Analysis

  • max time kernel
    219s
  • max time network
    212s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2025, 13:52

General

  • Target

    SuperViewer Installer/Volume/bin/p6/KillBit.msi

  • Size

    1.2MB

  • MD5

    dec9097b8561d2eb3998a8a5b1c4f1b5

  • SHA1

    f1b859f548877ebb9494521e106c17ad5dcd1432

  • SHA256

    7ca06688301358c71996aefe516171e9a6f4bbfbe94cb04e6f25c15e9e99c89a

  • SHA512

    9eeac308426bd178ba91e013fc128b125bba9ac0be8cd45d749c275b636ad064dfaed9a27a9daa3fac8cb67d7b6929fe5d8ab6e14cbeb2a7f6ae22828eb6d2ed

  • SSDEEP

    24576:bF3PRDtqa17yo/3G5ETj+TQNxshTK+63S3ZgTqGgeSZUf/T:bFVthME2C2PJg6Uf

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 19 IoCs
  • Loads dropped DLL 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\SuperViewer Installer\Volume\bin\p6\KillBit.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1572
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5748
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 754BAAD930F9CF819B130F91E31A0855 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3624
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:6096
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 032A4A56F14A818C4CB681D365039C94
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:5084
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:4860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e5822b7.rbs

      Filesize

      114KB

      MD5

      6250695ffe9605808c3c8d3a2938e57f

      SHA1

      bce1d9dea533eb760e39516427d72d9abd811a34

      SHA256

      55e1def516eb97aa1bfa7a4f265200e7a4630156b98a38696b5ab04f719ba3e8

      SHA512

      3fcb2085bf01cfcad84c1a2fceee25105e6c8252b19edbf8a79c0637ab2c8613a06424171ae10232b7b7a552f3fc61d70af2a09249d5407a6ace866cd6e228f0

    • C:\Users\Admin\AppData\Local\Temp\MSI8DB9.tmp

      Filesize

      639KB

      MD5

      c6417930af8969f9f2cb431acd76ec89

      SHA1

      d2f2dc9b44f5f79348f7f36091b26a5465ad4f2b

      SHA256

      1b89704532113150fc7a8a06b5367ee26937c346635a860e93662e1fbb5cd79b

      SHA512

      f30d7a5b51f5d866ccabf3e15a45d3b4013e28a9bdaaf2176e8b121fbd4ab41a8e67c059b2ece8db5bc7a0ce043e76bbc4e3f6400fb9cd2886e1ffcd9e65d79b

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.6MB

      MD5

      93d575e613beade00e98f44ee6fb4d47

      SHA1

      393b711ad83ebaaf3a4a0097c8f6b2f0ef30d9a3

      SHA256

      5d1ea942ba32d85e78b2c4e46056d1d8cb7fd4857e36db00628380057b393490

      SHA512

      b5a6e0dae64aad6dd0d49652687da1c132b4c72db32838bf9537387b115249016d31bd3762ae20a3c6c3cdf828f5c6631baca62614d3863852d375777d3c5ce7

    • \??\Volume{4eac8ed7-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{02ee82ba-d85a-4581-916d-122577b5ea0c}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      c85387055b7299edb0b2f132d146c8ee

      SHA1

      fe767fad3065761395c641ae25154df115c840d5

      SHA256

      1f07a7bdb272b5eb6b03b7a169a89b6f8237d76859432564c3e1df7065463d51

      SHA512

      29aa34fdd23df9ffccc4445ef5912a1380d0cc774b98e254614dcafda996288ac95e51de2913fa84f825af1dcb7724bb11cdad74454cc9d138af57e142a90fbd