Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 02:42

General

  • Target

    c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0.msi

  • Size

    13.8MB

  • MD5

    5d2922491b47e1c355103194e069e5ac

  • SHA1

    eb918f926c9cc2f9239f1dfe0380727c8170982c

  • SHA256

    c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0

  • SHA512

    522be674a5fb20af9a4fa42315ae8e780df3310f5b0ea8feccca1cf788cd6af542226aed65e9c6f7353d2daf954522f4067880626a2ccf4b7793178b57eb0bd9

  • SSDEEP

    393216:GDFCbAjiImi73v4JPUQ6Rm1feeuQx1qbvto:GRCbAjCK6PEm12ZQx1qbFo

Malware Config

Signatures

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 20 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3128
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3888
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:448
      • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\AudioReaderXL.exe
        "C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\AudioReaderXL.exe"
        2⤵
        • Accesses Microsoft Outlook accounts
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:3740
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57d65c.rbs

      Filesize

      12KB

      MD5

      6951a91eac0ccf86399bf9f3f890f0f7

      SHA1

      09bf90feaa7623d38cb57c8ff96e3fa6a4ff5012

      SHA256

      3344839f49df2aae3aa9e96e98a6285e764ee5f3749f280136b2915e83e2f769

      SHA512

      ea20560ba1e7f7ea848155187ee9f69c7eb1ca60fb9d3bce32f53f96f09c8253776d193cbd0e4dcf20b5a07f8f50311a2507e89eac29c173b7f7997f7b48bd36

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\ABCpdf.dll

      Filesize

      652KB

      MD5

      f35e190d9847aee93157ad18bee2ff51

      SHA1

      011dd903705ac60f39a74191b41b82c11c53abe6

      SHA256

      faf2b98ef2934c7addf7056a3b6f2fa56c814db79d960f8fb2744e4e4d260500

      SHA512

      f4329b5bed3a840e1e630be9a5a61903d2aae31d6fac068d6f750b98a0d2b65de9b38db1ddd6298c104704d48593996bc7db8f6e6d77f1117bfc8e0431935738

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\AudioReaderXL.exe

      Filesize

      2.3MB

      MD5

      5d8a546c266cc1d2f14b3be5c662c67a

      SHA1

      a474fe2bf3311a452bee640dbb423b20e0a99929

      SHA256

      8eaeff4697ce489daee3d82e7c703409907bfb9fa890a3646b56634798e01bc4

      SHA512

      cdd3c8c4a73ccf10d97097826e5b4567d0a3b227a9080e3ff7ad84eec6276a11c94a47f545d2b6023ed6a3b4b377d2073e6584b2ce4492f1de7789a7fa6c2cca

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\CharcoalDarkSlate.vsf

      Filesize

      59KB

      MD5

      947023ba00312c4574a44688a11fd5eb

      SHA1

      164a4609c041d93ccb645ab8df70e04ffb984508

      SHA256

      aa45e23296396e41e3f1547ee8aa59989f2ee3e05651f27b842eca366c87f047

      SHA512

      a6af49ba6e12b886bd30217a7ae5856881f553a4931acda2ae26e372fb79afc09ecf0a6364011adcdf2e2f93d76899a23570f00db2dce9d5c06a1a9c24b5c66d

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\Concept.dat

      Filesize

      5.5MB

      MD5

      4035390af4171153c1cb708f7151ed5f

      SHA1

      9ed10ad504e6b19f6fd9570ed92a793bd2d79721

      SHA256

      407048f9d01e5bf9051a043261a29c4654190444fe15e5f96f97c446ad7ae8d3

      SHA512

      56c8942340b9d83c0c396aed680000e1a2c9a0f075cb8c96150d9341aeef4a62245a373288ca0546c21605333deca86dc2fd47812de605bb3eaeb08b987e22c8

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\Languages\Russian.sib

      Filesize

      125KB

      MD5

      4d7d38ca87590e1c4787d834312485fb

      SHA1

      7114a6219f62149071e289ff171cb3a78dd43dd7

      SHA256

      ba8827d76c9682a3fbb548c1c392bd058c1cfda1fd8654c715abfbdad750e9a0

      SHA512

      28680ac747344f770d6a724c27f3b5f073c5a0d159ffa620900042ef25433e46f45d3a4c803175a92051f1f10b67f32ed2c41deb5b610f65e37bb41c701b2cd5

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\License-Russian.txt

      Filesize

      4KB

      MD5

      3d44e666ce041981dbf7529916d4c92a

      SHA1

      0d51862ae922cebaa9638d542d6b4684e195a1a8

      SHA256

      62edad9e609781d9cc130b3dcb9ac27c7342f79f97be295390c517251e98877b

      SHA512

      665e016a6956588ce761aca0e11d9429164e05e471b8f9c7510b297ddf136b209ec112c6043af5407f3effdde3e09ac4baa47548209c5c09f156e483d447016b

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\License.txt

      Filesize

      3KB

      MD5

      8c3d5df72e234543b6619a38ea4c9915

      SHA1

      42247b1b09814b174742d85a87e842af096426c9

      SHA256

      3a5ddb81221d346b0a4f9dcbdcefa7d63f38d4570d0c9b0627a7698094ba4356

      SHA512

      9f52d48261909bb151449dac60eb5d74128fab03e89c2e50ee9a872d263e0f4d27203fc898e4ba1e39510672de6ca0caea0329640c78b639da58defb1f18c225

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\PDFtext.dll

      Filesize

      1.2MB

      MD5

      f5dd27918cdc45136567ceb8b216c5b8

      SHA1

      d7da1e100292ab7d6908516a60a555be77b6d01e

      SHA256

      8a4c862ffdf0e858ae721bce97e2a5951c4d8dd665856459c41378141f5f2772

      SHA512

      c1d2240dc168df8cad9355f5266093babf0eaf257f40206a18f3364d0d3f2b1d03042241cef8134df06aa11cfb386f231ea48fa433801ace68282bbe32d904bf

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\RwcProxy.dll

      Filesize

      336KB

      MD5

      741fd2623ad12de3403f39ef575181e3

      SHA1

      54f3fa29a9565278109ba6a4049f403970110c49

      SHA256

      1612b2db97aa51736de92be6fc50c502394169ed4dc3e9bfde06f331dd08790a

      SHA512

      045171c2f8b65a0ce41ac86680dbc2683c1561ed008a4f33c34874cddefb8f5b15aa7f402dc98386e7b37428fc7ea86325c19c2e3b1b91bc401fc1659f6b8705

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\SAPIDLL.dll

      Filesize

      403KB

      MD5

      7d96ebf6ab548ac4e9f6ee761454de9f

      SHA1

      cc121db7480602a3e3a10cfc453f2604258805d2

      SHA256

      39c4355690759ade7e5a645603c46c48ff83b0d47163fbf7ffe9eaa92dfaecaf

      SHA512

      b2bf462d11217c764a5071b2e84b18cfdba778b48705afbde6e38f68dff80f8fe9a8f3c0f27cc731efa114e2ddd3a67219d79b289934c328d3820a2fe017a0df

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\ThemedTypesIgnore.xml.bkp

      Filesize

      322B

      MD5

      df00c215260aaa2d2b571005d38dee66

      SHA1

      a32c80f9023a9efb2d23a0c9d2b67824f5dfe85c

      SHA256

      72d8c1c2d41160e27830af8c48d49c8bb36cbcb03c4dcd0ecada3e43bcea31d8

      SHA512

      b15911c9a908758006200d31bc359611f3e6eb197cf98b61307680fee1bcad011beb5d09b6e7fe4e14b31e00715950b1ba43e5ab26e43207f36c856e3b61cddc

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\WhatsNew-Russian.txt

      Filesize

      753B

      MD5

      622f3d0b51d18328020f858c77ac4a9c

      SHA1

      84ec68b009c254fbcbf8d0fe38917e27eee26392

      SHA256

      4f39de7b48d8cd80f40267250df737619c122c260e982ca64029ce6bbc852d95

      SHA512

      1f9712be02005380a52806478eb316d9d9f212cedfd7458eb337b9534823ddd5ad69e4f2d968d8ce8825286372a1da90423a8ef0e0bba6068deaeeff228656fa

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\WhatsNew.txt

      Filesize

      782B

      MD5

      26c76e66cf53cf7767f08c00e4659b09

      SHA1

      0907744fe2d42ebb9b53be23ad28dddb256acbd2

      SHA256

      5cbd87a6585c0bbc9904dff390d98333c36dd7728fbb67ece896bdd93abfd066

      SHA512

      874746b34fe44ba42e3aebb691b446ad6a8f7ceda52ca35c99b2a06ab754e4538931eb3bb3d2beb71196102bd1516a14ddfe9235f94bfd42d117c596a8129b39

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\ebooks\meal.wav

      Filesize

      1.8MB

      MD5

      1adb1764e42021f4049b1ae9f2e1d614

      SHA1

      813df01ff0a7562f1d0a02ab1f60f3f60435abd4

      SHA256

      88183affe3e1feb95c8b9f55b2d4a63bcbd1e8b40b901ec01bdcaa15a6d442a1

      SHA512

      e3d4f0efb59a7f77b5940a0a3c26aec5a5e879dc42f951376bb6c5e4184f137bd624d766c10b6315294860cb0b7113ff2fd6b4d09c89b4f9421b73705dd5e647

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\jdefend.dll

      Filesize

      8.7MB

      MD5

      ba095598cffb424c202781656ca2f2a7

      SHA1

      013486f84aba2a89955c6a62def2fd9524dba151

      SHA256

      f7b8d216b27fa51d835d262ee55fbd836d08b4f413e42bad38dea658f1779aed

      SHA512

      687223da11c8e0507a57b8480421400cbc44476ee94407e3601a8797e86449f95bf72ce47520071816523b40377509a27cfbdab29eac7c97f68c4411a852229c

    • C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\links.xml

      Filesize

      255B

      MD5

      a09cd34d7b0c5d9855e09181c6dd72e8

      SHA1

      d6b1fa061c69bc773922336824ed8b6040b9690c

      SHA256

      c7b45450bf29b9e7dbce2b7ebc0583875edd233180eeca698b2b681c5da9200d

      SHA512

      b6af8cd55d1361e248091e4de08a13f6deabaa5e129aef6a29f161916682ab8a9133955e418bcda0e79cdd053f0872c0d1b2525e5fafa275f431886d88580ea1

    • C:\Users\Admin\AppData\Local\Temp\Dhiypho

      Filesize

      40KB

      MD5

      ab893875d697a3145af5eed5309bee26

      SHA1

      c90116149196cbf74ffb453ecb3b12945372ebfa

      SHA256

      02b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba

      SHA512

      6b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc

    • C:\Windows\Installer\e57d65b.msi

      Filesize

      13.8MB

      MD5

      5d2922491b47e1c355103194e069e5ac

      SHA1

      eb918f926c9cc2f9239f1dfe0380727c8170982c

      SHA256

      c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0

      SHA512

      522be674a5fb20af9a4fa42315ae8e780df3310f5b0ea8feccca1cf788cd6af542226aed65e9c6f7353d2daf954522f4067880626a2ccf4b7793178b57eb0bd9

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.1MB

      MD5

      db361ee65194166e13bf9c28f53b25e2

      SHA1

      3ccfe6576c070b171fabdbe43a6803d7b57c1662

      SHA256

      f1bee0be9ad7db5593415c108864f0ab755d9caf17c1d04e43680c1b3bc67e67

      SHA512

      38db0dad00a6c4544fdda815ec8339f4ed514b3336584d36312f67ed35edb41eb4ccea9f03aea9dfa850ee255933276b4e3417f2d5fd77f41df7875cf601da17

    • \??\Volume{f9c79713-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{9f1b129d-8275-4c10-aae9-bf0bb12d4f0a}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      f57d1955903ee407177574dfad8e7a68

      SHA1

      7274fc48bf916145052270ed9833cb5536783829

      SHA256

      cd4cc3086dcdf3b976db879c078af10e9c02e42f4c84bd38876265fb2eab2755

      SHA512

      3d8367f3d0e8a64b78cac7fc3c9be28e724cc5bbe5dac79d995835f0212128698c63de45007603926c8c808046414e93b0f1afbc83177660d2f6a190b7378db9

    • memory/3740-77-0x0000000005FF0000-0x00000000060DB000-memory.dmp

      Filesize

      940KB

    • memory/3740-114-0x0000000005FF0000-0x00000000060DB000-memory.dmp

      Filesize

      940KB

    • memory/3740-79-0x0000000005FF0000-0x00000000060DB000-memory.dmp

      Filesize

      940KB

    • memory/3740-62-0x0000000074960000-0x00000000749CE000-memory.dmp

      Filesize

      440KB

    • memory/3740-54-0x0000000000CB0000-0x0000000000DF7000-memory.dmp

      Filesize

      1.3MB

    • memory/3740-86-0x0000000000CB0000-0x0000000000DF7000-memory.dmp

      Filesize

      1.3MB

    • memory/3740-84-0x0000000000400000-0x000000000065E000-memory.dmp

      Filesize

      2.4MB

    • memory/3740-85-0x0000000000C40000-0x0000000000CAA000-memory.dmp

      Filesize

      424KB

    • memory/3740-88-0x0000000000C40000-0x0000000000CAA000-memory.dmp

      Filesize

      424KB

    • memory/3740-87-0x0000000000400000-0x000000000065E000-memory.dmp

      Filesize

      2.4MB

    • memory/3740-90-0x0000000000400000-0x000000000065E000-memory.dmp

      Filesize

      2.4MB

    • memory/3740-96-0x0000000000400000-0x000000000065E000-memory.dmp

      Filesize

      2.4MB

    • memory/3740-113-0x0000000005FF0000-0x00000000060DB000-memory.dmp

      Filesize

      940KB

    • memory/3740-63-0x0000000005FF0000-0x00000000060DB000-memory.dmp

      Filesize

      940KB

    • memory/3740-112-0x000000000A430000-0x000000000A9C1000-memory.dmp

      Filesize

      5.6MB

    • memory/3740-108-0x0000000005FF0000-0x00000000060DB000-memory.dmp

      Filesize

      940KB

    • memory/3740-118-0x0000000005FF0000-0x00000000060DB000-memory.dmp

      Filesize

      940KB

    • memory/3740-120-0x000000006E600000-0x000000006E69D000-memory.dmp

      Filesize

      628KB

    • memory/3740-119-0x0000000063280000-0x00000000634BE000-memory.dmp

      Filesize

      2.2MB

    • memory/3740-121-0x000000000A9D0000-0x000000000AF5C000-memory.dmp

      Filesize

      5.5MB

    • memory/3740-122-0x000000000A9D0000-0x000000000AF5C000-memory.dmp

      Filesize

      5.5MB

    • memory/3740-123-0x000000000A9D0000-0x000000000AF5C000-memory.dmp

      Filesize

      5.5MB

    • memory/3740-124-0x000000000A9D0000-0x000000000AF5C000-memory.dmp

      Filesize

      5.5MB

    • memory/3740-125-0x000000000A9D0000-0x000000000AF5C000-memory.dmp

      Filesize

      5.5MB

    • memory/3740-52-0x0000000000C40000-0x0000000000CAA000-memory.dmp

      Filesize

      424KB

    • memory/3740-177-0x0000000074960000-0x00000000749CE000-memory.dmp

      Filesize

      440KB