Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    81s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 01:24

General

  • Target

    e06b212b0c26d4f385a3623c64820b3ea4bbd83065646a38d1f3e0cfdfbb0898.msi

  • Size

    4.5MB

  • MD5

    68ba045e1427d63d03660ef2d88584d0

  • SHA1

    a3e9bd9adddf1aaaaff03cd69a7128e6fc774977

  • SHA256

    e06b212b0c26d4f385a3623c64820b3ea4bbd83065646a38d1f3e0cfdfbb0898

  • SHA512

    d677806a4c4ed419995b0ead65db4081c3e4b002e400fafb8d042d6695e7e17cc476a0ccc8df9c1caed164254ba2536c73891f89f6f9f57aea7a5421a6d964e8

  • SSDEEP

    98304:MYGKdAHTgvV1OsKnG5vgzfTVkdRTpRjbrvC7gEjT7A3:i81OsKG6zfTVkddpdTCRj

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 13 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\e06b212b0c26d4f385a3623c64820b3ea4bbd83065646a38d1f3e0cfdfbb0898.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:828
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1620
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 8D58F3C51962C86D3E87171771AF06D9
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssE0A4.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiE081.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrE082.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrE083.txt" -propSep " :<->: " -testPrefix "_testValue."
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          PID:4140
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4260

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e56d97e.rbs

      Filesize

      607KB

      MD5

      a8d7bd7da491218a29fc64ef8b5496b3

      SHA1

      20d674fff380900ea80dde85de5380a526eda2fd

      SHA256

      ad0a0455354e3aed4aa34db1ea7b911b79a5d2134d4c2522014ef03154b67033

      SHA512

      419581a484ebfad891ad61d73cb38b533f003cba09c30b8ea409b7a68fab95e880058f58b79c98c4358a48f13e5af07e1a451f80d4bf9588774444e5c8adca04

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pidzy2xr.32p.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\pssE0A4.ps1

      Filesize

      5KB

      MD5

      fc1bb6c87fd1f08b534e52546561c53c

      SHA1

      db402c5c1025cf8d3e79df7b868fd186243aa9d1

      SHA256

      a04750ed5f05b82b90f6b8ea3748ba246af969757a5a4b74a0e25b186add520b

      SHA512

      5495f4ac3c8f42394a82540449526bb8ddd91adf0a1a852a9e1f2d32a63858b966648b4099d9947d8ac68ee43824dacda24c337c5b97733905e36c4921280e86

    • C:\Users\Admin\AppData\Local\Temp\scrE082.ps1

      Filesize

      17KB

      MD5

      d815da347cf3c1a260840649beb56ff7

      SHA1

      4da95ffed10e7369b685a390fe4e99a6a1e1f416

      SHA256

      d6f001aeb36cdb8e6bbcb0d35ffe55c86ad5f942f9d0d15a089706801fdad931

      SHA512

      ca2cd68cf615db854c7ccc6cc5c84da4a8b5f6913229c856fc343ba3e7af8563b0afcd29e9d14ca75eb4cf833102a2ea8b802629f284819bfb2630a82d61b170

    • C:\Windows\Installer\MSID9DA.tmp

      Filesize

      436KB

      MD5

      475d20c0ea477a35660e3f67ecf0a1df

      SHA1

      67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

      SHA256

      426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

      SHA512

      99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

    • C:\Windows\Installer\MSID9DA.tmp

      Filesize

      436KB

      MD5

      475d20c0ea477a35660e3f67ecf0a1df

      SHA1

      67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

      SHA256

      426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

      SHA512

      99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

    • C:\Windows\Installer\MSIDC6B.tmp

      Filesize

      436KB

      MD5

      475d20c0ea477a35660e3f67ecf0a1df

      SHA1

      67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

      SHA256

      426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

      SHA512

      99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

    • C:\Windows\Installer\MSIDC6B.tmp

      Filesize

      436KB

      MD5

      475d20c0ea477a35660e3f67ecf0a1df

      SHA1

      67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

      SHA256

      426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

      SHA512

      99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

    • C:\Windows\Installer\MSIDD47.tmp

      Filesize

      436KB

      MD5

      475d20c0ea477a35660e3f67ecf0a1df

      SHA1

      67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

      SHA256

      426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

      SHA512

      99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

    • C:\Windows\Installer\MSIDD47.tmp

      Filesize

      436KB

      MD5

      475d20c0ea477a35660e3f67ecf0a1df

      SHA1

      67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

      SHA256

      426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

      SHA512

      99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

    • C:\Windows\Installer\MSIDD47.tmp

      Filesize

      436KB

      MD5

      475d20c0ea477a35660e3f67ecf0a1df

      SHA1

      67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

      SHA256

      426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

      SHA512

      99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

    • C:\Windows\Installer\MSIDD87.tmp

      Filesize

      436KB

      MD5

      475d20c0ea477a35660e3f67ecf0a1df

      SHA1

      67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

      SHA256

      426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

      SHA512

      99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

    • C:\Windows\Installer\MSIDD87.tmp

      Filesize

      436KB

      MD5

      475d20c0ea477a35660e3f67ecf0a1df

      SHA1

      67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

      SHA256

      426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

      SHA512

      99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

    • C:\Windows\Installer\MSIE019.tmp

      Filesize

      574KB

      MD5

      7b7d9e2c9b8236e7155f2f97254cb40e

      SHA1

      99621fc9d14511428d62d91c31865fb2c4625663

      SHA256

      df58faba241328b9645dcb5dec387ec5edd56e2d878384a4783f2c0a66f85897

      SHA512

      fbaa1560f03255f73be3e846959e4b7cbb1c24165d014ed01245639add6cc463975e5558567ab5704e18c9078a8a071c9e38dc1e499ba6e3dc507d4275b4a228

    • C:\Windows\Installer\MSIE019.tmp

      Filesize

      574KB

      MD5

      7b7d9e2c9b8236e7155f2f97254cb40e

      SHA1

      99621fc9d14511428d62d91c31865fb2c4625663

      SHA256

      df58faba241328b9645dcb5dec387ec5edd56e2d878384a4783f2c0a66f85897

      SHA512

      fbaa1560f03255f73be3e846959e4b7cbb1c24165d014ed01245639add6cc463975e5558567ab5704e18c9078a8a071c9e38dc1e499ba6e3dc507d4275b4a228

    • C:\Windows\Installer\e56d97c.msi

      Filesize

      4.5MB

      MD5

      68ba045e1427d63d03660ef2d88584d0

      SHA1

      a3e9bd9adddf1aaaaff03cd69a7128e6fc774977

      SHA256

      e06b212b0c26d4f385a3623c64820b3ea4bbd83065646a38d1f3e0cfdfbb0898

      SHA512

      d677806a4c4ed419995b0ead65db4081c3e4b002e400fafb8d042d6695e7e17cc476a0ccc8df9c1caed164254ba2536c73891f89f6f9f57aea7a5421a6d964e8

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.0MB

      MD5

      dda14850af885dc6208284f749c9b1c7

      SHA1

      3d7dd1bcbac7dbf844c88e249fa0951fd84e9efc

      SHA256

      699cf5f4acbd4b17267c92d08d93acf024943eb371893cde6700ee7d37fbabfb

      SHA512

      69e2e0ca22201fd19c97898d87b2b87172e31bfc07dedfe409488013f5772f8afeab5cf8af17df16e6b91e3fbee76269a3da6ddfc1dd4bea4464edff075a3b08

    • \??\Volume{c9ab6598-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{cd0cf306-da89-4a10-ac76-fffa1ca53d88}_OnDiskSnapshotProp

      Filesize

      5KB

      MD5

      45b68c09d6e0af008f0eff2f99af6d54

      SHA1

      70d8f6bda7fc2721cb361ea1df046024575ce232

      SHA256

      efe9f3aecc521b024ba6f10a66112be2f2e9bf47a7d90362b9b03a8039fd9a53

      SHA512

      b1f2fe79db0b9dd4bf5358dbae868f68024ecd0253ab7581ac43a8845923b6d2ff592aa558fcf610f4c155f981a35269b6c6d973ab8b6863eab93892923179c3

    • memory/4140-188-0x0000000002B80000-0x0000000002B90000-memory.dmp

      Filesize

      64KB

    • memory/4140-192-0x0000000006710000-0x0000000006732000-memory.dmp

      Filesize

      136KB

    • memory/4140-170-0x0000000002B90000-0x0000000002BC6000-memory.dmp

      Filesize

      216KB

    • memory/4140-172-0x0000000005180000-0x00000000051A2000-memory.dmp

      Filesize

      136KB

    • memory/4140-189-0x0000000007A90000-0x000000000810A000-memory.dmp

      Filesize

      6.5MB

    • memory/4140-190-0x0000000006680000-0x000000000669A000-memory.dmp

      Filesize

      104KB

    • memory/4140-191-0x0000000007150000-0x00000000071E6000-memory.dmp

      Filesize

      600KB

    • memory/4140-186-0x0000000006130000-0x000000000614E000-memory.dmp

      Filesize

      120KB

    • memory/4140-193-0x0000000008110000-0x00000000086B4000-memory.dmp

      Filesize

      5.6MB

    • memory/4140-181-0x0000000002B80000-0x0000000002B90000-memory.dmp

      Filesize

      64KB

    • memory/4140-180-0x0000000002B80000-0x0000000002B90000-memory.dmp

      Filesize

      64KB

    • memory/4140-171-0x00000000052E0000-0x0000000005908000-memory.dmp

      Filesize

      6.2MB

    • memory/4140-174-0x0000000005AF0000-0x0000000005B56000-memory.dmp

      Filesize

      408KB

    • memory/4140-173-0x0000000005A80000-0x0000000005AE6000-memory.dmp

      Filesize

      408KB