Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05/08/2023, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
streamer.msi
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
streamer.msi
Resource
win10v2004-20230703-en
General
-
Target
streamer.msi
-
Size
42.4MB
-
MD5
4a5f886ea0b11ff3f483c67351ca8b18
-
SHA1
7bf56ac01658d860953a670e3ec924d3121137d1
-
SHA256
6de5aa0bd6ad2590b1f08f59fbbb85f993ff76ceae3f0a6c4f099e171f762ab9
-
SHA512
8389f61037f0fa6beec8f6a216c8148b77e21f7753898497c2b4091b020d26a97283ed2de66284e9ae8704911c061b013b4eb440a534eee5bb025af84cbc2e45
-
SSDEEP
786432:9GFO48Or9fKBqUK/Jm5IBaTbO9dHoBiJe6CwAhVQHglBHcPH:UFO4sqUK/s5k88dDSOAlRcPH
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2444 msiexec.exe 5 2444 msiexec.exe 7 2444 msiexec.exe -
Loads dropped DLL 2 IoCs
pid Process 2920 MsiExec.exe 2920 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2444 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2444 msiexec.exe Token: SeIncreaseQuotaPrivilege 2444 msiexec.exe Token: SeRestorePrivilege 2844 msiexec.exe Token: SeTakeOwnershipPrivilege 2844 msiexec.exe Token: SeSecurityPrivilege 2844 msiexec.exe Token: SeCreateTokenPrivilege 2444 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2444 msiexec.exe Token: SeLockMemoryPrivilege 2444 msiexec.exe Token: SeIncreaseQuotaPrivilege 2444 msiexec.exe Token: SeMachineAccountPrivilege 2444 msiexec.exe Token: SeTcbPrivilege 2444 msiexec.exe Token: SeSecurityPrivilege 2444 msiexec.exe Token: SeTakeOwnershipPrivilege 2444 msiexec.exe Token: SeLoadDriverPrivilege 2444 msiexec.exe Token: SeSystemProfilePrivilege 2444 msiexec.exe Token: SeSystemtimePrivilege 2444 msiexec.exe Token: SeProfSingleProcessPrivilege 2444 msiexec.exe Token: SeIncBasePriorityPrivilege 2444 msiexec.exe Token: SeCreatePagefilePrivilege 2444 msiexec.exe Token: SeCreatePermanentPrivilege 2444 msiexec.exe Token: SeBackupPrivilege 2444 msiexec.exe Token: SeRestorePrivilege 2444 msiexec.exe Token: SeShutdownPrivilege 2444 msiexec.exe Token: SeDebugPrivilege 2444 msiexec.exe Token: SeAuditPrivilege 2444 msiexec.exe Token: SeSystemEnvironmentPrivilege 2444 msiexec.exe Token: SeChangeNotifyPrivilege 2444 msiexec.exe Token: SeRemoteShutdownPrivilege 2444 msiexec.exe Token: SeUndockPrivilege 2444 msiexec.exe Token: SeSyncAgentPrivilege 2444 msiexec.exe Token: SeEnableDelegationPrivilege 2444 msiexec.exe Token: SeManageVolumePrivilege 2444 msiexec.exe Token: SeImpersonatePrivilege 2444 msiexec.exe Token: SeCreateGlobalPrivilege 2444 msiexec.exe Token: SeCreateTokenPrivilege 2444 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2444 msiexec.exe Token: SeLockMemoryPrivilege 2444 msiexec.exe Token: SeIncreaseQuotaPrivilege 2444 msiexec.exe Token: SeMachineAccountPrivilege 2444 msiexec.exe Token: SeTcbPrivilege 2444 msiexec.exe Token: SeSecurityPrivilege 2444 msiexec.exe Token: SeTakeOwnershipPrivilege 2444 msiexec.exe Token: SeLoadDriverPrivilege 2444 msiexec.exe Token: SeSystemProfilePrivilege 2444 msiexec.exe Token: SeSystemtimePrivilege 2444 msiexec.exe Token: SeProfSingleProcessPrivilege 2444 msiexec.exe Token: SeIncBasePriorityPrivilege 2444 msiexec.exe Token: SeCreatePagefilePrivilege 2444 msiexec.exe Token: SeCreatePermanentPrivilege 2444 msiexec.exe Token: SeBackupPrivilege 2444 msiexec.exe Token: SeRestorePrivilege 2444 msiexec.exe Token: SeShutdownPrivilege 2444 msiexec.exe Token: SeDebugPrivilege 2444 msiexec.exe Token: SeAuditPrivilege 2444 msiexec.exe Token: SeSystemEnvironmentPrivilege 2444 msiexec.exe Token: SeChangeNotifyPrivilege 2444 msiexec.exe Token: SeRemoteShutdownPrivilege 2444 msiexec.exe Token: SeUndockPrivilege 2444 msiexec.exe Token: SeSyncAgentPrivilege 2444 msiexec.exe Token: SeEnableDelegationPrivilege 2444 msiexec.exe Token: SeManageVolumePrivilege 2444 msiexec.exe Token: SeImpersonatePrivilege 2444 msiexec.exe Token: SeCreateGlobalPrivilege 2444 msiexec.exe Token: SeCreateTokenPrivilege 2444 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2444 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2920 2844 msiexec.exe 31 PID 2844 wrote to memory of 2920 2844 msiexec.exe 31 PID 2844 wrote to memory of 2920 2844 msiexec.exe 31 PID 2844 wrote to memory of 2920 2844 msiexec.exe 31 PID 2844 wrote to memory of 2920 2844 msiexec.exe 31 PID 2844 wrote to memory of 2920 2844 msiexec.exe 31 PID 2844 wrote to memory of 2920 2844 msiexec.exe 31
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\streamer.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2444
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C7C0D9F8D0A547DF29565EADB1B11724 C2⤵
- Loads dropped DLL
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
173KB
MD5d07d2c85ea1c0af02a99b6cf78ae79ef
SHA13ac922fc33789b61eb62085f3e49bca6aba4b4a9
SHA2565a36c709648e40ec1224855fb77e7420ee53e267c185f31c2c016115fba4af38
SHA512029bed817c10eebabd39a6c819eda3d76b09c7e34d182ec31c9f7d96fed530cd35feed88891ec61b6fb0d86ba44a07bfe3882e6fb3d9f0e41d48d2a99453789a
-
Filesize
167KB
MD5e80f90724939d4f85fc49de2460b94b5
SHA1512ea4deba1c97cc7ec394bce0e4a32cd497176e
SHA2568041d3ccbafa491d35f70030c3afeba683b0235bed24f242878d04c7e87b8687
SHA5129494f1cd058dc3923e4f562d8ed2edf3d252f519efc6db4f1b5289d8a1b841a6cb927e14d33dab98e0bd4d22a5a473b8cd9424f77213527fbe0c183126356767
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
173KB
MD5d07d2c85ea1c0af02a99b6cf78ae79ef
SHA13ac922fc33789b61eb62085f3e49bca6aba4b4a9
SHA2565a36c709648e40ec1224855fb77e7420ee53e267c185f31c2c016115fba4af38
SHA512029bed817c10eebabd39a6c819eda3d76b09c7e34d182ec31c9f7d96fed530cd35feed88891ec61b6fb0d86ba44a07bfe3882e6fb3d9f0e41d48d2a99453789a
-
Filesize
167KB
MD5e80f90724939d4f85fc49de2460b94b5
SHA1512ea4deba1c97cc7ec394bce0e4a32cd497176e
SHA2568041d3ccbafa491d35f70030c3afeba683b0235bed24f242878d04c7e87b8687
SHA5129494f1cd058dc3923e4f562d8ed2edf3d252f519efc6db4f1b5289d8a1b841a6cb927e14d33dab98e0bd4d22a5a473b8cd9424f77213527fbe0c183126356767