Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2023, 01:32

General

  • Target

    d4923d3747714d0d8c1f6a2ceec5ec15c6290b030e828429fd39edcd49ccf27d.exe

  • Size

    16.5MB

  • MD5

    8589fe09a6ad2bdc47a753125086f742

  • SHA1

    b3cfe5db4df2754e23aefd71067f87ca81b2d7b1

  • SHA256

    d4923d3747714d0d8c1f6a2ceec5ec15c6290b030e828429fd39edcd49ccf27d

  • SHA512

    257eecb23c5f841c0376b7ca38557039f355d240e7c07b01526b6319b1413a75807dd5c54017af75a3593e48cf51be6446b7cf40d40cdc025e0c01e35b8fe1a5

  • SSDEEP

    196608:WcywI4gKOVUosfPfgy4f1SEmaa7jgs2EnIyolKU72urtYF6N6YHYU4vcv0NXAAqL:0wI4Zhoc0AAEnwluI0Y4UKXxUsDcFn

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4923d3747714d0d8c1f6a2ceec5ec15c6290b030e828429fd39edcd49ccf27d.exe
    "C:\Users\Admin\AppData\Local\Temp\d4923d3747714d0d8c1f6a2ceec5ec15c6290b030e828429fd39edcd49ccf27d.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN 3.0.5\install\ProtonVPN.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\d4923d3747714d0d8c1f6a2ceec5ec15c6290b030e828429fd39edcd49ccf27d.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1684114424 "
      2⤵
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      PID:556
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5EA7DDF324AD534D545CB2C9B617A5C0 C
      2⤵
      • Loads dropped DLL
      PID:520
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 29B691F4C486295FA1B2C203E1D0AA63 C
      2⤵
      • Loads dropped DLL
      PID:1412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI87F5.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • C:\Users\Admin\AppData\Local\Temp\MSI8DBF.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • C:\Users\Admin\AppData\Local\Temp\MSI912A.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • C:\Users\Admin\AppData\Local\Temp\MSI912A.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • C:\Users\Admin\AppData\Local\Temp\MSI91C7.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • C:\Users\Admin\AppData\Local\Temp\MSI9310.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • C:\Users\Admin\AppData\Local\Temp\MSI93DC.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN 3.0.5\install\ProtonVPN.msi

    Filesize

    2.1MB

    MD5

    ec201a7e2a0fae400dbb99d90f953098

    SHA1

    5d24e597be5948a3b224c0a9d3e93c27eacd5e53

    SHA256

    e925de83c6ae420903017f28d2ba576633bb22e2c04cb9002c63571097c9fc06

    SHA512

    0c5a77bb0ecb2b74a1802f222831f1942bf3f82a8c10fca91dd5bc4fea49eaa9e370293f250c0dab26a2a127a689a43c03572f91619f611c6b60a55f7a1e2bed

  • C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN 3.0.5\install\ProtonVPN.msi

    Filesize

    2.1MB

    MD5

    ec201a7e2a0fae400dbb99d90f953098

    SHA1

    5d24e597be5948a3b224c0a9d3e93c27eacd5e53

    SHA256

    e925de83c6ae420903017f28d2ba576633bb22e2c04cb9002c63571097c9fc06

    SHA512

    0c5a77bb0ecb2b74a1802f222831f1942bf3f82a8c10fca91dd5bc4fea49eaa9e370293f250c0dab26a2a127a689a43c03572f91619f611c6b60a55f7a1e2bed

  • \Users\Admin\AppData\Local\Temp\MSI87F5.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • \Users\Admin\AppData\Local\Temp\MSI8DBF.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • \Users\Admin\AppData\Local\Temp\MSI912A.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • \Users\Admin\AppData\Local\Temp\MSI91C7.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • \Users\Admin\AppData\Local\Temp\MSI9310.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • \Users\Admin\AppData\Local\Temp\MSI93DC.tmp

    Filesize

    587KB

    MD5

    cadbcf6f5a0199ecc0220ce23a860d89

    SHA1

    073c149d68916520aea882e588ab9a5ae083d75a

    SHA256

    42ef18c42fe06709f3c86157e2270358f3c93d14be2e173b8fae8edcefddfca0

    SHA512

    cebb128bdc04e6b29df74bedcc375a340ac037563d828af3455de41f31d2e464f82f85c97ca9910a4a7c819efa906aa4a4560174f184cee316f53e3d2b5cdccc

  • memory/884-61-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB