Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    51s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2022, 12:37

General

  • Target

    3bd813b5eef1dcf7c07c0c11985f134f507be766c0e60e7d5f9129b6356a415c.msi

  • Size

    108.2MB

  • MD5

    092cb4f416ab6b65bd04798070a73310

  • SHA1

    58e6de1202d2ec4991a94636fc9dd86099363e34

  • SHA256

    3bd813b5eef1dcf7c07c0c11985f134f507be766c0e60e7d5f9129b6356a415c

  • SHA512

    b608105fa87aef1cad2bbb1231511a5af6c94f74924258174d1127f5fce9b6937905ff79a777cc1cb55fe4093c5993f53bcf2fc6a1118fd44aa50756f7ea0d4b

  • SSDEEP

    3145728:VFEp1cAjJNOCsXvY27nm0LT419R/pt8OBp4e0/QNou:K7FfknLdTC9R/piq0

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 11 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\3bd813b5eef1dcf7c07c0c11985f134f507be766c0e60e7d5f9129b6356a415c.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1736
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 8EA54E15B6D0893342E14727D75971DC
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssC833.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiC811.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrC812.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrC813.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1084
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1196
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000047C" "000000000000056C"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    61becdfc339c7a021d40271b6baf97e1

    SHA1

    166d20d95ddb9f45774552f68f1e882a4911c476

    SHA256

    9c64e10de60f5386ef375ac379852fb57f798ce089f096e2a2da7dd9a55e7253

    SHA512

    97425bd05a1349d2539b035965d066f12d5d03d4c7b8ef392ff9dd8baa0168b9ef65671686efc86f8c8bcf8cd84f18a99bc663ea57cd2a5325b15e248d109ae9

  • C:\Users\Admin\AppData\Local\Temp\pssC833.ps1

    Filesize

    5KB

    MD5

    8f69da7a9f4b3c2d0f423583b262ed49

    SHA1

    b6d2ceb18fe78d279f76f412e4660bff5f6a88c7

    SHA256

    dc6b6e1812f41c80ee67a72ebcb7a999488c866d805354936fb7506667005b43

    SHA512

    71782d54137e87ec8d4311adf83b9b269aadfcba55b753ce8562d0fe74cc95f00118b01f3139b8ff0a142156d6461bececfc38380e9acd0c117b2fff0e846edf

  • C:\Users\Admin\AppData\Local\Temp\scrC812.ps1

    Filesize

    938B

    MD5

    150fcd3b26ad73ca622f31a76539e203

    SHA1

    baae826e08e91e8ea8a8490b1da288dad5059216

    SHA256

    2800f26315cb87bb348ba6c80965ac991199e11b14011136d90dbeaea754f606

    SHA512

    02e66adac47773c49a5ede1ab5c74bb96722bbc48015bdfd3334ba0a1324ed7de7d5b911508dbcd6d69749d27a83e90ce980fb7dc59eba27de0cf368ca209859

  • C:\Windows\Installer\MSI922F.tmp

    Filesize

    268KB

    MD5

    b862a8faa3bdfd0dc181010c58460340

    SHA1

    855626e83f2f2364ce663ef280e2479d10963d0f

    SHA256

    4b588e4342713920a31acbd249e55e0287cfb562860164506ac047fc70617ef1

    SHA512

    b6350e82edd993f16d899f6664acee913a8355c621e418568d30c3dc7689b399bb7b565173929f2827e3acb2377ddf35a22d50d714556b31d19d9c48313d7f8f

  • C:\Windows\Installer\MSIC802.tmp

    Filesize

    670KB

    MD5

    846afe3ed676561d5f2cb293177f6c03

    SHA1

    bd31e948dca976ab54f8a01b87cbd6920659dc92

    SHA256

    d3f27a9fb0862de63db0e05de28a02c7913139c10440e0b9bff25c76a90806ed

    SHA512

    e5c10552930223fc818f5e973de482e0d9664defa3771be208be05dd944bef2ae279285a14ac0278ff4cc9d7384e4811e46434018dde314d6150855d9238457e

  • \Windows\Installer\MSI922F.tmp

    Filesize

    268KB

    MD5

    b862a8faa3bdfd0dc181010c58460340

    SHA1

    855626e83f2f2364ce663ef280e2479d10963d0f

    SHA256

    4b588e4342713920a31acbd249e55e0287cfb562860164506ac047fc70617ef1

    SHA512

    b6350e82edd993f16d899f6664acee913a8355c621e418568d30c3dc7689b399bb7b565173929f2827e3acb2377ddf35a22d50d714556b31d19d9c48313d7f8f

  • \Windows\Installer\MSIC802.tmp

    Filesize

    670KB

    MD5

    846afe3ed676561d5f2cb293177f6c03

    SHA1

    bd31e948dca976ab54f8a01b87cbd6920659dc92

    SHA256

    d3f27a9fb0862de63db0e05de28a02c7913139c10440e0b9bff25c76a90806ed

    SHA512

    e5c10552930223fc818f5e973de482e0d9664defa3771be208be05dd944bef2ae279285a14ac0278ff4cc9d7384e4811e46434018dde314d6150855d9238457e

  • memory/552-59-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

    Filesize

    8KB

  • memory/1736-54-0x000007FEFB741000-0x000007FEFB743000-memory.dmp

    Filesize

    8KB