Analysis

  • max time kernel
    225s
  • max time network
    294s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2025, 13:52

General

  • Target

    SuperViewer Installer/Volume/bin/p5/NI_De00/dep_framework.msi

  • Size

    1.1MB

  • MD5

    55d5c4ab6bb3723fbb450971aefebc2f

  • SHA1

    4d21101af885150e2a10d461a832339c65326c87

  • SHA256

    a83222da56d1a314a6cbf3a606518ede0f262d4f02556be8f35ead7d9a946f8c

  • SHA512

    5bf7ccd73066d59958accae4235bfd5e97036be1bb4bdaa44de49090f23171013ec71a3085602c9dfa1078b9b5faf523ea7b4609df3bc040f81ec1b515ce5412

  • SSDEEP

    24576:NFAtbRo/3Gf5IhM+TQNxshTK+63S3ZgTqGgeSZUf/:NFAtbX5cC2PJg6Uf

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 19 IoCs
  • Loads dropped DLL 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\SuperViewer Installer\Volume\bin\p5\NI_De00\dep_framework.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3528
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C993D2F9BD8FA08A8D80368BFB9AA9B3 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2272
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2464
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 87861B09A239FD4F9D09E93C2209D2BD
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4872
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:2420

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e584998.rbs

      Filesize

      13KB

      MD5

      d85fb7d4eb69cdc890de09edad1c4ff8

      SHA1

      f09b555383801ffff8f6f8d311b1c8511c91fbf7

      SHA256

      7c497e526f105005cb70d344b317078e3a00cd3c2bf5e6abe4be33c93ffa7f97

      SHA512

      1ebc5d64d69b6abb9a736e027eacfd1b920bd33d2350dd0c954d7783cdfe422850b8f67aacaa931e310b597e48f46297114a42e96dc60ed60595d737aa5e0483

    • C:\Users\Admin\AppData\Local\Temp\MSI9AC9.tmp

      Filesize

      639KB

      MD5

      c6417930af8969f9f2cb431acd76ec89

      SHA1

      d2f2dc9b44f5f79348f7f36091b26a5465ad4f2b

      SHA256

      1b89704532113150fc7a8a06b5367ee26937c346635a860e93662e1fbb5cd79b

      SHA512

      f30d7a5b51f5d866ccabf3e15a45d3b4013e28a9bdaaf2176e8b121fbd4ab41a8e67c059b2ece8db5bc7a0ce043e76bbc4e3f6400fb9cd2886e1ffcd9e65d79b

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.6MB

      MD5

      09d536e2e279078e9f40c54cd857444f

      SHA1

      8a72d96d690328f9982f67c57f28839434882684

      SHA256

      9eba8017b8aed7a20cef86041a71f940600ee075f455f964029f81d74ae0dbd0

      SHA512

      ab0a3600f9f5f58a650089b80dd34ef786189ad415841573ce5e1b3cda44a624c985ffadc21a7234a87d2e6979784f853941473385aa252e38e38d64104fb2f2

    • \??\Volume{3463923c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{d4eb06e3-6227-411c-860b-3d42f59b5de0}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      c255c624e4fc3e50acf4cd95a086a45c

      SHA1

      19187a226af72373ed0c31d7ef237d58ae700821

      SHA256

      611468937355fd461eb9f257706877c54ab7304a1cb6b8aad2954310491fc0e2

      SHA512

      4c6b26d1c07272ff95ab0558224e4b6afe6df24a1b5f129474e06a18f73f680db94f631cfb569f9e77a1481407b542c5d80e18ba82e2b9e4ebaeff04be7e8607