Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

20/12/2022, 18:17

221220-ww6fhadf6x 8

20/12/2022, 14:06

221220-reqaqsch9y 8

Analysis

  • max time kernel
    1196s
  • max time network
    1200s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    20/12/2022, 14:06

General

  • Target

    ke.msi

  • Size

    36KB

  • MD5

    c0de445dfe49d2932cc7a55e81b06a38

  • SHA1

    96738932eceae5ca5196401c059532024fce9d56

  • SHA256

    0d604def7d8c28469c49fa5d12a8deddb56ebbdf03fb4de5b31484b6a4ace3a0

  • SHA512

    5ad5bf1ce13b6e8f9972d8801a084ad490efda8580d9b103640edbe34cf166d7ffab294f2c38e91340c30235b84e076490a01379873a3b41601e67e395ff28ba

  • SSDEEP

    384:0mcA5s8B88y+J4Hby3M5koXbGWv3m8V4x5Pey3M5sC0Loj8H:ro+uWMxGIweWMmC

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 54 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 44 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ke.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1668
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:584
    • C:\Windows\system32\wscript.exe
      "wscript.exe" "Terminal App Service.vbs"
      2⤵
        PID:1732
      • C:\Windows\system32\wscript.exe
        "wscript.exe" "index.js"
        2⤵
        • Blocklisted process makes network request
        PID:1036
      • C:\Windows\system32\wscript.exe
        "wscript.exe" "app.js"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\ProgramData\Dored\i_view32.exe
          "C:\ProgramData\Dored\i_view32.exe" /capture /convert=skev.jpg
          3⤵
          • Executes dropped EXE
          PID:2008
        • C:\Windows\System32\wbem\WMIC.exe
          "C:\Windows\System32\wbem\WMIC.exe" product where name='FLibrary' call uninstall /nointeractive
          3⤵
            PID:1916
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1916
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004E8" "0000000000000328"
        1⤵
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:1644

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Cis\Terminal App Service.vbs

        Filesize

        262B

        MD5

        323b8e4888440687ec3a20708b52760c

        SHA1

        aeb7051bb3bb7b1ed73d7f58fb2b279863cbc785

        SHA256

        27217d815fc504f6cb9d531028da2f058eb5ac4782e952290c19aacfaa1459da

        SHA512

        36ea0ec78b54c84a284496ac25499c41554422674bcbf093e5d489da974266441948a8dffaba9393d55cdb22544a4f67166bbebbdc788ab48e082e7588f35eb6

      • C:\ProgramData\Dored\app.js

        Filesize

        211B

        MD5

        89e320093ce9d3a9e61e58c1121b76e7

        SHA1

        a83783769a0a36d7560e4596aa53c3422c41ec88

        SHA256

        5496156c5c7d349f998d470231410b5ecfc62dd245eb686a8e77f5f40a28cac7

        SHA512

        403522e9b6a3058a12604c225f150f55a44034908b8ca32d534764717eb351db9252fab1ef7f5892d453a9c750b1b10afa8797df0c110adfb5b6ff9d5f48b9d3

      • C:\ProgramData\Dored\i_view32.exe

        Filesize

        1.9MB

        MD5

        b103655d23aab7ff124de7ea4fbc2361

        SHA1

        904bf233b9070af245f4dbcae11828615ef8715b

        SHA256

        6e53a93fc2968d90891db6059bac49e975c09546e19a54f1f93fb01a21318fdc

        SHA512

        fda0e3855522039d3b56e15b169b4c634672ca181ced78a479b6723c22ce889308db55aa1ea58fa8cb01ed1657fddc52a2c45d904c6eb5b852a171bcba310a52

      • C:\ProgramData\Dored\i_view32.exe

        Filesize

        1.9MB

        MD5

        b103655d23aab7ff124de7ea4fbc2361

        SHA1

        904bf233b9070af245f4dbcae11828615ef8715b

        SHA256

        6e53a93fc2968d90891db6059bac49e975c09546e19a54f1f93fb01a21318fdc

        SHA512

        fda0e3855522039d3b56e15b169b4c634672ca181ced78a479b6723c22ce889308db55aa1ea58fa8cb01ed1657fddc52a2c45d904c6eb5b852a171bcba310a52

      • C:\ProgramData\Dored\index.js

        Filesize

        742B

        MD5

        44839c07923d8a37f49782e6a2567950

        SHA1

        21e6e88de9b6efa47b0dc137ae942bdb6b113192

        SHA256

        ca830dabaa78487702826679e1d0caa7acb7ff2688537a2025aabb0b57fbd414

        SHA512

        d6484cf875a8970ad8826ec522acc1015233180c416c701c5b0bca71f8a29da2bd85aba9010d3e05178b898e20c2e6c76cdeae97e5a2995f53946d8c5cbb5e0b

      • C:\ProgramData\Dored\skev.jpg

        Filesize

        67KB

        MD5

        a683de4d76dce4cae2920a657224497c

        SHA1

        eaa7f4ffbfe343ca04a815ddfb82dcbdb2a30bfe

        SHA256

        32a74ef240ee29296581ea51a93ef1e0e53294075feb2dd297df7d53674aa77c

        SHA512

        13dd07dd42e74cfdbfb19c964a26c0cf6616984f5bc9edad57b00d9d4f0fe91c7e79085f05329ef1acb65050c632f9884b49c7595bb39a5ca7842ff4f5f4e209

      • memory/1668-54-0x000007FEFC091000-0x000007FEFC093000-memory.dmp

        Filesize

        8KB

      • memory/2008-66-0x0000000075931000-0x0000000075933000-memory.dmp

        Filesize

        8KB