Analysis

  • max time kernel
    227s
  • max time network
    214s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2025, 13:52

General

  • Target

    SuperViewer Installer/Volume/bin/p3/NISys00/NISysLogUtils.msi

  • Size

    1.1MB

  • MD5

    9784a2727ad04a441611a39ab72cc86e

  • SHA1

    44ade989d1e1bab933117686369d03b22a8ec84d

  • SHA256

    83813e524b98672d4e7ace0d29068748aed5694dd1ee5389e908ce4f1c51d1ca

  • SHA512

    bc10351d36528ed579c4d11a427d13bbc968f60bfeb8678d1eb84c6a3c4234d62797431f36bad245bb715dee29f868c7612c42179e3698dc9529ae0bc9f90ad6

  • SSDEEP

    24576:dFGtbRo/3GfBDO+TQNxshTK+63S3ZgTqGgeSZUf/:dFGtbXBrC2PJg6Uf

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 19 IoCs
  • Loads dropped DLL 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\SuperViewer Installer\Volume\bin\p3\NISys00\NISysLogUtils.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1472
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4648
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 58FB7CE2509AE3A3808959C5B6A0A572 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:5792
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1048
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding D7FBFE8D3D6D1C2F08C056A07B835789
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2992
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:5104

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e582a48.rbs

      Filesize

      14KB

      MD5

      e71ecd4f5d35895acaff11b050047a6b

      SHA1

      29ee17771bb0ed37b62043d8d773fdc278ef6027

      SHA256

      20786a7101c87f108c0a32e0f63364adbaec1b99cf4ed2d80663ca546a282a7c

      SHA512

      3296c642bd99a2ef62750e1b02db2aa013ad21b06533bc7a36e98d8db1840a292c09ea297d5d1e0b0498cd790e1872f2d8ba146f99453f1b25156c5d0623a320

    • C:\Users\Admin\AppData\Local\Temp\MSI75CC.tmp

      Filesize

      639KB

      MD5

      c6417930af8969f9f2cb431acd76ec89

      SHA1

      d2f2dc9b44f5f79348f7f36091b26a5465ad4f2b

      SHA256

      1b89704532113150fc7a8a06b5367ee26937c346635a860e93662e1fbb5cd79b

      SHA512

      f30d7a5b51f5d866ccabf3e15a45d3b4013e28a9bdaaf2176e8b121fbd4ab41a8e67c059b2ece8db5bc7a0ce043e76bbc4e3f6400fb9cd2886e1ffcd9e65d79b

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.6MB

      MD5

      3fc828307ee6678d0c75b2b5923c03c9

      SHA1

      cd1a11546fbaa51fa36269cb099e755b4077d71d

      SHA256

      970b71a7fcdae3ad1e551813fbcf87a24637b72fd587a1b9d25a9599f234e982

      SHA512

      2580604939f78c257137b7a19c12d9e7da8b283ba67ba425374c3c0072209684fb5cfe9551868cddd28263c8d8b54bf924206851057f5327236630a1154acee5

    • \??\Volume{4e15f56f-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{a99f6060-c999-4105-bc3f-1949b2d2bbd4}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      ba161c30a6d58aab15f764de0386f0c9

      SHA1

      165843116b0e69fe5fd0bf2beb5c49567beedf97

      SHA256

      53415ebd1212d8c773938d84321f3e705cda09eae713bb873ba2822e3d769038

      SHA512

      5ca0529974415bc8309654d3049d9789370f1402e7754a2f59981a7f1ccdc347a9d05e798399a13b47f724fedac33c6c0572d4d6474b33fd384599fd8cb9daff