Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    37s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/03/2023, 12:33

General

  • Target

    e4a5383ac32d5642eaf2c7406a0f1c0f.msi

  • Size

    4.2MB

  • MD5

    e4a5383ac32d5642eaf2c7406a0f1c0f

  • SHA1

    3e5637d253c40aefdb0465df15bc057ed5c26186

  • SHA256

    d99b63e1740aa4f779b91d22f508a4792f237f09413d24b51144e0694af5d34f

  • SHA512

    ed7ae40e2475ca2bdeefbfb3f15df6e93c8c7d7781b31c2b0c5cab99ff8fec0487f7975b406eebb8117aca2038a11a658d129c32d4147275fd7770c1bfa28da8

  • SSDEEP

    98304:lPKnw39kiUnMUYeg8F1HWMUKFln1RiZmSZ9J1zYfWwG:4wNJUnMUYetUKFZnpSf1w

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\e4a5383ac32d5642eaf2c7406a0f1c0f.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1064
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\cisco2.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:364
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\e1sdeoj1.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1376
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA843.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA842.tmp"
          4⤵
            PID:932
      • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe
        "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:832
        • C:\Windows\system32\msiexec.exe
          /i "C:\Users\Admin\AppData\Local\Temp\install\7CD12F2\WinSetup-Release-web-deploy.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\"
          3⤵
          • Enumerates connected drives
          • Suspicious use of FindShellTrayWindow
          PID:1084
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 53D0187D5EFC5F328154AD4E1C2EDCFC C
        2⤵
        • Loads dropped DLL
        PID:272
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:740
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003E8" "00000000000003EC"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:596

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6c9c33.rbs

      Filesize

      7KB

      MD5

      eda76902204652747b57f67f1e298783

      SHA1

      189fc1c2c3182e59d4f26cf1dc409eca76d5f6de

      SHA256

      edb078ecbfda0c3528275a67d20591517182e6401e7351951f852f9cdc083cb5

      SHA512

      93aec8fa8e60c1cdae7d40f7624c5ea907c0e55466349ef084e8a0acada72b4b668c384616bb2e97ca6795137180d2c7baee5d68bef003a2777330613f538438

    • C:\Users\Admin\AppData\Local\Temp\MSIB4DF.tmp

      Filesize

      43KB

      MD5

      b759a21d153a42060a53a89a26b9931c

      SHA1

      6260cecd55db44d75121b1f88506a4a9978c1b0f

      SHA256

      6adcc31d2e3746c81f47041e9c6cc576cfe303fc1ed6dadd002c54f98c20cbcd

      SHA512

      78bf70af5b91bd4dd3ed75e0f25957f8f7cb540872e7c2ead0c429ec1d493058a603a37c64236270b31602e226ac928983f6143d4df52b4058eed9c9be2259f0

    • C:\Users\Admin\AppData\Local\Temp\MSIB685.tmp

      Filesize

      43KB

      MD5

      b759a21d153a42060a53a89a26b9931c

      SHA1

      6260cecd55db44d75121b1f88506a4a9978c1b0f

      SHA256

      6adcc31d2e3746c81f47041e9c6cc576cfe303fc1ed6dadd002c54f98c20cbcd

      SHA512

      78bf70af5b91bd4dd3ed75e0f25957f8f7cb540872e7c2ead0c429ec1d493058a603a37c64236270b31602e226ac928983f6143d4df52b4058eed9c9be2259f0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe

      Filesize

      3.3MB

      MD5

      f58f1216150ab62f270d322930401d51

      SHA1

      30878587ace8ccfb0e054433fddf1d88f1e2ee90

      SHA256

      713c13abdc4ec1047ba2e2081c7a31f64ceac5fc6d7c6e21c56a16cd219e946c

      SHA512

      9aeccab1e95376d481f41faed0b19b5dce8ce993ee11b0a9e563bf10925b91ec7a0e8e2843df9cffc7409420bb62c0cf19d0596eaa9fefe1104ce3b7d9d8c9e0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\CiscoSetup.exe

      Filesize

      3.3MB

      MD5

      f58f1216150ab62f270d322930401d51

      SHA1

      30878587ace8ccfb0e054433fddf1d88f1e2ee90

      SHA256

      713c13abdc4ec1047ba2e2081c7a31f64ceac5fc6d7c6e21c56a16cd219e946c

      SHA512

      9aeccab1e95376d481f41faed0b19b5dce8ce993ee11b0a9e563bf10925b91ec7a0e8e2843df9cffc7409420bb62c0cf19d0596eaa9fefe1104ce3b7d9d8c9e0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\cisco2.ps1

      Filesize

      2.2MB

      MD5

      7708f4d0a27fcb9a315e0e2b9fa24248

      SHA1

      498ac3d0ddf4b19f6f7d3dacf03c4e2fbf8f993b

      SHA256

      0afe02415b9523c9f840be11d9561d1c07b41ac1f7b803b7112608ae8db29950

      SHA512

      af6b285e63c9c3db98d35492ff03ec08196c859f508834fc39d6b76283447f493bc721dfa15a2ad777c6e8547ade639f9379ac1cefa54e226096fb0aa4956f54

    • C:\Users\Admin\AppData\Local\Temp\RESA843.tmp

      Filesize

      1KB

      MD5

      71c8cd14a820b59246153139483998b6

      SHA1

      fc2fcefffb6e75733daf16051c806c234d01ad12

      SHA256

      a2cd490a2867addf495984ed3d7a30893d083d849e7d2a0953a6ac810d6f3d7f

      SHA512

      b8796f111ab3ce7e1791f8efb3a98f29ba3067920c5a51c42b23be6b3444fd19992fb679a54f9afe7783cec204eb629cba8761d9ef621330e1a316acffb99457

    • C:\Users\Admin\AppData\Local\Temp\e1sdeoj1.dll

      Filesize

      3KB

      MD5

      3871530d4d8465ccae9d7dd42d1b3efe

      SHA1

      d0d49f063eee5d7fa88dbea4156ebd7dc7f79eac

      SHA256

      923ba3a2ce07737b91712f3b9019efd8d61379bb4da8970758aaff4b4d308626

      SHA512

      09e2363dc7758f0c18d323dc6839ed626e12f0ba8b01d8642353f998a640f4a5a385a9cf79c6cf6808cef3faece8e8a8290149c7d5d3e5b45e0f071cf7232ad9

    • C:\Users\Admin\AppData\Local\Temp\e1sdeoj1.pdb

      Filesize

      7KB

      MD5

      2c14363fc3b979e267df7e435ab3fd65

      SHA1

      2d404038e1a1adeb4daa5adcd1fc9a5001dd9814

      SHA256

      aaf9687f15fd2feb6d770c64718a3d36b81cc3459fadbc14a0095128abf322e7

      SHA512

      c8851b83fe6e7ae3268f611c246980db98aa20ec5ea7ce84d8351febd536ac0666fe1d798ea93f259a908081e56f214be34c10f1c6ef1001b28991e5785fa43e

    • C:\Users\Admin\AppData\Local\Temp\install\7CD12F2\WinSetup-Release-web-deploy.msi

      Filesize

      347KB

      MD5

      9e81383d5c5694835ebe9c853546b856

      SHA1

      a115c76e85960ae9c6dc505dad92ebb4e206567e

      SHA256

      8058c37115d53b13d0bdccfc5b1360364e2d1476873906f924deff84c3c73e00

      SHA512

      0566890e88a7e70c0d3dde84acfb9e5e24023af68acb9dc00884f3dc061613afc1d6b669c48fa4d600aa2fb5f92534c117d301159e416b7ac46391d419e554a2

    • C:\Windows\Installer\6c9c31.msi

      Filesize

      4.2MB

      MD5

      e4a5383ac32d5642eaf2c7406a0f1c0f

      SHA1

      3e5637d253c40aefdb0465df15bc057ed5c26186

      SHA256

      d99b63e1740aa4f779b91d22f508a4792f237f09413d24b51144e0694af5d34f

      SHA512

      ed7ae40e2475ca2bdeefbfb3f15df6e93c8c7d7781b31c2b0c5cab99ff8fec0487f7975b406eebb8117aca2038a11a658d129c32d4147275fd7770c1bfa28da8

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCA842.tmp

      Filesize

      652B

      MD5

      6228bbc60f50bb502249c17b26e34d8e

      SHA1

      187451f123098fe28997bdf4605ea28c1c86f551

      SHA256

      442860172908aa2b93e23f505e01ed0742866f387aaa8fe06ff917731ecad6e1

      SHA512

      4ede6b90ca1cecc78625b7cd98f1d1771f1ce03adbcfbd17212c6aba84ce83db00fd9bda289d72532bcee74cbcadcec8dd6e3e14a7d568ab9cb20171bd257852

    • \??\c:\Users\Admin\AppData\Local\Temp\e1sdeoj1.0.cs

      Filesize

      203B

      MD5

      b611be9282deb44eed731f72bcbb2b82

      SHA1

      cc1d606d853bbabd5fef87255356a0d54381c289

      SHA256

      ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

      SHA512

      63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

    • \??\c:\Users\Admin\AppData\Local\Temp\e1sdeoj1.cmdline

      Filesize

      309B

      MD5

      5ed6f68a9a5b631079571257fd305c30

      SHA1

      f424108db929e6fe41cbc1392cec22ed779e6828

      SHA256

      8e7f96bad57a8fd450c921141d2ff8c32313642a667f4a24c222b9831b4e3c98

      SHA512

      e95dcff75cb3f3b6b573332275188f98da7d678dbc4fd209b7a0c293113f8c9d3e1137f79601990a19bada6b3af7afd9de2d53aae9b31af5174f00963a568ab4

    • \Users\Admin\AppData\Local\Temp\MSIB4DF.tmp

      Filesize

      43KB

      MD5

      b759a21d153a42060a53a89a26b9931c

      SHA1

      6260cecd55db44d75121b1f88506a4a9978c1b0f

      SHA256

      6adcc31d2e3746c81f47041e9c6cc576cfe303fc1ed6dadd002c54f98c20cbcd

      SHA512

      78bf70af5b91bd4dd3ed75e0f25957f8f7cb540872e7c2ead0c429ec1d493058a603a37c64236270b31602e226ac928983f6143d4df52b4058eed9c9be2259f0

    • \Users\Admin\AppData\Local\Temp\MSIB685.tmp

      Filesize

      43KB

      MD5

      b759a21d153a42060a53a89a26b9931c

      SHA1

      6260cecd55db44d75121b1f88506a4a9978c1b0f

      SHA256

      6adcc31d2e3746c81f47041e9c6cc576cfe303fc1ed6dadd002c54f98c20cbcd

      SHA512

      78bf70af5b91bd4dd3ed75e0f25957f8f7cb540872e7c2ead0c429ec1d493058a603a37c64236270b31602e226ac928983f6143d4df52b4058eed9c9be2259f0

    • \Users\Admin\AppData\Local\Temp\install\decoder.dll

      Filesize

      105KB

      MD5

      143da6747fff236a473bdf6007629490

      SHA1

      aed2e6ecbd53ce1e281cee958b3c867f14c8262d

      SHA256

      75f59cfba8c75d7646a697609a9baefb3388b1b6e66db37c50924e3fcba68893

      SHA512

      d52393c33b647ad82adfa1c66f7adb3f8d148d71675fca7df62c974ef9c1d0b25092164fe9603184370f8ecdb5d00d1dd61dd626ec7655b94e03509aaf9fddd1

    • memory/364-96-0x0000000002820000-0x00000000028A0000-memory.dmp

      Filesize

      512KB

    • memory/364-116-0x0000000002820000-0x00000000028A0000-memory.dmp

      Filesize

      512KB

    • memory/364-115-0x0000000002820000-0x00000000028A0000-memory.dmp

      Filesize

      512KB

    • memory/364-112-0x0000000002690000-0x0000000002698000-memory.dmp

      Filesize

      32KB

    • memory/364-97-0x0000000001F50000-0x0000000001F58000-memory.dmp

      Filesize

      32KB

    • memory/364-91-0x000000001B1B0000-0x000000001B492000-memory.dmp

      Filesize

      2.9MB

    • memory/364-90-0x0000000002820000-0x00000000028A0000-memory.dmp

      Filesize

      512KB