Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    113s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2023, 13:52

General

  • Target

    vcredist_x86.exe

  • Size

    2.6MB

  • MD5

    1f8e9fec647700b21d45e6cda97c39b7

  • SHA1

    037288ee51553f84498ae4873c357d367d1a3667

  • SHA256

    9c110c0426f4e75f4384a527f0abe2232fe71f2968eb91278b16b200537d3161

  • SHA512

    42f6ca3456951f3e85024444e513f424add6eda9f4807bf84c91dc8ccb623be6a8e83dc40a8b6a1bc2c6fd080f2c51b719ead1422e9d1c1079795ec70953a1ad

  • SSDEEP

    49152:IJFEcHcHfnIpvSUxuB4vkjfCSfil3ObWcrJhxSkm6Fo4Ea0g/I2Pz7citcU7tmLq:S2c8gfd87CQgu9xNpW4t/Ic7csd7t0q

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 57 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\vcredist_x86.exe
    "C:\Users\Admin\AppData\Local\Temp\vcredist_x86.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec /i vcredist.msi
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4448
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2036
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding FE7649C626450D00D2C56BB3161BF3A8
        2⤵
        • Loads dropped DLL
        PID:2568
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4428

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e591f59.rbs

      Filesize

      50KB

      MD5

      e621e9da038213a897020dca4185d4e4

      SHA1

      f16e7595b1db7eff3b146272dd57aabd58d2420f

      SHA256

      b75158519b951257dece6558e32d01c0bcfd37258c3055d6c3683233592095c6

      SHA512

      a08e6082630880d602e64a3e0266ddff32bc9baa8100a40fee1fec46916fb3b38db061eb19b4ec9fe249adaa5d17a85ed38f3c7ddad1bd0bbe9b3f0c9f80a29c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredis1.cab

      Filesize

      247KB

      MD5

      aa85aa3738acfe30e197d9dfd5c3428d

      SHA1

      7f3ee53bd967265afe32b31d75b4f6c47363654a

      SHA256

      af3560ef0c55c7e4eff2170c63e7860498b5830e405a3841f96c91601e62e108

      SHA512

      e1bf248d6425f6ba91bf0a1f3d364321b09477af9be2f31f8bf6d92defbaddfbab8f3e6284262742378f1f87d60d06eee3b98fb081e60f9fb6f19c1797489861

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist.msi

      Filesize

      2.7MB

      MD5

      dc1ab7ce3b89fc7cac369d8b246cdafe

      SHA1

      c9a2d5a312f770189c4b65cb500905e4773c14ad

      SHA256

      dde77dd3473d3d07c459f17cd267f96f19264f976f2fcc85b4bbbecf26487560

      SHA512

      e554b8b36a7a853d4e6efb4e6faf2d784f41e8d26edafbb1689a944bf0a7a4b58258d820a3fada1496b8c8d295d8771fc713b29127d54a3fbc317659b7565cbe

    • C:\Windows\Installer\MSI235D.tmp

      Filesize

      28KB

      MD5

      85221b3bcba8dbe4b4a46581aa49f760

      SHA1

      746645c92594bfc739f77812d67cfd85f4b92474

      SHA256

      f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f

      SHA512

      060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d

    • C:\Windows\Installer\MSI235D.tmp

      Filesize

      28KB

      MD5

      85221b3bcba8dbe4b4a46581aa49f760

      SHA1

      746645c92594bfc739f77812d67cfd85f4b92474

      SHA256

      f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f

      SHA512

      060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d

    • C:\Windows\Installer\e591f56.msi

      Filesize

      2.7MB

      MD5

      dc1ab7ce3b89fc7cac369d8b246cdafe

      SHA1

      c9a2d5a312f770189c4b65cb500905e4773c14ad

      SHA256

      dde77dd3473d3d07c459f17cd267f96f19264f976f2fcc85b4bbbecf26487560

      SHA512

      e554b8b36a7a853d4e6efb4e6faf2d784f41e8d26edafbb1689a944bf0a7a4b58258d820a3fada1496b8c8d295d8771fc713b29127d54a3fbc317659b7565cbe

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.0MB

      MD5

      ac813838275a8125fa95d4385baa3e99

      SHA1

      f6d6f5d1f32d9270281ce514e7f4db98105155d5

      SHA256

      c830191de5a30da45101c4d56974e4e4c70ccba7fbf4e024d717e609ad333796

      SHA512

      a325920c9ce368d5e0e830ddef4cba77d6523ba7a57c8d05e1b87e475868f4137b3a0651823fc3d5673a0035e1869bc25d14512be92b56b88bb6980b9010ffc7

    • \??\Volume{fd77526f-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{614fee79-9d7b-4ecd-a326-052587afb3f0}_OnDiskSnapshotProp

      Filesize

      5KB

      MD5

      e317580e02861ae4550aaa1b86d3fcc4

      SHA1

      9155e72737966750568f6c5101d9f633a20690ad

      SHA256

      674344ff0ea3a1c1a304f1de12a295dfcf065c324f3c0fe5bad5f9f55748dfb7

      SHA512

      dd6f9c364c814105c9a6f9995782dd57a12f9a159e13ca0ec4bb4d2c2fa60391e40dfd9bc032ec01d3d6bbd0d3ea664cf1973e06263cae46b0a5ddc77373a374