Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/10/2023, 10:44

231005-ms1amscc77 7

05/10/2023, 10:38

231005-mplm3scc58 7

05/10/2023, 10:35

231005-mm2lhsae2t 6

Analysis

  • max time kernel
    278s
  • max time network
    284s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/10/2023, 10:38

General

  • Target

    7z2201-x64.msi

  • Size

    1.8MB

  • MD5

    50515f156ae516461e28dd453230d448

  • SHA1

    3209574e09ec235b2613570e6d7d8d5058a64971

  • SHA256

    f4afba646166999d6090b5beddde546450262dc595dddeb62132da70f70d14ca

  • SHA512

    14593ca96d416a2fbb6bbbf8adec51978e6c0fb513882d5442ab5876e28dd79be14ca9dd77acff2d3d329cb7733f7e969e784c57e1f414d00f3c7b9d581638e5

  • SSDEEP

    49152:ynV9R5GSuwYgV4mN4eOYq4Z0APsx/Eho:ynV9Ro/mTlbqC04s/

Score
7/10

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\7z2201-x64.msi
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4048
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Registers COM server for autorun
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4348
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5064
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc
      1⤵
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:3540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e5bd00f.rbs

      Filesize

      20KB

      MD5

      a29b8fccdf0f699373e1f8585168f068

      SHA1

      096730583350ffd20bb8e0223688fa4ac0f163ed

      SHA256

      bf96bb9810e3c46397e552c4f80116863b9f68950ec50d7d392c95ef647218b1

      SHA512

      11f078135d2fe63d189d0751e91c9e41e8eb2cb5364d4a7fcd3693943d6a6b42359b43b44456df6413e64a20298547ec32afa3f58eee6e40a71c8bc6569acc2e

    • C:\Windows\Installer\e5bd00e.msi

      Filesize

      1.8MB

      MD5

      50515f156ae516461e28dd453230d448

      SHA1

      3209574e09ec235b2613570e6d7d8d5058a64971

      SHA256

      f4afba646166999d6090b5beddde546450262dc595dddeb62132da70f70d14ca

      SHA512

      14593ca96d416a2fbb6bbbf8adec51978e6c0fb513882d5442ab5876e28dd79be14ca9dd77acff2d3d329cb7733f7e969e784c57e1f414d00f3c7b9d581638e5

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      25.0MB

      MD5

      208a87f39ab2294e117cbd14860704d9

      SHA1

      ff7a9a5f75c8242ea1b6e1b0bcc62930f244e5d5

      SHA256

      a0c79200b04aed3707017ed3f5ba199bac11465b4a225f31a08d9dca5da6c51f

      SHA512

      71dae9192d06fa2d26e7bacfba181db8b8d0332d50654af290ada33e9d471e1f35491cf9385e0074a551cd1f5823d6a541ae9c3d68365f68454306a20fab90a1

    • \??\Volume{9205b611-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{4eda9d31-344b-4577-af1e-f63e0f87bd2e}_OnDiskSnapshotProp

      Filesize

      5KB

      MD5

      6f0b02189851093b4ed3addd42d40263

      SHA1

      82fa1917f8db813429d05a07fe06df2cdb609a28

      SHA256

      79d0be6f05c40d762f2882e02ff91611e8377bc63dc3b35dbf14005b96705402

      SHA512

      e5e2ddeac338ef46c96b82307ae7b049df336246a906f9dd60cadc06f5214b409c85633868680edca855fa43722c511e2103c0445c29808a1721caa304a23167