Analysis

  • max time kernel
    56s
  • max time network
    67s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2025, 13:52

Errors

Reason
Machine shutdown

General

  • Target

    SuperViewer Installer/Volume/bin/p26/logos.msi

  • Size

    1.5MB

  • MD5

    a1b0ac1fe3989aab3e6a85dc85d8dcd6

  • SHA1

    6b86ad7bf3e4995a3c9123844379af34bd3dab4d

  • SHA256

    c9dbfb1c4c398f8bbe787bf42535e7b23fef8b8a74a5b290964bf812c1e51d59

  • SHA512

    24e4a9f852cf8e6a6b2c2af59300bd9aadb199637a1c556f500d7e28d9b706b6b4287ad3741ee22245c55b1e4d98f9cbe9a219dad4e1c759547d6ce2c8d23775

  • SSDEEP

    49152:SFytInONSSYAP+sYSO/trwQKZvTAwVC2PJg6Uf:SFjhwQ4VC2

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 20 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 18 IoCs
  • Modifies registry class 57 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\SuperViewer Installer\Volume\bin\p26\logos.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4884
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C0A7583E3E48D012ED52B7BA1478A795 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:6048
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1920
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 968571B35A1339F403EA255195F51F3A
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:756
      • C:\Windows\Installer\MSI6EC7.tmp
        "C:\Windows\Installer\MSI6EC7.tmp"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1508
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:4484
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa3a36855 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:1096

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e586a8d.rbs

      Filesize

      33KB

      MD5

      11b57dd0cc22420d8f80cdffc5aca8ce

      SHA1

      5dfa00e4cee8936a4449bbf243b8365a11924c0c

      SHA256

      4090a37482a1ca2e45519ffbec8b066f664fa18ba2c6075552f1a4defc8831f9

      SHA512

      18274e0f23819d0bac953e73618f630f52a54bee6fc6bced6bed6713cf4278a0c5ae98ad2288c4ff348bac909f0767c91e4a29e8a8c82a3ac25a28195dd13a44

    • C:\ProgramData\National Instruments\Shared\LV Help Index\usrmgr.chm\_0.cfs

      Filesize

      11KB

      MD5

      7ebad66675321f3b1542caf7d45dbbb6

      SHA1

      204b12e72aacf1ca85c1ddcdf99b7108d1d7a927

      SHA256

      4a8750f00d67a85e5287329ab67d2b5f9dd7226d8d5244155c29d81c6b1c0daa

      SHA512

      2fa9fd9d0612947359857b38a8494f27047b656e811c73a7e52a34f994f3fd1a0a1a394f66c4a94d44ab6180957eff129bf4cb1a7fa91da68cc0dcefa6ef8b5a

    • C:\ProgramData\National Instruments\Shared\LV Help Index\usrmgr.chm\segments.gen

      Filesize

      20B

      MD5

      2eb2668d2bf13379fa3584b9a9867b46

      SHA1

      86ee9f040505bb2f9ad01472bfc6c3f10f6f0091

      SHA256

      ab308562fd6f5404d34e923152ee70ff7bddaab2f421a6c58730ba731bd09182

      SHA512

      15dec785f3fd190336f8561a827566d90865d174f33f6c7947da7b298734aad887f522d2fc625353c8a798e4c6cfeef27bec59131fdab3384dba0fcdd50f8415

    • C:\ProgramData\National Instruments\Shared\LV Help Index\usrmgr.chm\segments_2

      Filesize

      211B

      MD5

      d891952b2875dd23809fd7d895701b0c

      SHA1

      d24804055cba97681d74d46231ffde988955ba4b

      SHA256

      8252b9943a22c45c50997a1626985b45813bfe16f598f88fd5f3bf50ac3f6f4d

      SHA512

      f4138e7caa574e42f2299432efdbe2f85a976ee19f7f926aaa60ed2a6d560b6c42144ecda6cf61ed2ff36d298845c8f206b2744826e1175cad2864b797f0c26d

    • C:\Users\Admin\AppData\Local\Temp\MSIB8F0.tmp

      Filesize

      639KB

      MD5

      c6417930af8969f9f2cb431acd76ec89

      SHA1

      d2f2dc9b44f5f79348f7f36091b26a5465ad4f2b

      SHA256

      1b89704532113150fc7a8a06b5367ee26937c346635a860e93662e1fbb5cd79b

      SHA512

      f30d7a5b51f5d866ccabf3e15a45d3b4013e28a9bdaaf2176e8b121fbd4ab41a8e67c059b2ece8db5bc7a0ce043e76bbc4e3f6400fb9cd2886e1ffcd9e65d79b

    • C:\Windows\Installer\MSI6EC7.tmp

      Filesize

      396KB

      MD5

      f0b82c3c95271382907b1adf047c7ec7

      SHA1

      98054465b8974a63c9e79f865eb43ec8cfbe0e07

      SHA256

      0f3531cb26b48dd1314c74916dc0f7cdfe1bfe1da222f361896ab5c27cf521ce

      SHA512

      b204d262fb16078d4a976807f3acc597c5353e419a8b48ac273a2256e7e2eb59061aa7d0a71d8955f856b10856fa5687075e866606083d2d9f5372f5a291eaed

    • memory/1920-108-0x00007FF7AFCE0000-0x00007FF7AFCF3000-memory.dmp

      Filesize

      76KB