Analysis

  • max time kernel
    198s
  • max time network
    214s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2025, 05:19

General

  • Target

    flashplayer20_0d0_228_winax.msi

  • Size

    18.7MB

  • MD5

    5bbdc07c6e6389b5d2ce86765911c879

  • SHA1

    fa86f107111fc7def35742097bf0aa29c82d7638

  • SHA256

    63cef518bff5b7a8cadd6b2a8c6b738ce3f2fdce231e95db920cbdd75e0f0bc6

  • SHA512

    144b7d73094f19cfec404f1c10d133df43f5b67d39b404ecc2c82598bed55b0622dce13e24cfa39d0cbf552a296f4a132922d23e84130fe26480cf1b0dad0e73

  • SSDEEP

    393216:AJhhV7thwzSIFadpgMKjSCHDqhadHDk2My5FiO93IYP:UnV76SIUMDSADqhaLMy5l3b

Malware Config

Signatures

  • CryptOne packer 1 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Blocklisted process makes network request 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 8 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Drops file in System32 directory 15 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies data under HKEY_USERS 16 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\flashplayer20_0d0_228_winax.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3012
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3740
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 287214E80E90B53BE966133326914184 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:396
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4908
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 911D89E07084BFC8CFB6501D9BA90714
        2⤵
        • System Location Discovery: System Language Discovery
        PID:5204
      • C:\Users\Admin\AppData\Local\Temp\InstallAX_20_0_0_228.exe
        "C:\Users\Admin\AppData\Local\Temp\InstallAX_20_0_0_228.exe" -install -msi
        2⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • Drops file in System32 directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Users\Admin\AppData\Local\Temp\{8D12B03C-7513-464D-B1FB-0B4D43AC7954}\InstallFlashPlayer.exe
          "C:\Users\Admin\AppData\Local\Temp\{8D12B03C-7513-464D-B1FB-0B4D43AC7954}\InstallFlashPlayer.exe" -install -skipARPEntry -iv 2 -au 4294967295
          3⤵
          • Event Triggered Execution: Image File Execution Options Injection
          • Network Service Discovery
          • Drops file in System32 directory
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Modifies Internet Explorer settings
          • Modifies data under HKEY_USERS
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4428
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\{8D12B03C-7513-464D-B1FB-0B4D43AC7954}\InstallFlashPlayer.exe" >> NUL
            4⤵
              PID:1440
          • C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
            C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe -install
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3176
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\InstallAX_20_0_0_228.exe" >> NUL
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1436
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        PID:4488

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e5791e1.rbs

        Filesize

        8KB

        MD5

        bfecc0ea12a7adbbb3443ae7e4972b9c

        SHA1

        d7aecf5531d6daceb8dff6d1ee62cc8b0de8c09e

        SHA256

        c57689cb72acd452b6b2dac5ef0b7b33920b70aaa36f1b0c87833396b6bc5ba3

        SHA512

        7c569d33ea2cf53f09e7ed654cea11c8f157681a020f8ccea85b8454f76eb769cf13b992782727979204dfd0a81f8b3c1c184886692d19913c9e6291329e1ef5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0972B7C417F696E06E186AEB26286F01_3EAEAB67121169D5C037E4B1278DEA7C

        Filesize

        5B

        MD5

        5bfa51f3a417b98e7443eca90fc94703

        SHA1

        8c015d80b8a23f780bdd215dc842b0f5551f63bd

        SHA256

        bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

        SHA512

        4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3D0AC26322348780E90E022EA217C58C

        Filesize

        16KB

        MD5

        f3c162704d3b510ad6e20ed70e5f7652

        SHA1

        4e9091c9c519fe60e1509364f9120a4c1f1f5bdb

        SHA256

        06cbf2c10e9e9fccc983aca05d438a3d11a3f8fb3a28ca000fe579b0b8e18a03

        SHA512

        97cca43da45a1f3b236ab455f72a4784174fac1a2ea513751008b1a42774e14a9eb8c302e9c8f090198953846affd4886178ef9af27b6ba3f8434d9c695c04ba

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A3D5BF1283C2E63D8C8A8C72F0051F5A

        Filesize

        834B

        MD5

        5cb16e48b582bf86a4b396fcbc235981

        SHA1

        3e7cbf189fbbff1efb9b04c398ceb902e816f15b

        SHA256

        ba479af493eeefdf7de4c86890f5d87886bc0bc92522d39dd09eb21f85cf23f9

        SHA512

        55210eb21fd974bb189063d4e377c37b2cf1c2e0d7ec056dee48f8619cfe04a7a8c1ba329abcfa7edb4785fac08375df4c8261e98dc3a8294f0f4fc29cf61eee

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0972B7C417F696E06E186AEB26286F01_3EAEAB67121169D5C037E4B1278DEA7C

        Filesize

        398B

        MD5

        6fdb48a57be46e4f3c1035c246c73df6

        SHA1

        82b8fa6254f1c927469ddbc95bf5185856ca1fdb

        SHA256

        f65a4d8b0eb33e35b01563f99e00aca32823402e8c05070b43b52cc6e3c5c094

        SHA512

        019ac9a9d9378a100d732d38272a7eebbb437897932e96f3ba30929abd6b0ad61b156dad0ea03727448bbbace6b419fed45face4d689cef777f953450aaca94b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3D0AC26322348780E90E022EA217C58C

        Filesize

        170B

        MD5

        1e145528d1632aff1e4315098698cbb6

        SHA1

        7263229a595d0d11c5cb2273a8458a11b59599dc

        SHA256

        6567362cadb97df5a84aa4bdb05a8fbbeda8d6c6c8185e1c3f909d461e2b712b

        SHA512

        d08de7b967bef3ed7f77724eb354008cf87b63f04b48f71494b8afa6e40f3945f1276fcaa059b431ed4217d756ea8b116fb836e5b6d48d1f03ba2238358f8334

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8828F39C7C0CE9A14B25C7EB321181BA_3DF94EB797096674F7793A562A778C5F

        Filesize

        392B

        MD5

        002609d900297bd93f2698e40af5f49c

        SHA1

        b54baa5e3b23206df9c73179aa4bd969c046763f

        SHA256

        4d0f740c645b4cf67e2807af36b4d83214e3f10773402be566b5378dfeec5804

        SHA512

        107247cdc696f8326113ed5580c97c4c838b01bef61ad972ccef92e44cf45def5cf1c2ab01ced9e826e562f653690b57a12535ea3978e686d322e17d9b13486b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A3D5BF1283C2E63D8C8A8C72F0051F5A

        Filesize

        178B

        MD5

        1c60a3cf57fea5dfed94d8a6479237ac

        SHA1

        16efd633736e36e2852b960055bc9b516381ec70

        SHA256

        0c7d8618d90830c6757017c003e84c0991094600ecb45269f733275051c41943

        SHA512

        ff1241831160521b58d8670a2560561cd135cfcf638c44a8404eda9e75236d100c5b75faaccb84b73251c7f7e3560121b57d30ee55864e0d9a9424496e31f363

      • C:\Users\Admin\AppData\Local\Temp\InstallAX_20_0_0_228.exe

        Filesize

        17.5MB

        MD5

        8028ab3fa3c7f3c3468a714db788f2b1

        SHA1

        2035f1356438d7ed28db46b3e2a4eeb11ade4579

        SHA256

        2998f50b750ad49dc49b9a46e8c1a69a6fe636a3f0f10705deab9a4ea31d7209

        SHA512

        6c6dd8bd10a6a543eada17e54e4a7ef7fdcb5f080041be275e377fa15f63a730d210f04bcb0880222e38ca28932c531128f5e537a03b7b95ee56a6742bf25e6d

      • C:\Users\Admin\AppData\Local\Temp\MSI4FB6.tmp

        Filesize

        57KB

        MD5

        c23d4d5a87e08f8a822ad5a8dbd69592

        SHA1

        317df555bc309dace46ae5c5589bec53ea8f137e

        SHA256

        6d149866246e79919bde5a0b45569ea41327c32ee250f37ad8216275a641bb27

        SHA512

        fa584655ae241004af44774a1f43508e53e95028ce96b39f8b5c62742f38acdf2b1df8871b468ac70c6043ca0e7ae8241bad2db6bc4f700d78471f12bb809e6b

      • C:\Users\Admin\AppData\Local\Temp\MSI5092.tmp

        Filesize

        141KB

        MD5

        edb88affffd67bca3523b41d3e2e4810

        SHA1

        0055b93907665fed56d22a7614a581a87d060ead

        SHA256

        4c3d85e7c49928af0f43623dcbed474a157ef50af3cba40b7fd7ac3fe3df2f15

        SHA512

        2b9d99c57bfa9ab00d8582d55b18c5bf155a4ac83cf4c92247be23c35be818b082b3d6fe38fa905d304d2d8b957f3db73428da88e46acc3a7e3fee99d05e4daf

      • C:\Users\Admin\AppData\Local\Temp\MSI74ab5.LOG

        Filesize

        63KB

        MD5

        cfe58e8354671b48117292a34c6257eb

        SHA1

        acef471e74b56509cbe8bd663960cba405451914

        SHA256

        4347e7ebe1ad92d3f903401e1d2c6731190fa2d25eb7226fa559b33ef28123cb

        SHA512

        3ec9bc479cb3cb431b08f2d8f4d67fdef0cb233e3a846c657be1a3930b77fba0dbf0bb745b70ccbee08bf7fe79c762c77b1dc11c1581861dfb320807bc121128

      • C:\Users\Admin\AppData\Local\Temp\{2C648182-6099-4BC1-9D13-3F290DDEEC56}\fpb.tmp

        Filesize

        496KB

        MD5

        ba4ae84720ed3fb1e0f04481f03c928f

        SHA1

        3071b7b4fe8fce29dd6afbf2630d0396f795c6f4

        SHA256

        c52f5f7ce908a9a3bab64ec8e765f53012f6bdcb8736b31fede77cb1dc268bdc

        SHA512

        37baeb41c55b5cfb10c92cc3e682d1b229d5cbc9063fc70c74d9befcf655ef1939d244574e2f97e10226ff6c210e54a1eb1660a082bb8a34d112e59f39fe163a

      • C:\Users\Admin\AppData\Local\Temp\{6919FCF5-D4D7-4025-BD0A-0131D8553052}\fpb.tmp

        Filesize

        1.1MB

        MD5

        4b5578b92aa9b6c8e456606adf962bb3

        SHA1

        60bcace18b601036cdf6a659e502be7ae1fa28b2

        SHA256

        9c3f2d1fa670a0ddd3781e7e8e86c4fb1b516fa9f3ae970f4d4c581e5939fdc1

        SHA512

        3ff95d64c8afdc8c8ab974f513db873e99d0d3fde897db55574c13f7f38f37b2ad03a6354b8321e696c5790fe071133e0fe4b5ef2f7dbcbb76ea3f521abe898a

      • C:\Users\Admin\AppData\Local\Temp\{8D12B03C-7513-464D-B1FB-0B4D43AC7954}\InstallFlashPlayer.exe

        Filesize

        9.1MB

        MD5

        2c307edcbbbd6ad698c4e47067aa8641

        SHA1

        4b5c6b933d71b56fa01ed53e74b257944708ae55

        SHA256

        f34939585a10764d45a87c535873aec4e28a0e8016f581ff339436be034ba52a

        SHA512

        bd3bae96ddf9a00eae39b3f954984f3b834b32d15e6537e747d049ecc8dcde31b9a35a906dcb77d2e3e97c36f895b4ef6f9188d5a981a882db3adaa5b988ecfa

      • C:\Users\Admin\AppData\Local\Temp\{965624BC-EC1F-44EF-8673-8E3F31F76DE4}\fpb.tmp

        Filesize

        562KB

        MD5

        f6c9330cc45fdd0caef7f5f8bdb51ff5

        SHA1

        278fcfa827257e37f91e6f3005dd7774b50d29d9

        SHA256

        2d5895550819a89d7a8346dac2ac3043baeea6705148456d8649969cf88bde79

        SHA512

        ac1e5141956e3bc3f4167f3676a10a2ea674c89ca4eadac195411b62ebcf4f51dcf0e8dbd1bd3d5443d441aa9a228c8558f1789d8d2292ec7d14607fe28df01a

      • C:\Users\Admin\AppData\Local\Temp\{AFE2638D-94DE-486C-9B39-1C7BFE165472}\fpb.tmp

        Filesize

        858KB

        MD5

        ab8b7d5e808226f8e4279f6a779dcf2d

        SHA1

        213cebfa80f179468c79296a7e5d038bb3ed84a2

        SHA256

        60048a8f9395ec1dd6160ee7bed035f106ae13cccd714cc2c40173cfb3fbd242

        SHA512

        b43fbfb51a014be44f43b6abb252e3f1be74b825f0c18c1bf7775e0eafa7e1c602e46a46307e35bbe9ebafddbbf3cf384c4d366e8b8bfc11632c2ad2291cf43a

      • C:\Windows\Installer\e5791e0.msi

        Filesize

        18.7MB

        MD5

        5bbdc07c6e6389b5d2ce86765911c879

        SHA1

        fa86f107111fc7def35742097bf0aa29c82d7638

        SHA256

        63cef518bff5b7a8cadd6b2a8c6b738ce3f2fdce231e95db920cbdd75e0f0bc6

        SHA512

        144b7d73094f19cfec404f1c10d133df43f5b67d39b404ecc2c82598bed55b0622dce13e24cfa39d0cbf552a296f4a132922d23e84130fe26480cf1b0dad0e73

      • C:\Windows\SysWOW64\Macromed\Flash\Flash32_20_0_0_228.ocx

        Filesize

        16.9MB

        MD5

        2f45875867bf0dc006d1a11e795abc8e

        SHA1

        bf1de85b83200ad8e8913183226b76aabc122986

        SHA256

        77e1e64227ba610f010f3742349114a4859daf57650ac676b220d1e1cf547450

        SHA512

        7b848c65d07bbfee2f369c0ebb4571fc8af8c739a74852fe6dda9f4df9287ac45ffa40f0b9d07c39f85fc49b31d8e7ec8765b4707e5e7314b54a1005ced92961

      • C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe

        Filesize

        263KB

        MD5

        bdd170a319b7a9f7b11f58e59f827a31

        SHA1

        05ce443e1f44449b07ad3d45a8ae4e3465697bf6

        SHA256

        ca8355f72b3d8e000e60670f717508a8dbde163d26f0e6e6255f6dee2027124b

        SHA512

        eca9431d7e40f88a8c51ba0533e63c001b340be81c330f61f082d85c55b4fee489eee85776494ee723b051f2b982b5669144b8f2d8d33b92e924ca02a870b0df

      • C:\Windows\System32\Macromed\Flash\Flash64_20_0_0_228.ocx

        Filesize

        23.6MB

        MD5

        914fc3a3c30f3f5d7906308067b9ae2f

        SHA1

        6ab5f83269500809bbed37081dc7cdb8c08fecfc

        SHA256

        93d92c4e66a91535bd1a2b17445c183ade43fb0a94bffb96e693704bdbd28c43

        SHA512

        8c0f8d6815fae339624985b2977f1d5abd8f75a7109071428eb70b66770473cb3913a87394c6201e9046d25657e7c58851c9f8474aada1d5afcdfd9874ecfbd0

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        24.1MB

        MD5

        37a1058964135c215a64a36cb488175a

        SHA1

        3517ef3d7da4cac9c51fd84f62bd66e960f6d4f0

        SHA256

        d4c94d7bd9b0226b4ea4167d4ff5ef63cf7c54d2093f259cca2e72ce58b9d5f7

        SHA512

        559d3b45dcd1b151ae02cf1d3ec72bf3ac824bf3f11da5246135e2abd3b8e6c6030c96d080db52aef8011929a54a65b3b6ddd577ef74b3756aa4702ef7deec7e

      • \??\Volume{a6f17796-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{84c42fd1-fa37-46fb-848c-6a052560a221}_OnDiskSnapshotProp

        Filesize

        6KB

        MD5

        fd16b5e7aa48643e25f52cb380fb2bc0

        SHA1

        f04f491e54e31f45314ea900c95dd814e693be21

        SHA256

        49d236887010cab340cd6310b161410286268f93bfe0a58bc033222216b62de4

        SHA512

        e7d95861e4c011857f6259524ae40d34e43c27a1f77b1f8f3cd9f3a2356ad2fba8821afd9f20f822798cc6968f40387af8307c12ee49f62b328c9896da08ab96

      • memory/4428-107-0x0000000069FC0000-0x000000006B854000-memory.dmp

        Filesize

        24.6MB