eedd950b0c873ffdc9a995f4171a8d2ec43a14a318