Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2023, 13:46

General

  • Target

    bin/dp/install.msi

  • Size

    1.4MB

  • MD5

    bd4197fcc24ef42031fdd26c749192c5

  • SHA1

    f644b383509892e23641c2336e698205e3b1d692

  • SHA256

    8726518f5783e2d2e02a7d06f2aa49e7e6a3771316d46f95ec0fa7e24f5c2a60

  • SHA512

    06457838ff6055a56d28757884e2929b9ce9f8d88af6a84af3d41a1222f9e2e7f32c427b5944968573e7ff44527453e2853eb6176aacbbc23fc97a8ace86f600

  • SSDEEP

    24576:MvJbwGLXIMzGfo2wCM3fqGge5Po/XKs+WdNESjHzVIaHErPjsgQYXrqGgeR+z:MvyYKo24etBpTHErdhX7+z

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\bin\dp\install.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4276
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3888
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 68D416ED3BA15601CBD38FA813ADD276 C
      2⤵
      • Loads dropped DLL
      PID:1324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI4A23.tmp

    Filesize

    590KB

    MD5

    71fc455bb665aeb834f282dff9301b16

    SHA1

    7296ec0e4a7e96d43e3dfeae0558b2ddd68948f1

    SHA256

    b147f71b1e91d0cbe090e838557b393a6c1f83d1d6e5cb6d4f4665f2a46e3415

    SHA512

    ef8b67d3b0e09b8c246035c1dded6c9acfb35ce9cd25a6561d6752f53b93d6e6b2a859ca509dd923b07d76b9d200a3e588962e61884f119c8897ed05e02da0c0

  • C:\Users\Admin\AppData\Local\Temp\MSI4A23.tmp

    Filesize

    590KB

    MD5

    71fc455bb665aeb834f282dff9301b16

    SHA1

    7296ec0e4a7e96d43e3dfeae0558b2ddd68948f1

    SHA256

    b147f71b1e91d0cbe090e838557b393a6c1f83d1d6e5cb6d4f4665f2a46e3415

    SHA512

    ef8b67d3b0e09b8c246035c1dded6c9acfb35ce9cd25a6561d6752f53b93d6e6b2a859ca509dd923b07d76b9d200a3e588962e61884f119c8897ed05e02da0c0

  • C:\Users\Admin\AppData\Local\Temp\MSI4F16.tmp

    Filesize

    590KB

    MD5

    71fc455bb665aeb834f282dff9301b16

    SHA1

    7296ec0e4a7e96d43e3dfeae0558b2ddd68948f1

    SHA256

    b147f71b1e91d0cbe090e838557b393a6c1f83d1d6e5cb6d4f4665f2a46e3415

    SHA512

    ef8b67d3b0e09b8c246035c1dded6c9acfb35ce9cd25a6561d6752f53b93d6e6b2a859ca509dd923b07d76b9d200a3e588962e61884f119c8897ed05e02da0c0

  • C:\Users\Admin\AppData\Local\Temp\MSI4F16.tmp

    Filesize

    590KB

    MD5

    71fc455bb665aeb834f282dff9301b16

    SHA1

    7296ec0e4a7e96d43e3dfeae0558b2ddd68948f1

    SHA256

    b147f71b1e91d0cbe090e838557b393a6c1f83d1d6e5cb6d4f4665f2a46e3415

    SHA512

    ef8b67d3b0e09b8c246035c1dded6c9acfb35ce9cd25a6561d6752f53b93d6e6b2a859ca509dd923b07d76b9d200a3e588962e61884f119c8897ed05e02da0c0

  • C:\Users\Admin\AppData\Local\Temp\MSI4FC3.tmp

    Filesize

    590KB

    MD5

    71fc455bb665aeb834f282dff9301b16

    SHA1

    7296ec0e4a7e96d43e3dfeae0558b2ddd68948f1

    SHA256

    b147f71b1e91d0cbe090e838557b393a6c1f83d1d6e5cb6d4f4665f2a46e3415

    SHA512

    ef8b67d3b0e09b8c246035c1dded6c9acfb35ce9cd25a6561d6752f53b93d6e6b2a859ca509dd923b07d76b9d200a3e588962e61884f119c8897ed05e02da0c0

  • C:\Users\Admin\AppData\Local\Temp\MSI4FC3.tmp

    Filesize

    590KB

    MD5

    71fc455bb665aeb834f282dff9301b16

    SHA1

    7296ec0e4a7e96d43e3dfeae0558b2ddd68948f1

    SHA256

    b147f71b1e91d0cbe090e838557b393a6c1f83d1d6e5cb6d4f4665f2a46e3415

    SHA512

    ef8b67d3b0e09b8c246035c1dded6c9acfb35ce9cd25a6561d6752f53b93d6e6b2a859ca509dd923b07d76b9d200a3e588962e61884f119c8897ed05e02da0c0

  • C:\Users\Admin\AppData\Local\Temp\MSI4FC3.tmp

    Filesize

    590KB

    MD5

    71fc455bb665aeb834f282dff9301b16

    SHA1

    7296ec0e4a7e96d43e3dfeae0558b2ddd68948f1

    SHA256

    b147f71b1e91d0cbe090e838557b393a6c1f83d1d6e5cb6d4f4665f2a46e3415

    SHA512

    ef8b67d3b0e09b8c246035c1dded6c9acfb35ce9cd25a6561d6752f53b93d6e6b2a859ca509dd923b07d76b9d200a3e588962e61884f119c8897ed05e02da0c0

  • C:\Users\Admin\AppData\Local\Temp\MSI5012.tmp

    Filesize

    590KB

    MD5

    71fc455bb665aeb834f282dff9301b16

    SHA1

    7296ec0e4a7e96d43e3dfeae0558b2ddd68948f1

    SHA256

    b147f71b1e91d0cbe090e838557b393a6c1f83d1d6e5cb6d4f4665f2a46e3415

    SHA512

    ef8b67d3b0e09b8c246035c1dded6c9acfb35ce9cd25a6561d6752f53b93d6e6b2a859ca509dd923b07d76b9d200a3e588962e61884f119c8897ed05e02da0c0

  • C:\Users\Admin\AppData\Local\Temp\MSI5012.tmp

    Filesize

    590KB

    MD5

    71fc455bb665aeb834f282dff9301b16

    SHA1

    7296ec0e4a7e96d43e3dfeae0558b2ddd68948f1

    SHA256

    b147f71b1e91d0cbe090e838557b393a6c1f83d1d6e5cb6d4f4665f2a46e3415

    SHA512

    ef8b67d3b0e09b8c246035c1dded6c9acfb35ce9cd25a6561d6752f53b93d6e6b2a859ca509dd923b07d76b9d200a3e588962e61884f119c8897ed05e02da0c0