Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
1Autorun.inf
windows7-x64
1Autorun.inf
windows10-2004-x64
1Setup.bmp
windows7-x64
3Setup.bmp
windows10-2004-x64
7Setup.exe
windows7-x64
8Setup.exe
windows10-2004-x64
8Silent_Install.bat
windows7-x64
8Silent_Install.bat
windows10-2004-x64
8blutooth_on.ico
windows7-x64
3blutooth_on.ico
windows10-2004-x64
3setup.ini
windows7-x64
1setup.ini
windows10-2004-x64
1x32/setup.exe
windows7-x64
8x32/setup.exe
windows10-2004-x64
8x64/setup.exe
windows7-x64
8x64/setup.exe
windows10-2004-x64
8Analysis
-
max time kernel
133s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2023, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
Autorun.inf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Autorun.inf
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Setup.bmp
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Setup.bmp
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Setup.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Silent_Install.bat
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Silent_Install.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
blutooth_on.ico
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
blutooth_on.ico
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
setup.ini
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
setup.ini
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
x32/setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
x32/setup.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
x64/setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
x64/setup.exe
Resource
win10v2004-20230220-en
General
-
Target
x32/setup.exe
-
Size
189.8MB
-
MD5
da0bb7868fa68de62c1cfac34e8dd2bd
-
SHA1
1f1496ea9f490161a1c2ee8839fdadb4a94b3725
-
SHA256
539e20a7820d76833a884e46c180afe925eae26940860cf3be7706ace5419e88
-
SHA512
708feba022827f0e3d5c7fc821dfd244ce75c35c95b8b7f140ca0ae5e07ef9af6a8e8c6f21e8169baae3e9ede4038f2300d4b482917111481236160be6e8737d
-
SSDEEP
3145728:r0u49gTTDzlJOf/R1z67naI26pEftQOEUO9Qa5jlDD/lKJLomIP1xzE9I9tde7Kb:o+NJwbzgaIQO/lf/lKJLiNFEa9tcO8DS
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 32 3140 MSIEXEC.EXE 34 3140 MSIEXEC.EXE -
Loads dropped DLL 3 IoCs
pid Process 3076 MsiExec.exe 3076 MsiExec.exe 3076 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: MSIEXEC.EXE File opened (read-only) \??\N: MSIEXEC.EXE File opened (read-only) \??\T: MSIEXEC.EXE File opened (read-only) \??\Z: MSIEXEC.EXE File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: MSIEXEC.EXE File opened (read-only) \??\P: MSIEXEC.EXE File opened (read-only) \??\S: MSIEXEC.EXE File opened (read-only) \??\F: MSIEXEC.EXE File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: MSIEXEC.EXE File opened (read-only) \??\L: MSIEXEC.EXE File opened (read-only) \??\M: MSIEXEC.EXE File opened (read-only) \??\V: MSIEXEC.EXE File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: MSIEXEC.EXE File opened (read-only) \??\K: MSIEXEC.EXE File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: MSIEXEC.EXE File opened (read-only) \??\I: MSIEXEC.EXE File opened (read-only) \??\R: MSIEXEC.EXE File opened (read-only) \??\X: MSIEXEC.EXE File opened (read-only) \??\Y: MSIEXEC.EXE File opened (read-only) \??\G: MSIEXEC.EXE File opened (read-only) \??\U: MSIEXEC.EXE File opened (read-only) \??\W: MSIEXEC.EXE File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\O: MSIEXEC.EXE File opened (read-only) \??\Q: MSIEXEC.EXE File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3140 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 3140 MSIEXEC.EXE Token: SeSecurityPrivilege 4280 msiexec.exe Token: SeCreateTokenPrivilege 3140 MSIEXEC.EXE Token: SeAssignPrimaryTokenPrivilege 3140 MSIEXEC.EXE Token: SeLockMemoryPrivilege 3140 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 3140 MSIEXEC.EXE Token: SeMachineAccountPrivilege 3140 MSIEXEC.EXE Token: SeTcbPrivilege 3140 MSIEXEC.EXE Token: SeSecurityPrivilege 3140 MSIEXEC.EXE Token: SeTakeOwnershipPrivilege 3140 MSIEXEC.EXE Token: SeLoadDriverPrivilege 3140 MSIEXEC.EXE Token: SeSystemProfilePrivilege 3140 MSIEXEC.EXE Token: SeSystemtimePrivilege 3140 MSIEXEC.EXE Token: SeProfSingleProcessPrivilege 3140 MSIEXEC.EXE Token: SeIncBasePriorityPrivilege 3140 MSIEXEC.EXE Token: SeCreatePagefilePrivilege 3140 MSIEXEC.EXE Token: SeCreatePermanentPrivilege 3140 MSIEXEC.EXE Token: SeBackupPrivilege 3140 MSIEXEC.EXE Token: SeRestorePrivilege 3140 MSIEXEC.EXE Token: SeShutdownPrivilege 3140 MSIEXEC.EXE Token: SeDebugPrivilege 3140 MSIEXEC.EXE Token: SeAuditPrivilege 3140 MSIEXEC.EXE Token: SeSystemEnvironmentPrivilege 3140 MSIEXEC.EXE Token: SeChangeNotifyPrivilege 3140 MSIEXEC.EXE Token: SeRemoteShutdownPrivilege 3140 MSIEXEC.EXE Token: SeUndockPrivilege 3140 MSIEXEC.EXE Token: SeSyncAgentPrivilege 3140 MSIEXEC.EXE Token: SeEnableDelegationPrivilege 3140 MSIEXEC.EXE Token: SeManageVolumePrivilege 3140 MSIEXEC.EXE Token: SeImpersonatePrivilege 3140 MSIEXEC.EXE Token: SeCreateGlobalPrivilege 3140 MSIEXEC.EXE Token: SeCreateTokenPrivilege 3140 MSIEXEC.EXE Token: SeAssignPrimaryTokenPrivilege 3140 MSIEXEC.EXE Token: SeLockMemoryPrivilege 3140 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 3140 MSIEXEC.EXE Token: SeMachineAccountPrivilege 3140 MSIEXEC.EXE Token: SeTcbPrivilege 3140 MSIEXEC.EXE Token: SeSecurityPrivilege 3140 MSIEXEC.EXE Token: SeTakeOwnershipPrivilege 3140 MSIEXEC.EXE Token: SeLoadDriverPrivilege 3140 MSIEXEC.EXE Token: SeSystemProfilePrivilege 3140 MSIEXEC.EXE Token: SeSystemtimePrivilege 3140 MSIEXEC.EXE Token: SeProfSingleProcessPrivilege 3140 MSIEXEC.EXE Token: SeIncBasePriorityPrivilege 3140 MSIEXEC.EXE Token: SeCreatePagefilePrivilege 3140 MSIEXEC.EXE Token: SeCreatePermanentPrivilege 3140 MSIEXEC.EXE Token: SeBackupPrivilege 3140 MSIEXEC.EXE Token: SeRestorePrivilege 3140 MSIEXEC.EXE Token: SeShutdownPrivilege 3140 MSIEXEC.EXE Token: SeDebugPrivilege 3140 MSIEXEC.EXE Token: SeAuditPrivilege 3140 MSIEXEC.EXE Token: SeSystemEnvironmentPrivilege 3140 MSIEXEC.EXE Token: SeChangeNotifyPrivilege 3140 MSIEXEC.EXE Token: SeRemoteShutdownPrivilege 3140 MSIEXEC.EXE Token: SeUndockPrivilege 3140 MSIEXEC.EXE Token: SeSyncAgentPrivilege 3140 MSIEXEC.EXE Token: SeEnableDelegationPrivilege 3140 MSIEXEC.EXE Token: SeManageVolumePrivilege 3140 MSIEXEC.EXE Token: SeImpersonatePrivilege 3140 MSIEXEC.EXE Token: SeCreateGlobalPrivilege 3140 MSIEXEC.EXE Token: SeCreateTokenPrivilege 3140 MSIEXEC.EXE Token: SeAssignPrimaryTokenPrivilege 3140 MSIEXEC.EXE Token: SeLockMemoryPrivilege 3140 MSIEXEC.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3140 MSIEXEC.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3140 1940 setup.exe 88 PID 1940 wrote to memory of 3140 1940 setup.exe 88 PID 1940 wrote to memory of 3140 1940 setup.exe 88 PID 4280 wrote to memory of 3076 4280 msiexec.exe 91 PID 4280 wrote to memory of 3076 4280 msiexec.exe 91 PID 4280 wrote to memory of 3076 4280 msiexec.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\x32\setup.exe"C:\Users\Admin\AppData\Local\Temp\x32\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\MSIEXEC.EXEMSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Temp\{4DA10E41-4B42-449C-BA10-DD0F9DB48C03}\CSR Harmony Wireless Software Stack.msi" /l*v C:\Users\Admin\AppData\Local\Temp\HarmonyInstall.log TRANSFORMS="C:\Users\Admin\AppData\Local\Temp\{4DA10E41-4B42-449C-BA10-DD0F9DB48C03}\1033.MST" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\x32" SETUPEXENAME="setup.exe"2⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3140
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4F60F8987A3F2FDCD1EC2B8ECC334F0E C2⤵
- Loads dropped DLL
PID:3076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5e514c184fd59569180f9e29648481f64
SHA15d2d29c996974d88ab7ac1db76581c79c77cd3be
SHA256e886026008391aec859db251fff4c9a55a45c50c227e4063d336835073f25745
SHA5129f2c1fba7c25c743cc4c7129956db96237d78346d9eff2923b542cb5d692a029046ad1528c70e20a6f86747f74f6a81d6308413fbc4e82a3fed1e941603c9c5c
-
Filesize
57KB
MD5e514c184fd59569180f9e29648481f64
SHA15d2d29c996974d88ab7ac1db76581c79c77cd3be
SHA256e886026008391aec859db251fff4c9a55a45c50c227e4063d336835073f25745
SHA5129f2c1fba7c25c743cc4c7129956db96237d78346d9eff2923b542cb5d692a029046ad1528c70e20a6f86747f74f6a81d6308413fbc4e82a3fed1e941603c9c5c
-
Filesize
217KB
MD53add3dd4c56dd060be6e883ad0de2061
SHA1e3ff0637a89a85668bac5ff9b382679add5c8d0e
SHA2563bac9baff52ca46a14e0153a44d623a01faed15e2b38a98caa5012ad168efad0
SHA512bd014a679d539344228af7e3d218621e4a33ba1483d0da2a12ce01db3d6f5fa0e3b748d13aac2d34e1dd31e6975492cc8a92f80a696bb7b6c1be639a10826ae8
-
Filesize
217KB
MD53add3dd4c56dd060be6e883ad0de2061
SHA1e3ff0637a89a85668bac5ff9b382679add5c8d0e
SHA2563bac9baff52ca46a14e0153a44d623a01faed15e2b38a98caa5012ad168efad0
SHA512bd014a679d539344228af7e3d218621e4a33ba1483d0da2a12ce01db3d6f5fa0e3b748d13aac2d34e1dd31e6975492cc8a92f80a696bb7b6c1be639a10826ae8
-
Filesize
122KB
MD52c65cc2f1516e8eed2f01ee5efa60c93
SHA1fa8ace92bdf6cb522357384b352389d08b0464de
SHA2561af4d7548834c516d02c04e13f446dfb528e01f3352eabe8a6c7528e4caffeca
SHA512f5a55023883795a0c27020ffcf6b4a33c37faefa808e45afbeea1f1b8eb07c4b6a82ef4dfc729d66d8cf93f8f7ffaf3f36e0c7c1cd7cddd76934b23380567f03
-
Filesize
122KB
MD52c65cc2f1516e8eed2f01ee5efa60c93
SHA1fa8ace92bdf6cb522357384b352389d08b0464de
SHA2561af4d7548834c516d02c04e13f446dfb528e01f3352eabe8a6c7528e4caffeca
SHA512f5a55023883795a0c27020ffcf6b4a33c37faefa808e45afbeea1f1b8eb07c4b6a82ef4dfc729d66d8cf93f8f7ffaf3f36e0c7c1cd7cddd76934b23380567f03
-
Filesize
113KB
MD5b744f334a4db8788a3eeb1430cf48d98
SHA13778f36a74afc672b2d85e2caac61f6981b5a9ae
SHA256e0c3583cda9929efe92454f87365f56177f11de88097261ed60d440fc5a16de2
SHA512596c086bcaa0ccc0f6d4ae65bf49ff8120650d6c8c7766d265be564520398b9ab29795bba46d6936d036b44166f8e8ee4f4363399299225c494c9e29f28f2358
-
Filesize
1KB
MD5a326980e42c0c8af656451bdcf61b2d4
SHA1c3aed84d944bc382d7987da8b9dc3df84bbaf37a
SHA256bb9b46f495d457758c368e54fc3ff16e35e73c86f1ebe806bab5c1eb98142cd5
SHA512344cc75be73168867c246f21eb2ae278df184837eed68482c75aaf81b0effda835de0f8830d650a62a3722ee01b92869ec3caabb2c5565ce84133023c8e1caef
-
Filesize
4.6MB
MD5216f73e8a91feaa9efb1e9ec92b93693
SHA14f68295bd87446f86e334c89362376ef8cdc9f85
SHA256940f0f1d4e4bc1c0a265301dd3d564caf733aa80cbe26b52d4ebf24bbf0f3241
SHA512820da4f047729e9a582d02f38bd9cfe391da254aca87b19829943c59bb528a49569bb7d57392f4b19f2a5f21916aeea55b0c84b06cacf6ed244d6f3c7dbb49f8
-
Filesize
21KB
MD5be345d0260ae12c5f2f337b17e07c217
SHA10976ba0982fe34f1c35a0974f6178e15c238ed7b
SHA256e994689a13b9448c074f9b471edeec9b524890a0d82925e98ab90b658016d8f3
SHA51277040dbee29be6b136a83b9e444d8b4f71ff739f7157e451778fb4fccb939a67ff881a70483de16bcb6ae1fea64a89e00711a33ec26f4d3eea8e16c9e9553eff
-
Filesize
12KB
MD50cf6c912e9f721a45792fe95938544e1
SHA1812f5dfd92ffbc27d11c490906d356d8843b7a27
SHA2566c3c15e07f63d192ac35108a11b688a2344b7f90aeda8c41e686de94539e9cb0
SHA512c76c42cb50b0b8462f2dc68baff8dbaf2ccf7a1c38886eabfaff69b7562153bd0ed141ebda456475cea033b770b723ba7aba08d2cf4d66c6f7796f5156e030a5
-
C:\Users\Admin\AppData\Local\Temp\{4DA10E41-4B42-449C-BA10-DD0F9DB48C03}\CSR Harmony Wireless Software Stack.msi
Filesize162.5MB
MD5286e8a6bbf205220957714e9753f9bb7
SHA15eb02326a70930a2208816b516b40703db488962
SHA256ba9f34c47547c4b0dbffc8104a6416ac3969e5cf965f459251b0f3ad077da9fe
SHA512c31de431ad1911ae4f1a41b1690725179f7481894ac32326a7d72b8cb5c61df5adc7d50f982adf0c423420792994c580916c996c8efdb9bfa24fdb95bd23a649
-
Filesize
6KB
MD559740d6e67fc73a6b0e04fecd8037e8f
SHA10c6a4848a9845354ebf17b5e17a8b00c270fa54e
SHA256da21d345647389ce764245b79da356a7dd9b26513e1df31de7ca0a01cd2ee6ca
SHA5122363dbd0163b89479093eb9ef6e367fd22f4fe9ac619eb6c6eb34443a405806c2666469194838d4a9199d1753651a625229b69c9bf3055c626606a40fbe9f454
-
Filesize
4KB
MD50e30c2ed8ea7059e5790b795729c6ddb
SHA1870a766599c24df1095b99bbc8f97d1b281e28d5
SHA256875d2b138a1903472c1fe48c38f67f2c5b15648d407db1fff7b8fbd1deec41e1
SHA512a47c68fb68facde63c678dd079f53ae3fd1811d3a763af9c049b463b57780a91f641f55d2bb763402632a94f2959f2dc48d38ef7cfb545100cb0e19421aa3c6b