Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 19:05

General

  • Target

    18747c2191a87db21ca0b1f95cf19da30f47a3db58cb3fbc8e9afe4b6cd74334.exe

  • Size

    526KB

  • MD5

    3b7c973bca4c7034c009b9cd2b0140cd

  • SHA1

    2c5de140bf2280e32fb5597d24146d73568121eb

  • SHA256

    18747c2191a87db21ca0b1f95cf19da30f47a3db58cb3fbc8e9afe4b6cd74334

  • SHA512

    441b2439e63b3a31f2e806f0e924977ae4119f8eb48de25367f61f74f5d03b8a0c8c2173899d6e12bbab0ace07720323eae9fb51ad469b5535f5d5d824cf2a98

  • SSDEEP

    6144:lrhCmSiJnFtXJch8bZ0iDd+gFuC88bYVWTb4gU+b2HV70/2wPe1ep1B+wsiBzVXv:lYmSczXJWSMg188MMTWSrB+wbzVXZ7o

Score
9/10

Malware Config

Signatures

  • Detects executables packed with VMProtect. 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 51 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18747c2191a87db21ca0b1f95cf19da30f47a3db58cb3fbc8e9afe4b6cd74334.exe
    "C:\Users\Admin\AppData\Local\Temp\18747c2191a87db21ca0b1f95cf19da30f47a3db58cb3fbc8e9afe4b6cd74334.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\588xs2z55U\Driver_Setup.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Users\Admin\AppData\Local\Temp\588xs2z55U\devcon.exe
        devcon install DrvInE.inf "{FD59161E-D5D4-4299-910F-511094CF4E96}\HID_DEVICE"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        PID:2620
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{2e70c365-6ccf-05ab-8c3a-b95961694946}\drvine.inf" "9" "6e027734f" "00000000000003E8" "WinSta0\Default" "0000000000000328" "208" "c:\users\admin\appdata\local\temp\588xs2z55u"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{37028d6b-76bb-1351-d861-aa1480055339} Global\{2f1b7375-6de0-1390-0492-a834de3f6944} C:\Windows\System32\DriverStore\Temp\{28344ae9-31b6-6a3a-4a26-b9198764e711}\drvine.inf C:\Windows\System32\DriverStore\Temp\{28344ae9-31b6-6a3a-4a26-b9198764e711}\DrvInE.cat
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2156

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\588xs2z55U\Driver_Setup.bat
    Filesize

    79B

    MD5

    b05e53e28d3e66362cec2915710d7a55

    SHA1

    b6e8010ef364ea05dacca461a0481244e84c8bcf

    SHA256

    644975810d9c8ba1dc42c1cd821a3b140be0ffaa8ffdc4d927c7428349643755

    SHA512

    5f0966fbf3bfa32d985b2c72dcddc3f59f20a0fb6c023f2688c253d0b6ee79bae0fe1d55dba371c9cbe06663f5b9c0f53aabfaf9717fe7f1cf8e763bf2044f3e

  • C:\Users\Admin\AppData\Local\Temp\588xs2z55U\DrvInE.inf
    Filesize

    3KB

    MD5

    607506fffa21830f75c18ff69a112246

    SHA1

    26755161758b031b7e952c24fdd929b10120fd28

    SHA256

    b69c7a5e17eb9a76d5f9d2818d4db889631768949ee35f023e3ed6c8b2aa5fae

    SHA512

    dc452bf226c4721b4eb069a66bf7f20bdb725bceb7ae113f429915d233d04f67e6cdaa9caf49f69fbe763e0a1cc7c8ceeffa3ce6edfe2a3da23111f4dca596da

  • C:\Users\Admin\AppData\Local\Temp\588xs2z55U\devcon.exe
    Filesize

    87KB

    MD5

    41ba1bbdd9284e49701ee94a3f446c33

    SHA1

    6d5bd532a0f9a3bf7005edeb53b4aba2d30a0c99

    SHA256

    c65d9acba88d2c56422ec4aba235b0ae25bb3261bf400cd30efe11de0c4330e4

    SHA512

    dc55452698966b77c157a81eb458984b17e3e3a0d3ff885479f7c823b847eb739a07782f140ced12eac75fdddd7416f923c885a9d8e8b0a10010fc07bef3da45

  • C:\Users\Admin\AppData\Local\Temp\Cab6D75.tmp
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6DF4.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Temp\Cab72C2.tmp
    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar72F4.tmp
    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \??\c:\users\admin\appdata\local\temp\588XS2~1\DrvInE.sys
    Filesize

    54KB

    MD5

    c415ee7d6a509d98636c9fa5faae5a60

    SHA1

    ab05530e623bd1780ccb1623138bde77655f19c9

    SHA256

    015af31cd5b19dc780cf36da0d21324d81bf46fdc8c73a850597c777f5f44857

    SHA512

    848cbc5ead4e2513d7e925a5d6739ccd2464eb53d04e1c0c12d12e4c59a8bd7c731c50d34756d922bb1bb1517f3528e7ba3b3b65fadbfb72cc584521e9631136

  • \??\c:\users\admin\appdata\local\temp\588xs2z55u\DrvInE.cat
    Filesize

    8KB

    MD5

    fba3d6050022c44b4d2d6dd81b62f356

    SHA1

    c5484dbb858ce2980f401560caf50b6f9a14b594

    SHA256

    ab01bd082889fc7688876b72ecd4e04f31d1d92b786497aa24b54388da12b73e

    SHA512

    42b4694995a22c38070b9035d1e92774ddf90626b42ce0b79b5d9f08397cef0f5302ea6dc26acadafa483be09a22f92e09ee8e68d5b49e38c9b4ee91129ced99