Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    116s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2023, 14:23

General

  • Target

    JJSploit_7.2.1_x86_en-US.msi

  • Size

    5.8MB

  • MD5

    4b884c18f4682189708c771c13ad573e

  • SHA1

    a74f992bc18c1936671cb38f1a94ce872ee4c687

  • SHA256

    e0b2d388d35046a5ce669e753adb96b8d6de670d352ae34fc41eaf79303a3d45

  • SHA512

    bc466b11352b4671caad01acb763d763e40a9e9d20eaf3e0f5b7e8d9b5ef939049570ee18e0e08301fc9cb65b9b83997cf9c884c3a0c47ac91fb1baabe980574

  • SSDEEP

    98304:Gr5BsITy5d5aaJweCkT8JdpF9aDK1ZcWmZYDpNTENWYbZkON/t1ZolL6r:EOITEaaJv+Jd9aDKUWJinDZol

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 23 IoCs
  • Drops file in Windows directory 11 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\JJSploit_7.2.1_x86_en-US.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1972
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 27D0B1C1A733D9B7BB15632485171FDF C
      2⤵
      • Loads dropped DLL
      PID:756
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -NoProfile -windowstyle hidden try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 } catch {}; Invoke-WebRequest -Uri "https://go.microsoft.com/fwlink/p/?LinkId=2124703" -OutFile "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" ; Start-Process -FilePath "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" -ArgumentList ('/silent', '/install') -Wait
      2⤵
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1668
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:320
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003D0" "0000000000000344"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:1388

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\JJSploit\JJSploit.exe

      Filesize

      9.9MB

      MD5

      325420af7bbb170cc7c94e3cab26c169

      SHA1

      dce685934565878c8fb925a45b1a8ac30dbd482c

      SHA256

      72be69123b64e13408d5c6ff629eea2bb3a8860e522380afa3ba079ff9d179c7

      SHA512

      0a53bf1cf7dd0ad2f95faf9f5ce3867e7a59de3ccdee6b5342d640911c29a918ca8f4e0231fc0e5fa346439b4231ec8973bc7c7d65dccef8b178d52f86296c1e

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\JJSploit\JJSploit.lnk

      Filesize

      2KB

      MD5

      a9625a7b737772cbde0bfa0d49534cba

      SHA1

      54999be442da6175bca82d3f841e6e7edcac42cd

      SHA256

      d3eaa0a3424a917716cbd3b087ae72789c7c9184de6cef681f3f76b8544bbc9b

      SHA512

      e383173086a79bb63d8dbae7e76cc77ffcfabe42c28ad5b0b92968ae45d91cbac00f6976cf387ff1b2085be13bb2bbf516167832ee6930255962b729772a079f

    • C:\Users\Admin\AppData\Local\Temp\MSI9A8C.tmp

      Filesize

      113KB

      MD5

      4fdd16752561cf585fed1506914d73e0

      SHA1

      f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424

      SHA256

      aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7

      SHA512

      3695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600

    • \Users\Admin\AppData\Local\Temp\MSI9A8C.tmp

      Filesize

      113KB

      MD5

      4fdd16752561cf585fed1506914d73e0

      SHA1

      f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424

      SHA256

      aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7

      SHA512

      3695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600

    • memory/1668-112-0x000000001B0C0000-0x000000001B3A2000-memory.dmp

      Filesize

      2.9MB

    • memory/1668-113-0x0000000002320000-0x0000000002328000-memory.dmp

      Filesize

      32KB

    • memory/1668-114-0x0000000002330000-0x00000000023B0000-memory.dmp

      Filesize

      512KB

    • memory/1668-115-0x0000000002330000-0x00000000023B0000-memory.dmp

      Filesize

      512KB

    • memory/1668-116-0x0000000002330000-0x00000000023B0000-memory.dmp

      Filesize

      512KB

    • memory/1668-117-0x0000000002330000-0x00000000023B0000-memory.dmp

      Filesize

      512KB