Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2022, 12:36

General

  • Target

    0f21d1be273c71a066d1a66189bf0082394de92c830cfaa7bbbe4370e1cb9592.msi

  • Size

    107.1MB

  • MD5

    608b4ff0db79baf5ca8bbaf57ec7af31

  • SHA1

    c0c35f1d18172a5cbebb92387fd505f6509a095a

  • SHA256

    0f21d1be273c71a066d1a66189bf0082394de92c830cfaa7bbbe4370e1cb9592

  • SHA512

    49b6013ed5697ff95f3dbd43d55822cbe77ae633ffc0579d92a351103ee41b8f04883bb226391ea7357637b5cd4464d40f320265184d13327bc965f12ad8c549

  • SSDEEP

    3145728:6FEp1cAjJNOCsXvY27nm0LT419R/pt8OBp4e0/QN:n7FfknLdTC9R/piq0

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 11 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\0f21d1be273c71a066d1a66189bf0082394de92c830cfaa7bbbe4370e1cb9592.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:988
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 63514334BC174D27861503AA05850971
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss9928.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi9915.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr9916.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr9917.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1408
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1884
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000554" "0000000000000524"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5f6c33731566897b8e1f0800197d7da8

    SHA1

    a16a43de6c6ef07ee40bb72a61534ca8ece584be

    SHA256

    f32d2fea2756910bad322317bfb9551fc29b808c2e4063bb300c944e34792c39

    SHA512

    37efa9e075a3973f4aca762b66cf4b00542f9dd289a6f85d587a7db543b83abce80a0a53cf843817e959042325f1c7e8b469746302474d2424b257d17503e935

  • C:\Users\Admin\AppData\Local\Temp\pss9928.ps1

    Filesize

    5KB

    MD5

    8f69da7a9f4b3c2d0f423583b262ed49

    SHA1

    b6d2ceb18fe78d279f76f412e4660bff5f6a88c7

    SHA256

    dc6b6e1812f41c80ee67a72ebcb7a999488c866d805354936fb7506667005b43

    SHA512

    71782d54137e87ec8d4311adf83b9b269aadfcba55b753ce8562d0fe74cc95f00118b01f3139b8ff0a142156d6461bececfc38380e9acd0c117b2fff0e846edf

  • C:\Users\Admin\AppData\Local\Temp\scr9916.ps1

    Filesize

    916B

    MD5

    9cc0e053f9cb7fe7316ab4ac0f54b860

    SHA1

    27567b88e0d64fe00d7824e1d1f3a5f985b44f80

    SHA256

    11ef5da36a51f1546992b9c1ba34a5075cb22d468c81308c040dbc4fa2046f58

    SHA512

    59940809a75d083794da8d76e4ed74832198822c70d40c8f6544e75614ea68ca719087943d5c93e1ab61eeb628087ea87b776ca6590d97149edc2b7c26dbf9fc

  • C:\Windows\Installer\MSI9426.tmp

    Filesize

    670KB

    MD5

    846afe3ed676561d5f2cb293177f6c03

    SHA1

    bd31e948dca976ab54f8a01b87cbd6920659dc92

    SHA256

    d3f27a9fb0862de63db0e05de28a02c7913139c10440e0b9bff25c76a90806ed

    SHA512

    e5c10552930223fc818f5e973de482e0d9664defa3771be208be05dd944bef2ae279285a14ac0278ff4cc9d7384e4811e46434018dde314d6150855d9238457e

  • C:\Windows\Installer\MSIF870.tmp

    Filesize

    268KB

    MD5

    b862a8faa3bdfd0dc181010c58460340

    SHA1

    855626e83f2f2364ce663ef280e2479d10963d0f

    SHA256

    4b588e4342713920a31acbd249e55e0287cfb562860164506ac047fc70617ef1

    SHA512

    b6350e82edd993f16d899f6664acee913a8355c621e418568d30c3dc7689b399bb7b565173929f2827e3acb2377ddf35a22d50d714556b31d19d9c48313d7f8f

  • \Windows\Installer\MSI9426.tmp

    Filesize

    670KB

    MD5

    846afe3ed676561d5f2cb293177f6c03

    SHA1

    bd31e948dca976ab54f8a01b87cbd6920659dc92

    SHA256

    d3f27a9fb0862de63db0e05de28a02c7913139c10440e0b9bff25c76a90806ed

    SHA512

    e5c10552930223fc818f5e973de482e0d9664defa3771be208be05dd944bef2ae279285a14ac0278ff4cc9d7384e4811e46434018dde314d6150855d9238457e

  • \Windows\Installer\MSIF870.tmp

    Filesize

    268KB

    MD5

    b862a8faa3bdfd0dc181010c58460340

    SHA1

    855626e83f2f2364ce663ef280e2479d10963d0f

    SHA256

    4b588e4342713920a31acbd249e55e0287cfb562860164506ac047fc70617ef1

    SHA512

    b6350e82edd993f16d899f6664acee913a8355c621e418568d30c3dc7689b399bb7b565173929f2827e3acb2377ddf35a22d50d714556b31d19d9c48313d7f8f

  • memory/988-54-0x000007FEFC591000-0x000007FEFC593000-memory.dmp

    Filesize

    8KB

  • memory/1896-59-0x0000000076961000-0x0000000076963000-memory.dmp

    Filesize

    8KB