Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/05/2023, 14:29

230512-rtwq3add85 7

12/05/2023, 14:29

230512-rtmhdsff4y 7

Analysis

  • max time kernel
    54s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2023, 14:29

General

  • Target

    AltInstaller.msi

  • Size

    6.4MB

  • MD5

    69283c93e4313778fb572173c2eda692

  • SHA1

    02ad06ff30a170a58fdb4012a974ea593830beae

  • SHA256

    76098686faa6dfad700cc667fd26ff975fd02602bf7ff6a4a0d57098d029519d

  • SHA512

    ed98dd4b32959802f3ebc0e1f79801f70823b47b6847fcc7f6d8a01ba88ad2e2b2b5061eb4aabe567962d7b8c156f42bedf0918b1f41c9ee37a2772827e7849b

  • SSDEEP

    196608:rL1TzVCmQThxI8FQBaNzAhrbDmU4HwUFNN1nOtXqD5fg:rL1TzVAIortAlbaURUdOk9f

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\AltInstaller.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2044
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1432
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1184
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003DC" "00000000000003D8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\6cae4c.rbs

    Filesize

    11KB

    MD5

    4f3c273bd7759bee928ef59c0ee75d06

    SHA1

    e88916843212a4614a365e9266a3d405d06d1162

    SHA256

    df85aa0071df44da12ecbf9a1130d7f2973aa082098a0446e93ba76dd99a8bd7

    SHA512

    69858e3f846243a515d9d5be6b196a2699bc461e752405ae14b9ab68b92a2e86f16cb1727e55653df1f0ae5f41d9bebf5f58809d19dbbf8e1748cea543bb7853

  • C:\Windows\Installer\6cae4a.msi

    Filesize

    6.4MB

    MD5

    69283c93e4313778fb572173c2eda692

    SHA1

    02ad06ff30a170a58fdb4012a974ea593830beae

    SHA256

    76098686faa6dfad700cc667fd26ff975fd02602bf7ff6a4a0d57098d029519d

    SHA512

    ed98dd4b32959802f3ebc0e1f79801f70823b47b6847fcc7f6d8a01ba88ad2e2b2b5061eb4aabe567962d7b8c156f42bedf0918b1f41c9ee37a2772827e7849b