Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

29/12/2023, 08:01

231229-jw3ndsgah2 7

29/12/2023, 07:56

231229-jsp8wscgfm 7

Analysis

  • max time kernel
    423s
  • max time network
    459s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 08:01

General

  • Target

    setup.exe

  • Size

    964KB

  • MD5

    d6b7eb2d91821193541e290ec91d7b34

  • SHA1

    0b59231cadf2f168b6f13e37de8b616de5be0527

  • SHA256

    73b291823bcc151e63191b8f7e9ae0990764b8567ae2a98e6cbb2f46c6a46780

  • SHA512

    90c3bb968cbbcd082d4d4abb8dceed41eb8f64d29bc829e0f6c9b3b67ad856c24620cb30acc9c791c84376eed8d6f257c45859099d4226081df931538a58c29e

  • SSDEEP

    24576:1gPE9E45lYqV6d+4oscKQg2tTLe4aQWJE:SL4cqodaKBYT6ZZC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 31 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 12 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Users\Admin\AppData\Local\Temp\{FE83935B-DD66-4ABC-BCBD-DB0EBB4C984D}\ISBEW64.exe
      C:\Users\Admin\AppData\Local\Temp\{FE83935B-DD66-4ABC-BCBD-DB0EBB4C984D}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{52A1E32F-7FEE-480D-B82B-A2692C60CFCF}
      2⤵
      • Executes dropped EXE
      PID:1644
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C cacls "F:\Applied Biosystems\StepOne Software v2.3\" /T /E /C /G "Power Users":F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:528
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C cacls "F:\Applied Biosystems\StepOne Software v2.3\" /T /E /C /G Users:F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1516
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DF827B449BD58333962CBF44C290BE8C C
      2⤵
      • Loads dropped DLL
      PID:1072
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 096193E437FD208CFBB8BAC9165CF5D4
      2⤵
      • Loads dropped DLL
      PID:4716
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding BC4C2AD8D776A6FDE4599C32CB7C34D5 E Global\MSI0000
      2⤵
      • Loads dropped DLL
      PID:1172
    • C:\Windows\syswow64\MsiExec.exe
      "C:\Windows\syswow64\MsiExec.exe" /Y "F:\Applied Biosystems\StepOne Software v2.3\bonjour\mdnsNSP.dll"
      2⤵
      • Loads dropped DLL
      PID:3780
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    PID:3068
  • C:\Windows\system32\srtasks.exe
    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
    1⤵
      PID:1380
    • F:\Applied Biosystems\StepOne Software v2.3\bonjour\mDNSResponder.exe
      "F:\Applied Biosystems\StepOne Software v2.3\bonjour\mDNSResponder.exe"
      1⤵
      • Executes dropped EXE
      PID:2144
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4564
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
          PID:2156
        • C:\Windows\SysWOW64\cacls.exe
          cacls "F:\Applied Biosystems\StepOne Software v2.3\" /T /E /C /G "Power Users":F
          1⤵
            PID:1312
          • C:\Windows\SysWOW64\cacls.exe
            cacls "F:\Applied Biosystems\StepOne Software v2.3\" /T /E /C /G Users:F
            1⤵
            • Enumerates connected drives
            PID:4976
          • F:\Applied Biosystems\StepOne Software v2.3\bin\stepone.exe
            "F:\Applied Biosystems\StepOne Software v2.3\bin\stepone.exe"
            1⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1660
            • F:\Applied Biosystems\StepOne Software v2.3\jre\bin\javaw.exe
              "F:/Applied Biosystems/StepOne Software v2.3/jre/bin/javaw.exe" "-Dosgi.configuration.area=F:/Applied Biosystems/StepOne Software v2.3/config/eclipse" "-Ddata=F:/Applied Biosystems/StepOne Software v2.3/config/eclipse/workspace" -Dcom.apldbio.core.security.db.DataSource=DerbyDataSource "-Dderby.system.home=F:/Applied Biosystems/StepOne Software v2.3" "-Dhome=F:/Applied Biosystems/StepOne Software v2.3" -Dswing.aatext=true -Duser.language=en -Duser.country=US -Dlogin=true -Xms128m -Xmx512m "-Xbootclasspath/p:F:/Applied Biosystems/StepOne Software v2.3/eclipse/plugins/com.apldbio.sds.platform_2.1.0/lib/jai_imageio.jar" -jar "F:\Applied Biosystems\StepOne Software v2.3\bin\..\eclipse\startup.jar" -os -ws -arch -launcher "F:\Applied Biosystems\StepOne Software v2.3\bin\stepone.exe" -name Stepone -showsplash 600 -exitdata 67c_24c -vm "F:/Applied Biosystems/StepOne Software v2.3/jre/bin/javaw.exe" -vmargs "-Dosgi.configuration.area=F:/Applied Biosystems/StepOne Software v2.3/config/eclipse" "-Ddata=F:/Applied Biosystems/StepOne Software v2.3/config/eclipse/workspace" -Dcom.apldbio.core.security.db.DataSource=DerbyDataSource "-Dderby.system.home=F:/Applied Biosystems/StepOne Software v2.3" "-Dhome=F:/Applied Biosystems/StepOne Software v2.3" -Dswing.aatext=true -Duser.language=en -Duser.country=US -Dlogin=true -Xms128m -Xmx512m "-Xbootclasspath/p:F:/Applied Biosystems/StepOne Software v2.3/eclipse/plugins/com.apldbio.sds.platform_2.1.0/lib/jai_imageio.jar" -jar "F:\Applied Biosystems\StepOne Software v2.3\bin\..\eclipse\startup.jar"
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:4424

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\{FE83935B-DD66-4ABC-BCBD-DB0EBB4C984D}\LICENSE-StepOne.rtf

            Filesize

            45KB

            MD5

            14eb4237a5677e627a1483d8071d873e

            SHA1

            2e6607aa57b03813324bedb2aaf9434f32965cc0

            SHA256

            8b1285006cbc901fd4ef4a02663a950ad5e04ea3c50f96d24062bdd1965652d4

            SHA512

            a2f4e66845dbb2d8db33c853f14f0cd56eb272116f7a6e47a43e6cbe232688d69dbf2a5ec1e2d6f1d4f2f0c00ace29d43731c2a2d8703e69c1a95506d4f4ea05

          • C:\Users\Admin\AppData\Local\Temp\{FE83935B-DD66-4ABC-BCBD-DB0EBB4C984D}\logo.bmp

            Filesize

            27KB

            MD5

            57ee4ba8a3ab571ca7dfb83faac78d68

            SHA1

            d6498c83795ad0298be8346fe1abda5e359d9c61

            SHA256

            aca60f071aa92daa3ac884c92cb62d9135b9b4ae5696a12982e7f67a5fdc65b7

            SHA512

            eb99c082d13b34da942ad9e37b411a1e7222c0e5e24858bda0d62ba607d282dcd514e29c116bf6f0b3ffed6827021d6697381b3dacfbe241bfe57290826521a2

          • C:\Windows\Installer\MSIED58.tmp

            Filesize

            76KB

            MD5

            57ef661a186462b93026dadd2ef04ebe

            SHA1

            9680cb708c3b06612c7c6d9ca278ce79f1bc2184

            SHA256

            c3b2b0241891d166b5966d1dabfb51676e860f8f113819f0631b2a6f0bc51ad6

            SHA512

            1c2c3d585ac7612835a4473f898d72b24a9565c7ea35c9bb7ca9854939439d4da926ad5b70bbf59e590b0462833f1090410556e2e9ced6a2d4ccceead1349918

          • C:\Windows\Installer\MSIF1CF.tmp

            Filesize

            141KB

            MD5

            5dd01bcb406df249cd3094fa93e97f1c

            SHA1

            68b9d106d36fea4703ef08e49f507abfad5a39dc

            SHA256

            5545e839f506700e8f7aa9b177200e8fcbc28665b9f418c59ba7e10f3878adc3

            SHA512

            6d4f9621713493ab4408c452d558137bec89ef927878ac67d2f07ad9fd7f299afabc4507ed9fcb029a5a0011e7c0c6b38e453432be09d8269626213c9059ef1c

          • F:\Applied Biosystems\StepOne Software v2.3\bin\stepone.exe

            Filesize

            96KB

            MD5

            56a3ca88af1fe2835b898b9588c34a41

            SHA1

            ce12dde9b6ae16f63a2ad1bd5e8b3cc95831ce0e

            SHA256

            f1fdc02da0ccd3be626a5c4ff5e6e91b865126a35c8fb5a1b0c9b4cc33bf7b13

            SHA512

            877a2025c76f8d083e5fe60cb686b8b74990a11f4b78e1136cea70a7dc719ca7568fcdcb8dab0509903e58eb120f1e9919874d03cd220f67b7df7d78b2f3c0ed

          • F:\Applied Biosystems\StepOne Software v2.3\bin\stepone.ini

            Filesize

            640B

            MD5

            62702e54894d85ff473f097053a59132

            SHA1

            bf8dbc7784919d8e3ae39ecdcae18817c4118d3f

            SHA256

            7a3916ecaf756e349a45459ac6e1f59bb32257e3b3224003edee4de29e799daa

            SHA512

            53f1e5febe433f6b9f515d41cc88b9c32f5df69326aa454eb5f83d45f7da464daa2ed898f2a082441613e89e4d009ab2c227a6d7856dd024fbbc6ab892958755

          • F:\Applied Biosystems\StepOne Software v2.3\data\seg0\c2a1.dat

            Filesize

            8KB

            MD5

            6143c5c570587f4a313db0e19eb6af06

            SHA1

            edb04b496af505acca21f34340a1e3c26e0d7c0a

            SHA256

            67bf392b14cc7b4f10bab746609a08e8164bb961e9bf48a29f9a3e7ff2ef28cb

            SHA512

            1dfe7996b59ad4941bcbac3d19f8b03443d561e760dd0642e2fdb116a88ba813a51fe964bf22ede3361716e9144b84ae6a324a9e8c39a667b48f81b9bf97d55d

          • F:\Applied Biosystems\StepOne Software v2.3\data\seg0\c2d0.dat

            Filesize

            8KB

            MD5

            0efc06bf0cbede5cab1dc263e0519014

            SHA1

            6d94df57dd67644e1a1679f720a65cee2ed5bde7

            SHA256

            cb9790d486eb70a5dfe9f479af6d4a8f32c8c4866135faf30cd48b4bf4460fbb

            SHA512

            aa08f79062d4162f454b4bb31ef36a7a1312842fc530dd31d2f34e02d4cb951b4e620ea8c27267acdc6de019166ed82816a372dbc1cd89b838650f58bdb30c21

          • F:\Applied Biosystems\StepOne Software v2.3\data\seg0\c4a0.dat

            Filesize

            8KB

            MD5

            07f06d46846c7f132e0148dc771a5afe

            SHA1

            9f5e1da1a033750c2a66dc459a169fd195f4ae2b

            SHA256

            471cdb1c68a104fd128e9c8b76198d7cc147b40a3f3e4a508c5810f62db8fcbf

            SHA512

            4e4875d7c651b674a1f82f493ee4b34b93b6a07538e4874c67ab1a2d0dd19de053e270ed4b642a7fbbbec9b9c65000179ea55aaa126c724359e28531abdde777

          • F:\Applied Biosystems\StepOne Software v2.3\eclipse\plugins\com.apldbio.sds.experiment.calibration.aztec_2.1.0\config\sds7300-calib-puredye-96-SYBR.eds

            Filesize

            13KB

            MD5

            00f46b0804aca3f1fa2eabe881e8451f

            SHA1

            8c25d03a1ca86465e331be1b7d30a7e255214018

            SHA256

            029dda10f884c2c693bcc560526f03db64bdba062031b84875dc4d56bcc55caf

            SHA512

            9db01f12b49105eeab6e119640a1fb8cdcbcd7feb4bbd57ed6e97a92bc7e5e3fddab11b3a22bce3e20bb8a7bd986bdec6288c4024eaf24def230d8d071ce0419

          • F:\Applied Biosystems\StepOne Software v2.3\jre\lib\zi\Etc\UTC

            Filesize

            27B

            MD5

            7da9aa0de33b521b3399a4ffd4078bdb

            SHA1

            f188a712f77103d544d4acf91d13dbc664c67034

            SHA256

            0a526439ed04845ce94f7e9ae55c689ad01e1493f3b30c5c2b434a31fa33a43d

            SHA512

            9d2170571a58aed23f29fc465c2b14db3511e88907e017c010d452ecdf7a77299020d71f8b621a86e94dd2774a5418612d381e39335f92e287a4f451ee90cfb6

          • memory/2920-120-0x00000000063E0000-0x0000000006481000-memory.dmp

            Filesize

            644KB

          • memory/2920-115-0x00000000063E0000-0x0000000006481000-memory.dmp

            Filesize

            644KB

          • memory/2920-128-0x00000000063E0000-0x0000000006481000-memory.dmp

            Filesize

            644KB

          • memory/2920-121-0x0000000010000000-0x00000000101B4000-memory.dmp

            Filesize

            1.7MB

          • memory/2920-82-0x0000000010000000-0x00000000101B4000-memory.dmp

            Filesize

            1.7MB

          • memory/2920-1363-0x0000000010000000-0x00000000101B4000-memory.dmp

            Filesize

            1.7MB

          • memory/2920-117-0x00000000063E0000-0x0000000006481000-memory.dmp

            Filesize

            644KB

          • memory/2920-127-0x0000000010000000-0x00000000101B4000-memory.dmp

            Filesize

            1.7MB

          • memory/2920-66-0x00000000063E0000-0x0000000006481000-memory.dmp

            Filesize

            644KB

          • memory/2920-1-0x00000000022C0000-0x00000000022C2000-memory.dmp

            Filesize

            8KB

          • memory/2920-72-0x00000000064B0000-0x0000000006539000-memory.dmp

            Filesize

            548KB

          • memory/2920-67-0x0000000004570000-0x0000000004572000-memory.dmp

            Filesize

            8KB

          • memory/2920-0-0x0000000010000000-0x00000000101B4000-memory.dmp

            Filesize

            1.7MB

          • memory/2920-1989-0x00000000063E0000-0x0000000006481000-memory.dmp

            Filesize

            644KB

          • memory/2920-1988-0x0000000010000000-0x00000000101B4000-memory.dmp

            Filesize

            1.7MB

          • memory/2920-83-0x00000000063E0000-0x0000000006481000-memory.dmp

            Filesize

            644KB

          • memory/4424-2100-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2106-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2114-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2118-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2122-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2128-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2132-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2138-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2145-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2165-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2214-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2228-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2233-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2237-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2240-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2244-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2247-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2252-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2260-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2269-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2274-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2277-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2281-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2285-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2289-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2293-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2296-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2300-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2305-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2308-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB

          • memory/4424-2312-0x0000000002280000-0x0000000004280000-memory.dmp

            Filesize

            32.0MB