Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
186s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741.exe
Resource
win10v2004-20231215-en
General
-
Target
c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741.exe
-
Size
11.7MB
-
MD5
855fea526f0bb5ef1f043a3e63d70b8f
-
SHA1
f62b22214d1cdcd97c9284ef8aaba203707aa976
-
SHA256
c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741
-
SHA512
9806af6623eda6df15afa8b616240075c6400e46c44d681a97b0aacbc1a852179166003d6fcf39bc0fdda2ff140eabb11f94839db518ade008b61a41ef6d07e6
-
SSDEEP
196608:EAPGOkvo7CA8wikC4DddU1KTsUQEZ4O/6rJpqjUEBzrWdFwE0QbmO:EAEvoOA8xIddU0TsXESO/6rJKUmMFRxf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1428 SETUP.EXE 3944 OSE.EXE -
Loads dropped DLL 4 IoCs
pid Process 4668 MsiExec.exe 4668 MsiExec.exe 4668 MsiExec.exe 4668 MsiExec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: msiexec.exe -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 SETUP.EXE Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities SETUP.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 220 msiexec.exe Token: SeIncreaseQuotaPrivilege 220 msiexec.exe Token: SeSecurityPrivilege 3012 msiexec.exe Token: SeCreateTokenPrivilege 220 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 220 msiexec.exe Token: SeLockMemoryPrivilege 220 msiexec.exe Token: SeIncreaseQuotaPrivilege 220 msiexec.exe Token: SeMachineAccountPrivilege 220 msiexec.exe Token: SeTcbPrivilege 220 msiexec.exe Token: SeSecurityPrivilege 220 msiexec.exe Token: SeTakeOwnershipPrivilege 220 msiexec.exe Token: SeLoadDriverPrivilege 220 msiexec.exe Token: SeSystemProfilePrivilege 220 msiexec.exe Token: SeSystemtimePrivilege 220 msiexec.exe Token: SeProfSingleProcessPrivilege 220 msiexec.exe Token: SeIncBasePriorityPrivilege 220 msiexec.exe Token: SeCreatePagefilePrivilege 220 msiexec.exe Token: SeCreatePermanentPrivilege 220 msiexec.exe Token: SeBackupPrivilege 220 msiexec.exe Token: SeRestorePrivilege 220 msiexec.exe Token: SeShutdownPrivilege 220 msiexec.exe Token: SeDebugPrivilege 220 msiexec.exe Token: SeAuditPrivilege 220 msiexec.exe Token: SeSystemEnvironmentPrivilege 220 msiexec.exe Token: SeChangeNotifyPrivilege 220 msiexec.exe Token: SeRemoteShutdownPrivilege 220 msiexec.exe Token: SeUndockPrivilege 220 msiexec.exe Token: SeSyncAgentPrivilege 220 msiexec.exe Token: SeEnableDelegationPrivilege 220 msiexec.exe Token: SeManageVolumePrivilege 220 msiexec.exe Token: SeImpersonatePrivilege 220 msiexec.exe Token: SeCreateGlobalPrivilege 220 msiexec.exe Token: SeCreateTokenPrivilege 220 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 220 msiexec.exe Token: SeLockMemoryPrivilege 220 msiexec.exe Token: SeIncreaseQuotaPrivilege 220 msiexec.exe Token: SeMachineAccountPrivilege 220 msiexec.exe Token: SeTcbPrivilege 220 msiexec.exe Token: SeSecurityPrivilege 220 msiexec.exe Token: SeTakeOwnershipPrivilege 220 msiexec.exe Token: SeLoadDriverPrivilege 220 msiexec.exe Token: SeSystemProfilePrivilege 220 msiexec.exe Token: SeSystemtimePrivilege 220 msiexec.exe Token: SeProfSingleProcessPrivilege 220 msiexec.exe Token: SeIncBasePriorityPrivilege 220 msiexec.exe Token: SeCreatePagefilePrivilege 220 msiexec.exe Token: SeCreatePermanentPrivilege 220 msiexec.exe Token: SeBackupPrivilege 220 msiexec.exe Token: SeRestorePrivilege 220 msiexec.exe Token: SeShutdownPrivilege 220 msiexec.exe Token: SeDebugPrivilege 220 msiexec.exe Token: SeAuditPrivilege 220 msiexec.exe Token: SeSystemEnvironmentPrivilege 220 msiexec.exe Token: SeChangeNotifyPrivilege 220 msiexec.exe Token: SeRemoteShutdownPrivilege 220 msiexec.exe Token: SeUndockPrivilege 220 msiexec.exe Token: SeSyncAgentPrivilege 220 msiexec.exe Token: SeEnableDelegationPrivilege 220 msiexec.exe Token: SeManageVolumePrivilege 220 msiexec.exe Token: SeImpersonatePrivilege 220 msiexec.exe Token: SeCreateGlobalPrivilege 220 msiexec.exe Token: SeCreateTokenPrivilege 220 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 220 msiexec.exe Token: SeLockMemoryPrivilege 220 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 220 msiexec.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4380 wrote to memory of 1428 4380 c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741.exe 92 PID 4380 wrote to memory of 1428 4380 c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741.exe 92 PID 4380 wrote to memory of 1428 4380 c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741.exe 92 PID 1428 wrote to memory of 3944 1428 SETUP.EXE 93 PID 1428 wrote to memory of 3944 1428 SETUP.EXE 93 PID 1428 wrote to memory of 3944 1428 SETUP.EXE 93 PID 1428 wrote to memory of 220 1428 SETUP.EXE 94 PID 1428 wrote to memory of 220 1428 SETUP.EXE 94 PID 1428 wrote to memory of 220 1428 SETUP.EXE 94 PID 3012 wrote to memory of 4668 3012 msiexec.exe 97 PID 3012 wrote to memory of 4668 3012 msiexec.exe 97 PID 3012 wrote to memory of 4668 3012 msiexec.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741.exe"C:\Users\Admin\AppData\Local\Temp\c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE /iexpress CDCACHE=22⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OSE.EXE"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OSE.EXE" -standalone3⤵
- Executes dropped EXE
PID:3944
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /I "C:\MSOCache\All Users\90850409-6000-11D3-8CFE-0150048383C9\WORDVIEW.MSI" CDCACHE=2 LAUNCHEDFROMSETUP=1 SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ SETUPEXENAME=SETUP.EXE /lpiwaeo "C:\Users\Admin\AppData\Local\Temp\Microsoft Office Word Viewer 2003 Setup(0001)_Task(0001).txt" STANDALONEOSE="C:\MSOCache\All Users\90850409-6000-11D3-8CFE-0150048383C9\FILES\SETUP\OSE.EXE" CDCACHE="2" DELETABLECACHE="1" LOCALCACHEDRIVE="C" DWSETUPLOGFILE="C:\Users\Admin\AppData\Local\Temp\Microsoft Office Word Viewer 2003 Setup(0001).txt" DWMSILOGFILE="C:\Users\Admin\AppData\Local\Temp\Microsoft Office Word Viewer 2003 Setup(0001)_Task(0001).txt"3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:220
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8859A243D4902C5259F46DCECB61DA69 C2⤵
- Loads dropped DLL
PID:4668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5b21e9b2474b81dd8b0818a90f4dd80cc
SHA1e58c9cb49d6a56dc9bd73334fe1e70660175a80b
SHA256a972bce2fdf642c13a154a011c9c746d6054af0056d443238c45aa0d3810b932
SHA5121403527f16233ed2ed151dd636997501951e59c0409dc4125edec7fcd4c69707d1c0bc9615d7fd44512856e2fc343ff735bc5694e6c5903dfedc81d94acdce37
-
Filesize
87KB
MD57a56cf3e3f12e8af599963b16f50fb6a
SHA1170290115fa1dec1b2e6f43c59996d442857db1b
SHA256882c82bae96d263138d4c0d6c425458b770b7b9c8e9c1d28ac918bf6be94a5c2
SHA512c726c2c85230defffb7936476b4b3623cec817452033ea50f1739fa3494358e0bc8d6e160205d97c8e34225fab730fb1927592d42954a5c4051d30c5b9e24509
-
Filesize
83KB
MD583b264f335508ca11403ebdd06fdc3f7
SHA1f3f2132b3731c890eadd02093d9d1cc86a11fc80
SHA256638cf03492a0ee64529202a419e334319af02604a4fa0bd3867a3686ae95ed62
SHA512136e2d37428e7d357529370ee155e609b5f2704582ce2623f4f34c6b038eb8674b113b5e48b1ece19fa624b3820d5f0e453071978a0c9f636ca39eae2ce3fc83
-
Filesize
119KB
MD5bd1d05b05f3acb12030b7ffa011cdf89
SHA133c1b812f41874514752026c8579c77ebb4955a2
SHA2565c683a6e0fc14122d5c7af561cfdedbb0144eb0b336f51ad4f3e71249292166e
SHA512c7b8de9be15a3047fcf5dde5d6d901ebb80645ce3f4ed346b8342ea161e762e59048afcb2d099265b63c43e403115800eb3ae240ed9697566f9d470b6343e33e
-
Filesize
98KB
MD5ebe0b6bb66d0b762bd4a412d3b7e1e4c
SHA193e0b3f13da534ad539da89dce62dd2ac93ecf28
SHA25651e6e0905cd5fae902d54b66ad0d0bcc3adf0c817b12a41c40e886d70e682724
SHA5129209ac658aeca1d9eb34a496423013125f8e724499f31bf9ab87bcf28bbac358693c6788f4619501dc925c9f83a739fcc11a3cf3dab578ca3b869b5482358e24
-
Filesize
2KB
MD5dcfee47159801fc52071063e032c82d2
SHA184225713db71c02c00abf1cbc956e3af91e414c7
SHA256c38d913c8b375d4446b6b47d68862e4c9096c473c8313e723a3e1c54f3de07ba
SHA512d015d41d5b63d28dd8804d8affaa9a528e24cd426ec78d7e919b9c112f07a152e64e7b5e26e87dd06567a9b07c9204687f8e3aef39d2f34afea4ccbc3a5bbe49
-
Filesize
124KB
MD5ffbfc229dd9c9b55fa691a328ebd46cd
SHA15ff40ef1acff8c9ac0d9b0ad7aa25ab7cccc5eb4
SHA25622dcee0693b488284e0bfe66fafccf53347d6a0186132cf16d80a2a88e5e37ad
SHA512395e94e24d940ec6c52e32b7b13a5d5bc46f0bc8d5b23d2fa3616307a2ab18628115f61b98721c9da245b3a9ddb536a25899dd72bef2ec0d27f8918bbc43ffaa
-
Filesize
1KB
MD576cf0f27ff521b1b1a1134e81c9c0525
SHA1c1099faf9fbe6c476cc577cae52e22b690593384
SHA2566650a77187fe8dc9dad4ccbab5c66d40c2be6685f8a0b12248ac5febd56cd4b8
SHA512745affb1cd92349ef18d7f57af397fec7d2d11e84b2369c7eeeed1538b2cf88c797e52df363ed821c734002f47b784702adaebd01abe046052d5c04d0f48015f
-
Filesize
41KB
MD578619a8eb29c04b1e7d2a00d5569470a
SHA1739c8a44a58941e45d05f773ede23d30b3398f1a
SHA256d9c00796c8cc99449ba7289120e9d0bcad92d14f4ff0eef81246f4175f6ddd04
SHA512c7c08bf46083d0b384839ec1cfd12cd9339ded2238895d7d2017a914cd79dd2e769af2d928940ddf93fd7b96f8efb1ec9b25c802ca3832bcbf9cb3682e4e0d18
-
Filesize
4KB
MD52d2e15122db1d14043667b331fcfcb5a
SHA18bf878376ac0bf7ad817d9802fa3f82015c31054
SHA256074f958e455d921b1e121b9f851e0c14bfde9146333caf1ab9ad9c43bba00abf
SHA51215fabf740f4724b307e1d19ee43c29a5f082d39ea310d493a2c1e89ce55ad2c00d4161395644c532d4850a38873e1849bfc42d3f80e767d10bc2676a60bab9d1
-
Filesize
32KB
MD514ef0fc13183125dc4e41a98327f1f6f
SHA1498240a17811015f53391fa4ca45a5d81d09f32b
SHA2561473c63fc30269245a75963419f4cc6184c7ce6188615d4c87fdbd5c3436ef81
SHA512efdae5f42e6b63a56101ca86d6b59a953aec4d432a6e2de1c0e7d7225756a69da8e7d321c5f433ba645bd55053e630af3b136f573878c69e1bab1074c029af6a
-
Filesize
50KB
MD515ff1a5dc8a1dbb9bc0744f8ba134bcb
SHA147e5f57cfab6ef416f946f5368f1e6a6064a59a4
SHA256d2bdd09a4776ec8ace854a0ff962d3799c6e450ac5b5b24a1fc3414c2f843a3c
SHA5127a51946b5ef9a24ecf0aa32174261390b9edbf3e82d1e9b440860b271d557a7c95ae6b80a67c5cb96d2e244db6881a4217085a768e402537acfbd90115452f5b
-
Filesize
47KB
MD561147cf5709fa8e6425f608e8bb8db8e
SHA1165a7aa36c1139dc79d995b3dbcea65bf7c41289
SHA256e6390512165ca56493f1815f0e104378622e4e2227847208d0463e84c4a34c22
SHA5124a107b6dace9c451f2f6bb2c6468e3434b0922a94d1e3e6e37a1cd6349d9151d40d43bcc7087f206351440082b53e0c4d3872d3c623ea7d12f8ab0fe3c3b959e
-
Filesize
7KB
MD5d9bbea56e7ae0e9f76c310024d2019c3
SHA12cf05966c9ea01ef78a85c7fd6d14bd6e6130020
SHA2569c58399dbf92eecb2745e3ee04d10b61b3c189126cc4daa5f456752dbf9f43d0
SHA5127b4fda74105419ef9bf1b785d906ac19986dd414ab2482b24b638853b35fb1443a2d8f1d73f8979fa4f97d7fbf73f40bc946a0905f660e2f696b11e3dc1c3936
-
Filesize
42KB
MD51829bda6317f1d3bac01f4cf7e86e022
SHA1543348751998e49f9559f068c45e22a521d4a4a5
SHA256e907af04d64fd5c120a14df92f4405c2a23a127e2a9674b13870d0076686196a
SHA5126752d44e12bd6accf04d424fa17be78869975c8756b8c68bb80bcab430a85115ce1beb6936dafddc92c6f62f7940b4857ff5d802a41f7f5207dc4f3b48aa1bc2
-
Filesize
11KB
MD5b099830c967cec1138da675888641662
SHA1af97fb07c7ea47e81222208ddcd675e77b970414
SHA256bbf3794e7419c7503146ae93146c3f0b13b3dcbaf427af879c5c9d457dfa0a9b
SHA5124f1e84d94cd2a94b29ff0ffbce56dd466cd6b7a149a51d113abd76f74f0655aad4b06b86179dcae145eb3b493b8b286f4139a852d0f9f54e4c3970a902633b9c
-
Filesize
2KB
MD502283481f3437b9c76105321cf720e4b
SHA1de2f9e2aac43f238fb843856cadd552ada220365
SHA2566f7e09060756b3b5d4f0fd08e8e60d3be9a510d495033a7c8b763e7116668913
SHA512d17583f5f18da078aa2cfee567c01f14704f973d50c4c6aa0b7495a313c2cc34078f213191d91a0a12d6295f280ccc8bfb590cffb08a05942db629247ec58122
-
Filesize
3KB
MD589e744c56eeca395e236917ee3302551
SHA1c1d1f6cf6efc3c251fc1de46a27214f51f77d68f
SHA256e2ea7ef87852cca025da888f8f176609a836502be267136277de4e06038514d3
SHA51294358eacc91c6bc64217c80a563331fa522a4ce7d0884355bf62a0c62cd310f3d6c38ac8f092a5590a35e94cfcd26120afcdc8b2d895fa0b8f856d7e0803f5da
-
Filesize
4KB
MD53962ceed6b505a7d80315781cb38ba47
SHA18cc8d73a525f350064d06e98da9ae28b55af4523
SHA256f82b293b3cdf4c72d311f4cbd99e15b5a9f781e255250e5092d3f880cce30890
SHA512dc90b1cf76cf3ba284663b98a8cc254c7e39e10172114fb7360697fde58d2b60134d8aa327d8f696d34edae09eff286b19acf912d3faac615e70dbd19ac26995