Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2023, 18:33

General

  • Target

    1.msi

  • Size

    3.5MB

  • MD5

    e1abe0b693e8ee3df8367caf14f8565c

  • SHA1

    14867c8c4bbcc57efe63a71bfcde4cf832be9b2a

  • SHA256

    6fed6902e05e825c5c600df452de46736263d58920d32a9346b50c6248384211

  • SHA512

    f51b5d36761d9e8443809056c508e43ff668a858c02c81bb95d10cf333af1eac587cbb14e6a3b98b23845aee6d6afa35999cb2540a13846ba0864bc90f2e9be6

  • SSDEEP

    98304:OnokaJXwylk5q30yI43EDhKgn8owQTJK/gQm5z/K:nH753iYgdOTmFK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\1.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1264
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\pass.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:364
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\piop7mdr.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1272
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7FE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7FD.tmp"
          4⤵
            PID:1336
      • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\KeePass-Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\KeePass-Setup.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Users\Admin\AppData\Local\Temp\is-DCIBI.tmp\KeePass-Setup.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-DCIBI.tmp\KeePass-Setup.tmp" /SL5="$8014E,2170270,781312,C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\KeePass-Setup.exe"
          3⤵
          • Executes dropped EXE
          PID:1560
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1512
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004A0" "00000000000002CC"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1636

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6cb213.rbs

      Filesize

      7KB

      MD5

      da610bf4b7c13a83e44fd59fd95a715a

      SHA1

      d849f562b28d8a2d9b28bba2b0ce230c6f5d842a

      SHA256

      1a808e66ec11fc0d1e7f065ed4a4188adfff37b29f5665b3931a6ef3bf027291

      SHA512

      3de6eefb222bf341b5104ad5107fd5b46029270f430d908a957513986c7b3ef6cc29d9de9661713757485f56951f89dadb43982243a840addde762961d667f36

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\KeePass-Setup.exe

      Filesize

      2.9MB

      MD5

      52afb5fab6660c027f505186d1e9ddca

      SHA1

      a57780208cc7ee4026494b077d8114152347f6b4

      SHA256

      d5cf432ac514cb5239a879a22cc3e0eef6cbc089aa40146a6a1e38c090ac79ba

      SHA512

      81e16e3f628861eb6a058bb6b4a7e41b343c09e14d230dfeaacd58135fcb1feed87cd2ee6c394f319e863c249059a69e7eff1696588b012a6bd00547cca7d54c

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\KeePass-Setup.exe

      Filesize

      2.9MB

      MD5

      52afb5fab6660c027f505186d1e9ddca

      SHA1

      a57780208cc7ee4026494b077d8114152347f6b4

      SHA256

      d5cf432ac514cb5239a879a22cc3e0eef6cbc089aa40146a6a1e38c090ac79ba

      SHA512

      81e16e3f628861eb6a058bb6b4a7e41b343c09e14d230dfeaacd58135fcb1feed87cd2ee6c394f319e863c249059a69e7eff1696588b012a6bd00547cca7d54c

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\pass.ps1

      Filesize

      2.2MB

      MD5

      4d16bd7cc13c4ac89c59d2825fc9a3c3

      SHA1

      7cc9b7bdf9a7577d2a2d592be2f2db61a118cc2b

      SHA256

      9b6125e1aa889f2027111106ee406d08a21c894a83975b785a2b82aab3e2ac52

      SHA512

      71e3c7c85866a39ecda4278762633a8dfd313779c3f3d8494453f9dd4bf92e96fa94b7880fd45444673cb84f74dc0ecd0006b7a693a2cb7f5fc776a6157cf922

    • C:\Users\Admin\AppData\Local\Temp\RES7FE.tmp

      Filesize

      1KB

      MD5

      ccc6ee80af2d558b333edefe62e9b0ae

      SHA1

      f37a0d246044d09bb14b7e8bbec90421d37673f0

      SHA256

      9b523fc3688df2d20759a34e1de97fb392f29ac1d6c8a47a598574ede2c18905

      SHA512

      12637a3f6470b66c14ef70a0d7ac30af8c618636bc5cf01098be4b998826abbc107bf3bd55d735c8d66d879e8fe1ce3a22b789a4179dac57b681372f636ca583

    • C:\Users\Admin\AppData\Local\Temp\is-DCIBI.tmp\KeePass-Setup.tmp

      Filesize

      3.0MB

      MD5

      d1ef2c4a186f83eac96f90a68c706498

      SHA1

      e1ee6eb95a042f7094d628e1e8e26b7484cecea8

      SHA256

      8746ed5498199546babaa5d65a24f777227f3045a15ded568bbfd450f69a6861

      SHA512

      fabe2a2a3ead7f83e22dc5a12b5ea9853ef4af6b24417fe901b185eb003c2e52da22d9da9a6a295a08d16dafe82b2f3e6b716ae9438e6fcfbbca7af40e1d30fc

    • C:\Users\Admin\AppData\Local\Temp\piop7mdr.dll

      Filesize

      3KB

      MD5

      6eaa8ae6f4019218208a0a26fb517bd1

      SHA1

      5ebc1402b27525eed3a4225eda9878cc2b3058ef

      SHA256

      4d17ed0886554c05af9bb4fb0743b6fcd6740552c5e3b71c271cbb40d5f8124b

      SHA512

      953e531a21369941d6a210b511fc57166e59668c7d86b451d6ce53c9db911c1f15127573fb4ab35bdf12581c4374b4132cc758aa28ede629ca760fc0c9d5dd11

    • C:\Users\Admin\AppData\Local\Temp\piop7mdr.pdb

      Filesize

      7KB

      MD5

      c2b1cf87083d569f95882230d377ba68

      SHA1

      0fdf3858ff9b933c81ba3c6465559d7a5f9f39a3

      SHA256

      5736f6556d476edb3ee9d7063b0e2f870b2d99ad6f7b3c1d4efaff305af120ed

      SHA512

      8750208052099b28e85d8f7cc3623783069c918867c5dbc60d9fc8b991b424cae077aad590099ccb8f132c541ef1b3d1443ab83323c563be8ac85b617cffe448

    • C:\Windows\Installer\6cb211.msi

      Filesize

      3.5MB

      MD5

      e1abe0b693e8ee3df8367caf14f8565c

      SHA1

      14867c8c4bbcc57efe63a71bfcde4cf832be9b2a

      SHA256

      6fed6902e05e825c5c600df452de46736263d58920d32a9346b50c6248384211

      SHA512

      f51b5d36761d9e8443809056c508e43ff668a858c02c81bb95d10cf333af1eac587cbb14e6a3b98b23845aee6d6afa35999cb2540a13846ba0864bc90f2e9be6

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC7FD.tmp

      Filesize

      652B

      MD5

      755bc445c0b40bf7d635a6604f4a2f39

      SHA1

      f9ed8b6f5008af5a35dd888650849111040095df

      SHA256

      fe5087ae42c7bacccc3ce57c0d7b195b481cc168a558afeb8c96004cf6ca8ffa

      SHA512

      1d71f63bcca8040dce42a339e2074ce960c9d2097e5687d33da34cbf97f51326d0fa00604b37b57a33f3d9851c05ca10b3d9d8c9efb039efeff44e46550bb6c4

    • \??\c:\Users\Admin\AppData\Local\Temp\piop7mdr.0.cs

      Filesize

      203B

      MD5

      b611be9282deb44eed731f72bcbb2b82

      SHA1

      cc1d606d853bbabd5fef87255356a0d54381c289

      SHA256

      ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

      SHA512

      63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

    • \??\c:\Users\Admin\AppData\Local\Temp\piop7mdr.cmdline

      Filesize

      309B

      MD5

      b21841c566210947e2bdc206bb39bb8b

      SHA1

      e6962427498f0e408016b96324267ec0feb48168

      SHA256

      773c55ef1a9f8af2010ef864910ab3825b1be900337a24697716462b5efff629

      SHA512

      e3565d544f0cb30b782ef1025cbbc65491c6b7eae016edbba19675df4b8c4004a6b1a45f3eb47c9645f260e4716ce749384dbde677885113a8ebadb661362424

    • \Users\Admin\AppData\Local\Temp\is-DCIBI.tmp\KeePass-Setup.tmp

      Filesize

      3.0MB

      MD5

      d1ef2c4a186f83eac96f90a68c706498

      SHA1

      e1ee6eb95a042f7094d628e1e8e26b7484cecea8

      SHA256

      8746ed5498199546babaa5d65a24f777227f3045a15ded568bbfd450f69a6861

      SHA512

      fabe2a2a3ead7f83e22dc5a12b5ea9853ef4af6b24417fe901b185eb003c2e52da22d9da9a6a295a08d16dafe82b2f3e6b716ae9438e6fcfbbca7af40e1d30fc

    • memory/364-101-0x00000000027A0000-0x0000000002820000-memory.dmp

      Filesize

      512KB

    • memory/364-86-0x000000001B180000-0x000000001B462000-memory.dmp

      Filesize

      2.9MB

    • memory/364-83-0x00000000027A0000-0x0000000002820000-memory.dmp

      Filesize

      512KB

    • memory/364-94-0x00000000027A0000-0x0000000002820000-memory.dmp

      Filesize

      512KB

    • memory/364-91-0x00000000027A0000-0x0000000002820000-memory.dmp

      Filesize

      512KB

    • memory/364-118-0x000000001B0F0000-0x000000001B0F8000-memory.dmp

      Filesize

      32KB

    • memory/364-87-0x0000000002490000-0x0000000002498000-memory.dmp

      Filesize

      32KB

    • memory/364-100-0x00000000027A0000-0x0000000002820000-memory.dmp

      Filesize

      512KB

    • memory/364-84-0x00000000027A0000-0x0000000002820000-memory.dmp

      Filesize

      512KB

    • memory/1304-89-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/1304-96-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/1304-121-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/1560-122-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1560-125-0x0000000000400000-0x0000000000707000-memory.dmp

      Filesize

      3.0MB

    • memory/1560-126-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB