Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    897s
  • max time network
    923s
  • platform
    windows7_x64
  • resource
    win7-20220812-es
  • resource tags

    arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    11/02/2023, 02:11

General

  • Target

    correioseletronicoHXLKWUGYEZDZ.msi

  • Size

    21.2MB

  • MD5

    bf8e278fdcb2510822c07b45281eb7c1

  • SHA1

    c937f2370260ff90367bb52c90db783eb112899b

  • SHA256

    cb704305afe6f0f5869d8cabc63437fae2ec58293661d3ad486d3d77f83d7bca

  • SHA512

    68bea78f6270ce245ca9429d9bb60ed7e0d455870d53f243f72b0581a082724bb1f4dc6e4a54a6acd46cd1db6c1de1835caf83f3fe1b88dd41f3b078b5b7872f

  • SSDEEP

    393216:qZe+/s2bE9uf7bQRLbiKn0M3bhVKQnYjNJdRkDEmtHg:+bE91biCoQr4me

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\correioseletronicoHXLKWUGYEZDZ.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1312
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 03DFA733F1C9275474FCDB2457296AE9
      2⤵
      • Loads dropped DLL
      PID:960
    • C:\Users\Admin\AppData\Roaming\gerando liberacao\gerando liberacao\g2mupload.exe
      "C:\Users\Admin\AppData\Roaming\gerando liberacao\gerando liberacao\g2mupload.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gerando liberacao\gerando liberacao\g2m.dll

    Filesize

    1147.5MB

    MD5

    be81e3359b843ef8912ac56f8005eada

    SHA1

    86ef5591fa00f256294540a3693ef5b090ce8bba

    SHA256

    bb4c852286b9e19038d7dc29b232aa5299bfd2562ba9b12398a986b13498818a

    SHA512

    f645079c8c2d100d264ea2d77ed6934c5813b0dc80fda336e60765345763c97ddc4b1c48c8211be3c49db02243b9d7aab6412f89d9374339594281539d600b9a

  • C:\Users\Admin\AppData\Roaming\gerando liberacao\gerando liberacao\g2mupload.exe

    Filesize

    30KB

    MD5

    2bd61ee91994b3e9f9ebc002498d02ea

    SHA1

    5a85836809782f06a6cdf8bcff5fa86f1b2cb315

    SHA256

    07762231da2a8ce1dd2a211c49a27a2f06d7d2b7d5426fc5b6b114f845f1eca6

    SHA512

    6e52884592c364a42f1acf2bbd7b867004f232e323e7673bce99e1ddaf39b32986d44120ab26d943e40105a2d2d870d003493154b46b9230921665a4719dd9f5

  • C:\Users\Admin\AppData\Roaming\gerando liberacao\gerando liberacao\g2mupload.exe

    Filesize

    30KB

    MD5

    2bd61ee91994b3e9f9ebc002498d02ea

    SHA1

    5a85836809782f06a6cdf8bcff5fa86f1b2cb315

    SHA256

    07762231da2a8ce1dd2a211c49a27a2f06d7d2b7d5426fc5b6b114f845f1eca6

    SHA512

    6e52884592c364a42f1acf2bbd7b867004f232e323e7673bce99e1ddaf39b32986d44120ab26d943e40105a2d2d870d003493154b46b9230921665a4719dd9f5

  • C:\Windows\Installer\MSI50A1.tmp

    Filesize

    557KB

    MD5

    2c9c51ac508570303c6d46c0571ea3a1

    SHA1

    e3e0fe08fa11a43c8bca533f212bdf0704c726d5

    SHA256

    ff86c76a8d5846b3a1ad58ff2fd8e5a06a84eb5899cdee98e59c548d33335550

    SHA512

    df5f1def5aac44f39a2dfde9c6c73f15f83a7374b4ad42b67e425ccb7ac99a64c5701b676ae46d2f7167a04a955158031a839e7878d100aaf8fab0ce2059f127

  • C:\Windows\Installer\MSI5478.tmp

    Filesize

    557KB

    MD5

    2c9c51ac508570303c6d46c0571ea3a1

    SHA1

    e3e0fe08fa11a43c8bca533f212bdf0704c726d5

    SHA256

    ff86c76a8d5846b3a1ad58ff2fd8e5a06a84eb5899cdee98e59c548d33335550

    SHA512

    df5f1def5aac44f39a2dfde9c6c73f15f83a7374b4ad42b67e425ccb7ac99a64c5701b676ae46d2f7167a04a955158031a839e7878d100aaf8fab0ce2059f127

  • C:\Windows\Installer\MSI5573.tmp

    Filesize

    557KB

    MD5

    2c9c51ac508570303c6d46c0571ea3a1

    SHA1

    e3e0fe08fa11a43c8bca533f212bdf0704c726d5

    SHA256

    ff86c76a8d5846b3a1ad58ff2fd8e5a06a84eb5899cdee98e59c548d33335550

    SHA512

    df5f1def5aac44f39a2dfde9c6c73f15f83a7374b4ad42b67e425ccb7ac99a64c5701b676ae46d2f7167a04a955158031a839e7878d100aaf8fab0ce2059f127

  • \Users\Admin\AppData\Roaming\gerando liberacao\gerando liberacao\g2m.dll

    Filesize

    1147.5MB

    MD5

    be81e3359b843ef8912ac56f8005eada

    SHA1

    86ef5591fa00f256294540a3693ef5b090ce8bba

    SHA256

    bb4c852286b9e19038d7dc29b232aa5299bfd2562ba9b12398a986b13498818a

    SHA512

    f645079c8c2d100d264ea2d77ed6934c5813b0dc80fda336e60765345763c97ddc4b1c48c8211be3c49db02243b9d7aab6412f89d9374339594281539d600b9a

  • \Windows\Installer\MSI50A1.tmp

    Filesize

    557KB

    MD5

    2c9c51ac508570303c6d46c0571ea3a1

    SHA1

    e3e0fe08fa11a43c8bca533f212bdf0704c726d5

    SHA256

    ff86c76a8d5846b3a1ad58ff2fd8e5a06a84eb5899cdee98e59c548d33335550

    SHA512

    df5f1def5aac44f39a2dfde9c6c73f15f83a7374b4ad42b67e425ccb7ac99a64c5701b676ae46d2f7167a04a955158031a839e7878d100aaf8fab0ce2059f127

  • \Windows\Installer\MSI5478.tmp

    Filesize

    557KB

    MD5

    2c9c51ac508570303c6d46c0571ea3a1

    SHA1

    e3e0fe08fa11a43c8bca533f212bdf0704c726d5

    SHA256

    ff86c76a8d5846b3a1ad58ff2fd8e5a06a84eb5899cdee98e59c548d33335550

    SHA512

    df5f1def5aac44f39a2dfde9c6c73f15f83a7374b4ad42b67e425ccb7ac99a64c5701b676ae46d2f7167a04a955158031a839e7878d100aaf8fab0ce2059f127

  • \Windows\Installer\MSI5573.tmp

    Filesize

    557KB

    MD5

    2c9c51ac508570303c6d46c0571ea3a1

    SHA1

    e3e0fe08fa11a43c8bca533f212bdf0704c726d5

    SHA256

    ff86c76a8d5846b3a1ad58ff2fd8e5a06a84eb5899cdee98e59c548d33335550

    SHA512

    df5f1def5aac44f39a2dfde9c6c73f15f83a7374b4ad42b67e425ccb7ac99a64c5701b676ae46d2f7167a04a955158031a839e7878d100aaf8fab0ce2059f127

  • memory/960-57-0x0000000075781000-0x0000000075783000-memory.dmp

    Filesize

    8KB

  • memory/1176-70-0x0000000000410000-0x0000000004A51000-memory.dmp

    Filesize

    70.3MB

  • memory/1176-72-0x0000000000410000-0x0000000004A51000-memory.dmp

    Filesize

    70.3MB

  • memory/1176-75-0x0000000000410000-0x0000000004A51000-memory.dmp

    Filesize

    70.3MB

  • memory/1176-76-0x0000000000410000-0x0000000004A51000-memory.dmp

    Filesize

    70.3MB

  • memory/1176-77-0x0000000000410000-0x0000000004A51000-memory.dmp

    Filesize

    70.3MB

  • memory/1312-54-0x000007FEFB721000-0x000007FEFB723000-memory.dmp

    Filesize

    8KB