Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2025, 20:29

General

  • Target

    SecuriteInfo.com.Gen.Variant.Lazy.649482.672.23261.msi

  • Size

    1.8MB

  • MD5

    5bb70d7faeb044ecf200803e8e314a34

  • SHA1

    dd00ed97f53af03da223977db11add722b407a2c

  • SHA256

    3f778345b98ceb026ddcf5330314e3a5b15f19219de36a7ef6ca5de53bdd536a

  • SHA512

    cc0d6b80f212d80788c4565b3a617e175486fa319bb6723a316a8dc77daf6d4f38e09aae317b3177f652f6dd636fb9e6e4825d4a6be78dda6cfe08d82b7904ca

  • SSDEEP

    24576:zt9cpVDhv6r8pfUYjnLXMx4ZucxEvr95R:MpRhCrsRjnL8x5cEB5R

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Lazy.649482.672.23261.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2912
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2260
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2FA7E16BDBBE9722ACBE036D55F5112F
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-0100c482-a927-4e76-be5b-3f06392cde69\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:1144
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1392
      • C:\Users\Admin\AppData\Local\Temp\MW-0100c482-a927-4e76-be5b-3f06392cde69\files\setup9945.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-0100c482-a927-4e76-be5b-3f06392cde69\files\setup9945.exe" /VERYSILENT /VERYSILENT
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3956
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MW-0100c482-a927-4e76-be5b-3f06392cde69\files.cab

    Filesize

    1.5MB

    MD5

    9eaad7e4f46cebed760c415660d1642e

    SHA1

    21f6ed529b2e044b2aff9cfa7cca64fc0c2e87b9

    SHA256

    81a78edb0d27ffacbe3aac30ac527485245d27edff307888fc3e4218ecc5109f

    SHA512

    e5c53eeb59bc39a4066b550a810c380278c2345b2d6cdf3bbf54a5df9d032e8a0a261d67befbc04cb3a6f56aec383451e4bc1ff1b95ff87cd9b1c2d4e0a5db77

  • C:\Users\Admin\AppData\Local\Temp\MW-0100c482-a927-4e76-be5b-3f06392cde69\msiwrapper.ini

    Filesize

    1KB

    MD5

    aa83a9d88bae41b8573d50f6e45eb8ae

    SHA1

    57e7fec8b865366a52f9fe88040d8d1959a3cb27

    SHA256

    bbbcfc1126971dcce934c88aa680d0e79891e8810e0532edd069709a36b6fe04

    SHA512

    e02f36cf3774de24ccd6d1af0c6088f86a4a40b919a06bbc0a6599347c1e71afec0924c4094945342e164f841a2af12f4eaaee5b3e12e4f208144625841bbf8c

  • C:\Users\Admin\AppData\Local\Temp\MW-0100c482-a927-4e76-be5b-3f06392cde69\msiwrapper.ini

    Filesize

    1KB

    MD5

    73d501943ade0787aca5bd387c9c349c

    SHA1

    e7e0c6f532dbcbd75abdd84cb8e15fe9f27fa49a

    SHA256

    d4d5190246cec7550cd5ed24bb8bd74ccf473762c4a547b8710a98e600367d69

    SHA512

    424a575e777200467d2a0e24bce931bc7c5555d21c469947fa4944cb2f3f41f5297152207a179f055937415cd19f8be0b2c776dfd07c63bb063af8a4a94b4c85

  • C:\Windows\Installer\MSIBF0A.tmp

    Filesize

    208KB

    MD5

    0c8921bbcc37c6efd34faf44cf3b0cb5

    SHA1

    dcfa71246157edcd09eecaf9d4c5e360b24b3e49

    SHA256

    fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1

    SHA512

    ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    24.1MB

    MD5

    bd5b41e5d942f037df41dc0b7d7cf30b

    SHA1

    90773972b6ec3b229498dfd3f976961bab53668c

    SHA256

    b2392fe80d25cd2a3775ba795dffc377ac4aea6179c7c14192b751713bdf9742

    SHA512

    b3f1a27ec1caf0387d92aeb6b0c9821ee97e5685409ace47710081efd3731c823a82fd79bc94c6e2034f216d2aa67308da565ce924dac4ac688d81c4f001a06e

  • \??\Volume{22274b92-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{74912877-ce5e-4e7e-b279-4e884d77d324}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    fbf56b64751519893c940cbd29d49ddb

    SHA1

    3500055dca1655ef126abb481c0df0f3edf0576c

    SHA256

    44f7e15fe3b66522e6d7e4bd16f2f62eab58bd726ec22d527d3cb14c13dd4235

    SHA512

    ac3f17fa6e52047cc85e0f97ca49378ddcad1f2af10c54c590335056f76d8869d0f9d70ddde91413f44942a034eb51cc056cf11a1bb1171045cc92f73ce3ccc2