Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17/04/2023, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
Win32_Dist_Stable_release.msi
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Win32_Dist_Stable_release.msi
Resource
win10v2004-20230221-en
General
-
Target
Win32_Dist_Stable_release.msi
-
Size
2.9MB
-
MD5
b7bdeddf07f67030a220f388ae6411ee
-
SHA1
df485b606a06f8fe465862da52d654620e82901f
-
SHA256
0cfc06fcdebd632c1c1797b79fff5e0c45880a322157f82895cd43f86f9e8232
-
SHA512
e9b3e08734dca64575a0fad7f5e93cb2c6848457c0f254aed18a174c957b7aebbe3c0cac2cfe7432df81c6804c31dc1b955d5ea9084c11255ad492d102219142
-
SSDEEP
49152:OA4l1/2vN8r6I5WCmR+JJke7awlK2FV9fXlVeIfyMHVPFX1ZdDKjbAS+lpwmtiV1:m/wo6/e7a6fwcDKj0QqiV+g
Malware Config
Signatures
-
Loads dropped DLL 11 IoCs
pid Process 684 MsiExec.exe 684 MsiExec.exe 684 MsiExec.exe 684 MsiExec.exe 684 MsiExec.exe 684 MsiExec.exe 684 MsiExec.exe 1476 MsiExec.exe 1476 MsiExec.exe 1020 MsiExec.exe 1476 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\6c873d.msi msiexec.exe File created C:\Windows\Installer\6c873a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8B60.tmp msiexec.exe File created C:\Windows\Installer\6c873b.ipi msiexec.exe File opened for modification C:\Windows\Installer\6c873b.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI9C37.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\6c873a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8798.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8CB8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8D75.tmp msiexec.exe -
Modifies data under HKEY_USERS 48 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 309cd5995e71d901 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe -
Modifies registry class 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\EEEDDB5C74ACE9642856B1DC1F573AA8\81D19D2780AF40E42B4FBE5B4A90F7DD msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\SourceList\PackageName = "Win32_Dist_Stable_release.msi" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\PackageCode = "FB906A2F8C8732042B687BDA4C84348E" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\Version = "218761360" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\EEEDDB5C74ACE9642856B1DC1F573AA8 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\81D19D2780AF40E42B4FBE5B4A90F7DD msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\81D19D2780AF40E42B4FBE5B4A90F7DD\MainFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\ProductName = "Win32 Stable Release" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\81D19D2780AF40E42B4FBE5B4A90F7DD\SourceList msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2036 msiexec.exe 2036 msiexec.exe 896 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1736 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1736 msiexec.exe Token: SeIncreaseQuotaPrivilege 1736 msiexec.exe Token: SeRestorePrivilege 2036 msiexec.exe Token: SeTakeOwnershipPrivilege 2036 msiexec.exe Token: SeSecurityPrivilege 2036 msiexec.exe Token: SeCreateTokenPrivilege 1736 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1736 msiexec.exe Token: SeLockMemoryPrivilege 1736 msiexec.exe Token: SeIncreaseQuotaPrivilege 1736 msiexec.exe Token: SeMachineAccountPrivilege 1736 msiexec.exe Token: SeTcbPrivilege 1736 msiexec.exe Token: SeSecurityPrivilege 1736 msiexec.exe Token: SeTakeOwnershipPrivilege 1736 msiexec.exe Token: SeLoadDriverPrivilege 1736 msiexec.exe Token: SeSystemProfilePrivilege 1736 msiexec.exe Token: SeSystemtimePrivilege 1736 msiexec.exe Token: SeProfSingleProcessPrivilege 1736 msiexec.exe Token: SeIncBasePriorityPrivilege 1736 msiexec.exe Token: SeCreatePagefilePrivilege 1736 msiexec.exe Token: SeCreatePermanentPrivilege 1736 msiexec.exe Token: SeBackupPrivilege 1736 msiexec.exe Token: SeRestorePrivilege 1736 msiexec.exe Token: SeShutdownPrivilege 1736 msiexec.exe Token: SeDebugPrivilege 1736 msiexec.exe Token: SeAuditPrivilege 1736 msiexec.exe Token: SeSystemEnvironmentPrivilege 1736 msiexec.exe Token: SeChangeNotifyPrivilege 1736 msiexec.exe Token: SeRemoteShutdownPrivilege 1736 msiexec.exe Token: SeUndockPrivilege 1736 msiexec.exe Token: SeSyncAgentPrivilege 1736 msiexec.exe Token: SeEnableDelegationPrivilege 1736 msiexec.exe Token: SeManageVolumePrivilege 1736 msiexec.exe Token: SeImpersonatePrivilege 1736 msiexec.exe Token: SeCreateGlobalPrivilege 1736 msiexec.exe Token: SeCreateTokenPrivilege 1736 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1736 msiexec.exe Token: SeLockMemoryPrivilege 1736 msiexec.exe Token: SeIncreaseQuotaPrivilege 1736 msiexec.exe Token: SeMachineAccountPrivilege 1736 msiexec.exe Token: SeTcbPrivilege 1736 msiexec.exe Token: SeSecurityPrivilege 1736 msiexec.exe Token: SeTakeOwnershipPrivilege 1736 msiexec.exe Token: SeLoadDriverPrivilege 1736 msiexec.exe Token: SeSystemProfilePrivilege 1736 msiexec.exe Token: SeSystemtimePrivilege 1736 msiexec.exe Token: SeProfSingleProcessPrivilege 1736 msiexec.exe Token: SeIncBasePriorityPrivilege 1736 msiexec.exe Token: SeCreatePagefilePrivilege 1736 msiexec.exe Token: SeCreatePermanentPrivilege 1736 msiexec.exe Token: SeBackupPrivilege 1736 msiexec.exe Token: SeRestorePrivilege 1736 msiexec.exe Token: SeShutdownPrivilege 1736 msiexec.exe Token: SeDebugPrivilege 1736 msiexec.exe Token: SeAuditPrivilege 1736 msiexec.exe Token: SeSystemEnvironmentPrivilege 1736 msiexec.exe Token: SeChangeNotifyPrivilege 1736 msiexec.exe Token: SeRemoteShutdownPrivilege 1736 msiexec.exe Token: SeUndockPrivilege 1736 msiexec.exe Token: SeSyncAgentPrivilege 1736 msiexec.exe Token: SeEnableDelegationPrivilege 1736 msiexec.exe Token: SeManageVolumePrivilege 1736 msiexec.exe Token: SeImpersonatePrivilege 1736 msiexec.exe Token: SeCreateGlobalPrivilege 1736 msiexec.exe Token: SeCreateTokenPrivilege 1736 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1736 msiexec.exe 1736 msiexec.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2036 wrote to memory of 684 2036 msiexec.exe 29 PID 2036 wrote to memory of 684 2036 msiexec.exe 29 PID 2036 wrote to memory of 684 2036 msiexec.exe 29 PID 2036 wrote to memory of 684 2036 msiexec.exe 29 PID 2036 wrote to memory of 684 2036 msiexec.exe 29 PID 2036 wrote to memory of 684 2036 msiexec.exe 29 PID 2036 wrote to memory of 684 2036 msiexec.exe 29 PID 2036 wrote to memory of 1476 2036 msiexec.exe 33 PID 2036 wrote to memory of 1476 2036 msiexec.exe 33 PID 2036 wrote to memory of 1476 2036 msiexec.exe 33 PID 2036 wrote to memory of 1476 2036 msiexec.exe 33 PID 2036 wrote to memory of 1476 2036 msiexec.exe 33 PID 2036 wrote to memory of 1476 2036 msiexec.exe 33 PID 2036 wrote to memory of 1476 2036 msiexec.exe 33 PID 2036 wrote to memory of 1020 2036 msiexec.exe 34 PID 2036 wrote to memory of 1020 2036 msiexec.exe 34 PID 2036 wrote to memory of 1020 2036 msiexec.exe 34 PID 2036 wrote to memory of 1020 2036 msiexec.exe 34 PID 2036 wrote to memory of 1020 2036 msiexec.exe 34 PID 2036 wrote to memory of 1020 2036 msiexec.exe 34 PID 2036 wrote to memory of 1020 2036 msiexec.exe 34 PID 1020 wrote to memory of 896 1020 MsiExec.exe 35 PID 1020 wrote to memory of 896 1020 MsiExec.exe 35 PID 1020 wrote to memory of 896 1020 MsiExec.exe 35 PID 1020 wrote to memory of 896 1020 MsiExec.exe 35 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Win32_Dist_Stable_release.msi1⤵
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1736
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 323CB652D05F34850524A127DFD79991 C2⤵
- Loads dropped DLL
PID:684
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2EADB2B2031786761C2400F4D3B74DC72⤵
- Loads dropped DLL
PID:1476
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 71DB1BBBF1A45C61A415CEE91B310F6E M Global\MSI00002⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss8F2A.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi8F26.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr8F27.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr8F28.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:896
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:984
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000060" "000000000000005C"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD539920653db15391d1c65b86b694d9b6a
SHA1b75513d3d973316c9ca3db6147ad4c4830e331ab
SHA256115b14ff417e46c2099babf4285fc9ad2e9588fb287329f14239e01d5a131e5c
SHA512435561e27245f1bedec56aee45e6e7a15505c7df2d3e8cc66cf941548d3d372289d9007b8d0883de74960ddb2d29f38bab8c6db0dbd39170924d5147a7d81413
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
203KB
MD5d65ab7715200f5e6d2f86d15668d091e
SHA1112cc42e893a09f6c31d0410cedf31b30637839e
SHA2568dec7639390311e4fe55602f3d2ce72b7a653d4a508219134865259f78102a71
SHA5124a053b4b9b5104fdee33fb60bd9ee48b13306461844ec749720d21470cebbbb8a0349391422676293a0f10cb5a63c9aba2d4e7fc21eb0dab44e41716f88c3b28
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
232B
MD5b8fbdcf3c10e47eb4d5c7c1899fe136b
SHA1dc2de6e109d7b4eea46811ea850ec7984769b2cc
SHA2563d1ae9294e7b921cd05e08ea6fe27697de6d3c701ac4b8d43b36d9496d13ed42
SHA5123c408f0fdfe80265c6271f2404a01a6f31b716cadf805137c098a4255dd53e5777a0983fac5e49b0f11532d7bf2dae9c6fd545808731c2271eea621c2943b1a0
-
Filesize
1.1MB
MD5909acbcaf173ea9152a1f4fa957709ad
SHA19b37564dc54151a404e989239afcc1a7ce609889
SHA256a65cbc272b158b8c72890db84c64dcc744d871e5e119bd50d323b0717f3c1797
SHA512b7294497698b7ed2dbf03c83b246d1328d66f7ba0045f71373b6ce99ba56f290d69abc8600675d3f074ab85dad016eb002242377b7d0ff4a3464c62eb493447e
-
Filesize
6KB
MD530c30ef2cb47e35101d13402b5661179
SHA125696b2aab86a9233f19017539e2dd83b2f75d4e
SHA25653094df6fa4e57a3265ff04bc1e970c10bcdb3d4094ad6dd610c05b7a8b79e0f
SHA512882be2768138bb75ff7dde7d5ca4c2e024699398baacd0ce1d4619902402e054297e4f464d8cb3c22b2f35d3dabc408122c207facad64ec8014f2c54834cf458
-
Filesize
846B
MD5b45fc0f3e6c9a9999ec53389bc0effba
SHA1cb31b282047700b225d61ec347faac2f44d208fd
SHA25626e6c131ebf56ddfcbcd3fb912fe8e1e41edd6a22e96eefa363432736d60dcb9
SHA51239c72f0b273b4de93b3c2b551d159a098cfd0c1d99be238f3385d6c308ba2f3cbf758df01cda321fac65112bfa011b5ff8863cf489fa5856029232ac2f8bfc51
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
203KB
MD5d65ab7715200f5e6d2f86d15668d091e
SHA1112cc42e893a09f6c31d0410cedf31b30637839e
SHA2568dec7639390311e4fe55602f3d2ce72b7a653d4a508219134865259f78102a71
SHA5124a053b4b9b5104fdee33fb60bd9ee48b13306461844ec749720d21470cebbbb8a0349391422676293a0f10cb5a63c9aba2d4e7fc21eb0dab44e41716f88c3b28
-
Filesize
619KB
MD5a619f980c1baa155f7cfb79553aa10b1
SHA1da4dcaec351309b00d024adb704dd61230e68f81
SHA256a0ace6862ac97cdca53a9458b57901a8fe3db546a4ea4d5bc3d05e7c119418a7
SHA512983c44376dcbab6855f6f474aa3bfb672d0adab63a38096fae33da80f585da8f881a9ae352edfe80ed3cd424e42b45fb8aa7cc27337925241844b03ee300e7d9
-
Filesize
203KB
MD5d65ab7715200f5e6d2f86d15668d091e
SHA1112cc42e893a09f6c31d0410cedf31b30637839e
SHA2568dec7639390311e4fe55602f3d2ce72b7a653d4a508219134865259f78102a71
SHA5124a053b4b9b5104fdee33fb60bd9ee48b13306461844ec749720d21470cebbbb8a0349391422676293a0f10cb5a63c9aba2d4e7fc21eb0dab44e41716f88c3b28
-
Filesize
203KB
MD5d65ab7715200f5e6d2f86d15668d091e
SHA1112cc42e893a09f6c31d0410cedf31b30637839e
SHA2568dec7639390311e4fe55602f3d2ce72b7a653d4a508219134865259f78102a71
SHA5124a053b4b9b5104fdee33fb60bd9ee48b13306461844ec749720d21470cebbbb8a0349391422676293a0f10cb5a63c9aba2d4e7fc21eb0dab44e41716f88c3b28
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
203KB
MD5d65ab7715200f5e6d2f86d15668d091e
SHA1112cc42e893a09f6c31d0410cedf31b30637839e
SHA2568dec7639390311e4fe55602f3d2ce72b7a653d4a508219134865259f78102a71
SHA5124a053b4b9b5104fdee33fb60bd9ee48b13306461844ec749720d21470cebbbb8a0349391422676293a0f10cb5a63c9aba2d4e7fc21eb0dab44e41716f88c3b28
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
203KB
MD5d65ab7715200f5e6d2f86d15668d091e
SHA1112cc42e893a09f6c31d0410cedf31b30637839e
SHA2568dec7639390311e4fe55602f3d2ce72b7a653d4a508219134865259f78102a71
SHA5124a053b4b9b5104fdee33fb60bd9ee48b13306461844ec749720d21470cebbbb8a0349391422676293a0f10cb5a63c9aba2d4e7fc21eb0dab44e41716f88c3b28
-
Filesize
619KB
MD5a619f980c1baa155f7cfb79553aa10b1
SHA1da4dcaec351309b00d024adb704dd61230e68f81
SHA256a0ace6862ac97cdca53a9458b57901a8fe3db546a4ea4d5bc3d05e7c119418a7
SHA512983c44376dcbab6855f6f474aa3bfb672d0adab63a38096fae33da80f585da8f881a9ae352edfe80ed3cd424e42b45fb8aa7cc27337925241844b03ee300e7d9
-
Filesize
203KB
MD5d65ab7715200f5e6d2f86d15668d091e
SHA1112cc42e893a09f6c31d0410cedf31b30637839e
SHA2568dec7639390311e4fe55602f3d2ce72b7a653d4a508219134865259f78102a71
SHA5124a053b4b9b5104fdee33fb60bd9ee48b13306461844ec749720d21470cebbbb8a0349391422676293a0f10cb5a63c9aba2d4e7fc21eb0dab44e41716f88c3b28