Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 01:46

General

  • Target

    7a6b9f54255bb9b541bfe380d908beff.msi

  • Size

    156KB

  • MD5

    7a6b9f54255bb9b541bfe380d908beff

  • SHA1

    6ee8bc85cfb60f081118384c2eeb95743a433ddb

  • SHA256

    e5a0cc7fa478c96aa89a2329a5edd0a31c30dad7c6791a6057b8e4435a5c989a

  • SHA512

    32644d3ceb064cf1e0d5f80b6760c3eef0f9bf7a377b880dff3276786e4713b240e55bf86220f9f272a748b76069037e6ddfd843caf5ab588303669c4ff4b5f5

  • SSDEEP

    384:iHpe4ZvJXK7gzFM7Wu5oXgZs+5BCq26yy3M5BCqPN:Zmxa7gBMyurDCUyWMDC

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\7a6b9f54255bb9b541bfe380d908beff.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4664
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2588
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 51EEE3B98BA6016AB202160D7F91118E
      2⤵
        PID:4300
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:1028

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.0MB

      MD5

      183736d781a0e24c75dd39e4c433c661

      SHA1

      cdeceb9e57969713a706936d1a8e5eecab2a840d

      SHA256

      cb3b5ddbfcd2e79e9bb166aaa7349b60cc3ae4445b0eb6978436bcfdf41680ff

      SHA512

      b1aafd724f7e735aa38ae583eae524968290838e61bdfee5c328a7dbcdfe2f6b274a992b34d515e924a7ae1d536ebe91977143a33851b5e5d10dad16a3ba2d54

    • \??\Volume{6ada6bfc-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{26fef6fb-e582-4a5a-89b5-9391cc6575b5}_OnDiskSnapshotProp

      Filesize

      5KB

      MD5

      62307dc40b4a91eaade9fb220d2a8581

      SHA1

      ea7b974ca84872cd7ed4bc56b928ae5613f58d56

      SHA256

      22ab4fde69e1e0a3f746e4188f0822774e0825a9c09e32c0866ee952d8001955

      SHA512

      2a69a3759aae8fec7703889bf7a1b8b6db757d49052883f9c5b125d6547c86c5c6fa845968f94789b7d3cf07d40d0620965887e7affa29686eee5e104a909cc8