Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2022, 17:29

General

  • Target

    e6c39cc0b7a7ad889fd345475f0b7d5ea740caba70bc4f57564e760e8a52f6ad.msi

  • Size

    1.4MB

  • MD5

    563f30a6c6d9978c30e8416542ad6041

  • SHA1

    44ea4b43e5cb20ce9140297f7bcf87f028e0830b

  • SHA256

    e6c39cc0b7a7ad889fd345475f0b7d5ea740caba70bc4f57564e760e8a52f6ad

  • SHA512

    3d1fcb48c2ac03ac9c1e7fa6fdda611b45e4f36fba0ddf42fa2d7ab8027a19ae8b3937c97ef004812bfb9dd99c5c0f00c6b5162a5f6d536a0cedb47ad063d3b5

  • SSDEEP

    24576:jJjyyzQyz5io+HExGWUAyiqZpBqnGIQ5M6DLrVVdWGA13IqMXSpS2SDTQuV+vJFo:jJjrz5io+HGGWxyzXlrXVVdWGA13I1Xd

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Windows directory 16 IoCs
  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\e6c39cc0b7a7ad889fd345475f0b7d5ea740caba70bc4f57564e760e8a52f6ad.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4620
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 754E7CA05BBCA368FDE60F0BA907F2F5
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      PID:4140
    • C:\Windows\Installer\MSID000.tmp
      "C:\Windows\Installer\MSID000.tmp" /DontWait "C:\Users\Admin\AppData\Roaming\Comercialis\Documentos Objects\Homologo.exe"
      2⤵
      • Executes dropped EXE
      PID:2244
  • C:\Users\Admin\AppData\Roaming\Comercialis\Documentos Objects\Homologo.exe
    "C:\Users\Admin\AppData\Roaming\Comercialis\Documentos Objects\Homologo.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" %1 "https://bit.ly/3CvJZvd"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    81c96dfdc78955baf5c089e53bc0c46a

    SHA1

    f648c51cd0d2d784d0e8d73c30d6474487162127

    SHA256

    397b12f65672c174b45d98e34e35a655b2ad506e7e180c7714abfac8acb30549

    SHA512

    1991d628ef5e1a0a457cea5ef46a29043ed08ae60727d340fe1a6a759bd09693a3b48b78c9c396afd336b2f7b115ee93c5f0dd1dfabcadb111d2928781e6c51d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    864a191ecf4cdb8fde1907f2012ebb34

    SHA1

    e2addcf6e73937235418257deda783fe77a1929d

    SHA256

    758f3f40bd78a8eaaa803eba2b033737f16ac7b9bf622c6a314f7eee33478d64

    SHA512

    817c3253c8843d263cc250170233a8a4c7ccaedaa4b7aaded15d7284f63b344fb1f3409443efd455dca2a1ab56a36046736c1c6ad42826fbb3746766aff4015e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.dat

    Filesize

    1KB

    MD5

    ce2e0ca60fa2364e41b19ed939e912e0

    SHA1

    f55079136d0fc3ce6c61d6246717aa4d885c3fa8

    SHA256

    f474d6e2521867fcd8982e212a862c49767518b6f856511e388c27c915cbecdf

    SHA512

    8e52b246b3df09705ec2931995c138f174e23bbfdc4a90440fcd50d4bf518e635e42074996572470adecb60882777183b1cb6e0dc7da72dada3353ccec082504

  • C:\Users\Admin\AppData\Roaming\Comercialis\Documentos Objects\Homologo.exe

    Filesize

    474KB

    MD5

    04ec4f58a1f4a87b5eeb1f4b7afc48e0

    SHA1

    58dcb1cbbec071d036a07f0e8feb858e4c5b96e7

    SHA256

    bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4

    SHA512

    5b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80

  • C:\Users\Admin\AppData\Roaming\Comercialis\Documentos Objects\dbgeng.dll

    Filesize

    23.2MB

    MD5

    b4c0640c87dbbcea793251a3749cc290

    SHA1

    3d136f91b0cc9753a6b796bf354d5d70fa8ee0d1

    SHA256

    604ee858da5ffab29bd02ab64a57fb7a89abc6b82e76b8d18230b6d7c607e9b1

    SHA512

    c96c81bf089b06e5bde9be65b3b7e77ae331b28244c74b31f9bba6f54d11fcf2de324c014530e1891e4a67926bde095c0bf833a191e4b0a45f6d0e674abfd984

  • C:\Users\Admin\AppData\Roaming\Comercialis\Documentos Objects\dbgeng.dll

    Filesize

    23.2MB

    MD5

    b4c0640c87dbbcea793251a3749cc290

    SHA1

    3d136f91b0cc9753a6b796bf354d5d70fa8ee0d1

    SHA256

    604ee858da5ffab29bd02ab64a57fb7a89abc6b82e76b8d18230b6d7c607e9b1

    SHA512

    c96c81bf089b06e5bde9be65b3b7e77ae331b28244c74b31f9bba6f54d11fcf2de324c014530e1891e4a67926bde095c0bf833a191e4b0a45f6d0e674abfd984

  • C:\Windows\Installer\MSIB26C.tmp

    Filesize

    379KB

    MD5

    305a50c391a94b42a68958f3f89906fb

    SHA1

    4110d68d71f3594f5d3bdfca91a1c759ab0105d4

    SHA256

    f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

    SHA512

    fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

  • C:\Windows\Installer\MSIB26C.tmp

    Filesize

    379KB

    MD5

    305a50c391a94b42a68958f3f89906fb

    SHA1

    4110d68d71f3594f5d3bdfca91a1c759ab0105d4

    SHA256

    f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

    SHA512

    fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

  • C:\Windows\Installer\MSIB8E6.tmp

    Filesize

    379KB

    MD5

    305a50c391a94b42a68958f3f89906fb

    SHA1

    4110d68d71f3594f5d3bdfca91a1c759ab0105d4

    SHA256

    f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

    SHA512

    fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

  • C:\Windows\Installer\MSIB8E6.tmp

    Filesize

    379KB

    MD5

    305a50c391a94b42a68958f3f89906fb

    SHA1

    4110d68d71f3594f5d3bdfca91a1c759ab0105d4

    SHA256

    f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

    SHA512

    fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

  • C:\Windows\Installer\MSIB9E1.tmp

    Filesize

    379KB

    MD5

    305a50c391a94b42a68958f3f89906fb

    SHA1

    4110d68d71f3594f5d3bdfca91a1c759ab0105d4

    SHA256

    f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

    SHA512

    fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

  • C:\Windows\Installer\MSIB9E1.tmp

    Filesize

    379KB

    MD5

    305a50c391a94b42a68958f3f89906fb

    SHA1

    4110d68d71f3594f5d3bdfca91a1c759ab0105d4

    SHA256

    f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

    SHA512

    fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

  • C:\Windows\Installer\MSIBA30.tmp

    Filesize

    379KB

    MD5

    305a50c391a94b42a68958f3f89906fb

    SHA1

    4110d68d71f3594f5d3bdfca91a1c759ab0105d4

    SHA256

    f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

    SHA512

    fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

  • C:\Windows\Installer\MSIBA30.tmp

    Filesize

    379KB

    MD5

    305a50c391a94b42a68958f3f89906fb

    SHA1

    4110d68d71f3594f5d3bdfca91a1c759ab0105d4

    SHA256

    f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

    SHA512

    fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

  • C:\Windows\Installer\MSIBC55.tmp

    Filesize

    463KB

    MD5

    dd777abc5e3abff6e35f866470fd8d2d

    SHA1

    11d68b3cf2f9628729622e76e82ce58f3b8d4561

    SHA256

    c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed

    SHA512

    aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e

  • C:\Windows\Installer\MSIBC55.tmp

    Filesize

    463KB

    MD5

    dd777abc5e3abff6e35f866470fd8d2d

    SHA1

    11d68b3cf2f9628729622e76e82ce58f3b8d4561

    SHA256

    c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed

    SHA512

    aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e

  • C:\Windows\Installer\MSIBD8E.tmp

    Filesize

    463KB

    MD5

    dd777abc5e3abff6e35f866470fd8d2d

    SHA1

    11d68b3cf2f9628729622e76e82ce58f3b8d4561

    SHA256

    c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed

    SHA512

    aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e

  • C:\Windows\Installer\MSIBD8E.tmp

    Filesize

    463KB

    MD5

    dd777abc5e3abff6e35f866470fd8d2d

    SHA1

    11d68b3cf2f9628729622e76e82ce58f3b8d4561

    SHA256

    c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed

    SHA512

    aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e

  • C:\Windows\Installer\MSIBE89.tmp

    Filesize

    463KB

    MD5

    dd777abc5e3abff6e35f866470fd8d2d

    SHA1

    11d68b3cf2f9628729622e76e82ce58f3b8d4561

    SHA256

    c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed

    SHA512

    aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e

  • C:\Windows\Installer\MSIBE89.tmp

    Filesize

    463KB

    MD5

    dd777abc5e3abff6e35f866470fd8d2d

    SHA1

    11d68b3cf2f9628729622e76e82ce58f3b8d4561

    SHA256

    c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed

    SHA512

    aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e

  • C:\Windows\Installer\MSICD30.tmp

    Filesize

    463KB

    MD5

    dd777abc5e3abff6e35f866470fd8d2d

    SHA1

    11d68b3cf2f9628729622e76e82ce58f3b8d4561

    SHA256

    c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed

    SHA512

    aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e

  • C:\Windows\Installer\MSICD30.tmp

    Filesize

    463KB

    MD5

    dd777abc5e3abff6e35f866470fd8d2d

    SHA1

    11d68b3cf2f9628729622e76e82ce58f3b8d4561

    SHA256

    c1c922e7b8addf20a1f8c01fb7333e4341e5bd43ea90b82025e4402cd016d3ed

    SHA512

    aa21b5d920ac9260eb35a421f071c95e83c31a5545762ca12f2b8a05a543d4ac90095ace83c37aa3b3c69135dee091e0be7e38a2bca45a474362da479c3b0c1e

  • C:\Windows\Installer\MSID000.tmp

    Filesize

    404KB

    MD5

    a34d4f165087b11d9e06781d52262868

    SHA1

    1b7b6a5bb53b7c12fb45325f261ad7a61b485ce1

    SHA256

    55ad26c17f4aac71e6db6a6edee6ebf695510dc7e533e3fee64afc3eb06291e5

    SHA512

    aa62ff3b601ddb83133dd3659b0881f523454dc7eea921da7cfefc50426e70bb36b4ebc337a8f16620da610784a81a8e4aa1cf5e0959d28aa155d1f026a81aaf

  • memory/5104-154-0x0000000002060000-0x00000000036D3000-memory.dmp

    Filesize

    22.4MB

  • memory/5104-155-0x0000000002060000-0x00000000036D3000-memory.dmp

    Filesize

    22.4MB