Analysis

  • max time kernel
    227s
  • max time network
    187s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2025, 13:52

General

  • Target

    SuperViewer Installer/Volume/bin/p15/niauth64.msi

  • Size

    1.1MB

  • MD5

    a48782e200e523147b55bae4ec3c0cb7

  • SHA1

    91e629e3249e72b416ffd6e4450cdf75a17db960

  • SHA256

    f0d8f233ea0746bbb83213d106d340f4faa78e713cc5cfbf16688752dc2a2d47

  • SHA512

    458cd5e19666f8ced064e9385fc3c79ce88cc784db6c0e5517f51cafe9267425098ec88163c59846b192530861347aef9875247fbafa2e52be7f60675f2b5790

  • SSDEEP

    24576:pFdtXxZo/3G1OFQu+TQNxshTK+63S3ZgTqGgeSZUf/:pFdthFGUC2PJg6Uf

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 19 IoCs
  • Loads dropped DLL 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\SuperViewer Installer\Volume\bin\p15\niauth64.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5616
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5712
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 148CF3DB3894E2B556570E412733FD1E C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4832
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3348
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding D0EE753D38F66216EB3F5F9C41B922DF
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:5368
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e58b765.rbs

      Filesize

      9KB

      MD5

      a69e97f0505d5bde1e4b2a264e403eab

      SHA1

      301ad4c4b1aad90712ac3ccdcfd706f63e70ba2a

      SHA256

      a03d1377de6fda98eb84e49970f864490e195ddf461d0f40a65ffd9aeabf9c66

      SHA512

      d9ef8050609e1e5380c81ae6153d13ef85ce10cf3aa7d15cb366d6c51bd845cfb7e42268575aa9970b8a23ba51d7c6f8aae52708d6f51d99dcafc9442ba23c07

    • C:\Users\Admin\AppData\Local\Temp\MSI422.tmp

      Filesize

      639KB

      MD5

      c6417930af8969f9f2cb431acd76ec89

      SHA1

      d2f2dc9b44f5f79348f7f36091b26a5465ad4f2b

      SHA256

      1b89704532113150fc7a8a06b5367ee26937c346635a860e93662e1fbb5cd79b

      SHA512

      f30d7a5b51f5d866ccabf3e15a45d3b4013e28a9bdaaf2176e8b121fbd4ab41a8e67c059b2ece8db5bc7a0ce043e76bbc4e3f6400fb9cd2886e1ffcd9e65d79b

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.6MB

      MD5

      a5bdcb7d81a701c3fefde20e17c6c040

      SHA1

      b5e442767bd1fbc64f8b5f7dc5f9f5717f546be8

      SHA256

      0dbc931331f9c5ba79bbf7c5817b5a173104803963ae74b97f112b69d8ab8c69

      SHA512

      a14f665fbe27d17d68d8a1bda583b9a1abe452ce4cbb211d1940d35e0667a7c662603c0e5ee272b7505a33d50201b8d8182e640fdfee5ea51b5ce4572a05e27a

    • \??\Volume{d3053786-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{6087ae58-f3d4-4615-9403-57e6c64703f7}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      aca297608058dc42824764dfc4d05fc6

      SHA1

      54bfaf4256043d0ce0c3d68b7b2ee6ab727de3e4

      SHA256

      5fdece41871072b57f666eb292eacac706cff6735c76ca2542a0548a8e799ca7

      SHA512

      267c8b634c4b2b686e8e70432afc40dbf1c952a92ec2384e42ef98fa217cc33842dba8c1fc6c1e247661d124b2f4299bf355e0d25cfba3ea1564da2800e8917b