Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    34s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2023, 20:42

Errors

Reason
Machine shutdown

General

  • Target

    OInstall.exe

  • Size

    11.6MB

  • MD5

    405c0627a9dc679297862d62c712b05a

  • SHA1

    66b33f9e5e9b517be3ae85d9a423129f272dc25a

  • SHA256

    698aeb2888d4ed207eefb231937dfe3e9bbf8ceb0db6a961fe9010a2fddb8eb9

  • SHA512

    bca6a39378cddd35e4ebe59c03d4ddb04826d1475d686e3e85350a18f6efc602d93548116f77e38cf3a998459d371e2241edc044836b585d87998b61c98fdf46

  • SSDEEP

    196608:w3mifxMAExNyGUV9KhMqzFdhA1wREOVp5LpL2OcmmQ1L/sJ7GcI37lWhbX/PE56w:w3ffyH4V9KhMqzFdhyZOVp+OKe/+GR7R

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OInstall.exe
    "C:\Users\Admin\AppData\Local\Temp\OInstall.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Windows\system32\cmd.exe
      "C:\Windows\Sysnative\cmd.exe" /c WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Users\Admin\AppData\Local\Temp\OInstall.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\System32\Wbem\WMIC.exe
        WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Users\Admin\AppData\Local\Temp\OInstall.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2356
    • C:\Windows\system32\cmd.exe
      "C:\Windows\Sysnative\cmd.exe" /c WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Users\Admin\AppData\Local\Temp\files"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Windows\System32\Wbem\WMIC.exe
        WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Users\Admin\AppData\Local\Temp\files"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2244
    • C:\Windows\system32\cmd.exe
      "C:\Windows\Sysnative\cmd.exe" /D /c files.dat -y -pkmsauto
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Users\Admin\AppData\Local\Temp\files\files.dat
        files.dat -y -pkmsauto
        3⤵
        • Executes dropped EXE
        PID:2252
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa3985855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\files\files.dat

    Filesize

    707KB

    MD5

    55d21b2c272a5d6b9f54fa9ed82bf9eb

    SHA1

    32464cba823cd9b7e94e4fa1a32a8f2344b0f33b

    SHA256

    7a1c82e264258470d14ca345ea1a9b6fc34fa19b393a92077a01be5f1ad08f47

    SHA512

    1b68d0c61367717529be4a3aa347bb69d3e21de7a89b10e8b0aa54d40af988cc0cc8e63298ba595a93c3372aca3770ace1eee2780a59238d0948499dbb4be725

  • C:\Users\Admin\AppData\Local\Temp\files\files.dat

    Filesize

    707KB

    MD5

    55d21b2c272a5d6b9f54fa9ed82bf9eb

    SHA1

    32464cba823cd9b7e94e4fa1a32a8f2344b0f33b

    SHA256

    7a1c82e264258470d14ca345ea1a9b6fc34fa19b393a92077a01be5f1ad08f47

    SHA512

    1b68d0c61367717529be4a3aa347bb69d3e21de7a89b10e8b0aa54d40af988cc0cc8e63298ba595a93c3372aca3770ace1eee2780a59238d0948499dbb4be725

  • memory/4200-133-0x0000000000400000-0x0000000001A63000-memory.dmp

    Filesize

    22.4MB

  • memory/4200-150-0x0000000000400000-0x0000000001A63000-memory.dmp

    Filesize

    22.4MB

  • memory/4200-152-0x0000000000400000-0x0000000001A63000-memory.dmp

    Filesize

    22.4MB