Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    47s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 05:54

General

  • Target

    c15f31f77003ec2d15b15fb07a900d30ec56cebcdf8b0cb3096f9e3621d73c17.exe

  • Size

    899KB

  • MD5

    0117a8ecab6bbf11ec6bef9204dad2b9

  • SHA1

    91fc83ef9c684c53fc8071d8317a91abde01a716

  • SHA256

    c15f31f77003ec2d15b15fb07a900d30ec56cebcdf8b0cb3096f9e3621d73c17

  • SHA512

    fc403a97109dccf3c7cf125885bf2725f41ab7f82547593b2e307d77258e8dbc006b70c6807b040abe67949794f5912dd239652d80ee3feff3361c067c88a533

  • SSDEEP

    6144:DtxgWaPErldXCfsn3LFlMiUKvy78gpQ0Ob:hGWgeAfsngiUAyAgpQl

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c15f31f77003ec2d15b15fb07a900d30ec56cebcdf8b0cb3096f9e3621d73c17.exe
    "C:\Users\Admin\AppData\Local\Temp\c15f31f77003ec2d15b15fb07a900d30ec56cebcdf8b0cb3096f9e3621d73c17.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~F114.bat "C:\Users\Admin\AppData\Local\Temp\c15f31f77003ec2d15b15fb07a900d30ec56cebcdf8b0cb3096f9e3621d73c17.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\setup.msi"
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2036
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5EA7998581C2005F15B686E99629DCDD
      2⤵
      • Loads dropped DLL
      PID:924
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1884
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000002AC" "0000000000000554"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~F114.bat

    Filesize

    1KB

    MD5

    318c61d90d45dbdc39544981dbc74149

    SHA1

    bc14826355c15020f9401b4b8bf066dea2ebe531

    SHA256

    9365a1b8a8843876ec8a1b433769c2f455a5d9aac190d12b270c7cb40d3aa0fe

    SHA512

    ca71754570ed6503d371740ff5d95c4d34677cbfde7d139ad9369154b761e70ebb98a5dfaaf4d3279e8d379c191d5a9a8c39843ac3e36f7a01244877019d5c12

  • C:\Users\Admin\AppData\Local\setup.msi

    Filesize

    804KB

    MD5

    7f7072b4322fccc3b4518932df235fb7

    SHA1

    d4fe2123f9494b34f8ea81228ca698b119fcc0a0

    SHA256

    838c1a9488d3c80308404595bd3a1b3fe1527d1acb89ce496f9f856749ea5033

    SHA512

    2837ec0ab064bba210e6fb2b7c1464468eff64537db74b76fcaf52fb1517dbbad3914320ca14795579c25d889ebf9f07e0350819ca281cc83d56c2a2aaf9e1fa

  • C:\Windows\Installer\MSI76A7.tmp

    Filesize

    48KB

    MD5

    9067aad412defc0d2888479609041392

    SHA1

    36cfffc3bafeb24f88ad5886ca5787ca008b6ba9

    SHA256

    99f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517

    SHA512

    e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a

  • C:\Windows\Installer\MSI77FF.tmp

    Filesize

    48KB

    MD5

    9067aad412defc0d2888479609041392

    SHA1

    36cfffc3bafeb24f88ad5886ca5787ca008b6ba9

    SHA256

    99f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517

    SHA512

    e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a

  • \Windows\Installer\MSI76A7.tmp

    Filesize

    48KB

    MD5

    9067aad412defc0d2888479609041392

    SHA1

    36cfffc3bafeb24f88ad5886ca5787ca008b6ba9

    SHA256

    99f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517

    SHA512

    e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a

  • \Windows\Installer\MSI77FF.tmp

    Filesize

    48KB

    MD5

    9067aad412defc0d2888479609041392

    SHA1

    36cfffc3bafeb24f88ad5886ca5787ca008b6ba9

    SHA256

    99f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517

    SHA512

    e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a

  • memory/948-54-0x0000000076961000-0x0000000076963000-memory.dmp

    Filesize

    8KB

  • memory/1584-61-0x000007FEFC591000-0x000007FEFC593000-memory.dmp

    Filesize

    8KB