Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    186s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 01:18

General

  • Target

    c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741.exe

  • Size

    11.7MB

  • MD5

    855fea526f0bb5ef1f043a3e63d70b8f

  • SHA1

    f62b22214d1cdcd97c9284ef8aaba203707aa976

  • SHA256

    c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741

  • SHA512

    9806af6623eda6df15afa8b616240075c6400e46c44d681a97b0aacbc1a852179166003d6fcf39bc0fdda2ff140eabb11f94839db518ade008b61a41ef6d07e6

  • SSDEEP

    196608:EAPGOkvo7CA8wikC4DddU1KTsUQEZ4O/6rJpqjUEBzrWdFwE0QbmO:EAEvoOA8xIddU0TsXESO/6rJKUmMFRxf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 2 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741.exe
    "C:\Users\Admin\AppData\Local\Temp\c137c4a4c113ab23bf610a2ad4d2f5cc738948602638ccb7313b1bf331fff741.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE /iexpress CDCACHE=2
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OSE.EXE
        "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OSE.EXE" -standalone
        3⤵
        • Executes dropped EXE
        PID:3944
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\system32\msiexec.exe" /I "C:\MSOCache\All Users\90850409-6000-11D3-8CFE-0150048383C9\WORDVIEW.MSI" CDCACHE=2 LAUNCHEDFROMSETUP=1 SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ SETUPEXENAME=SETUP.EXE /lpiwaeo "C:\Users\Admin\AppData\Local\Temp\Microsoft Office Word Viewer 2003 Setup(0001)_Task(0001).txt" STANDALONEOSE="C:\MSOCache\All Users\90850409-6000-11D3-8CFE-0150048383C9\FILES\SETUP\OSE.EXE" CDCACHE="2" DELETABLECACHE="1" LOCALCACHEDRIVE="C" DWSETUPLOGFILE="C:\Users\Admin\AppData\Local\Temp\Microsoft Office Word Viewer 2003 Setup(0001).txt" DWMSILOGFILE="C:\Users\Admin\AppData\Local\Temp\Microsoft Office Word Viewer 2003 Setup(0001)_Task(0001).txt"
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:220
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 8859A243D4902C5259F46DCECB61DA69 C
      2⤵
      • Loads dropped DLL
      PID:4668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\90850409-6000-11D3-8CFE-0150048383C9\WORDVIEW.MSI

    Filesize

    56KB

    MD5

    b21e9b2474b81dd8b0818a90f4dd80cc

    SHA1

    e58c9cb49d6a56dc9bd73334fe1e70660175a80b

    SHA256

    a972bce2fdf642c13a154a011c9c746d6054af0056d443238c45aa0d3810b932

    SHA512

    1403527f16233ed2ed151dd636997501951e59c0409dc4125edec7fcd4c69707d1c0bc9615d7fd44512856e2fc343ff735bc5694e6c5903dfedc81d94acdce37

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OSE.EXE

    Filesize

    87KB

    MD5

    7a56cf3e3f12e8af599963b16f50fb6a

    SHA1

    170290115fa1dec1b2e6f43c59996d442857db1b

    SHA256

    882c82bae96d263138d4c0d6c425458b770b7b9c8e9c1d28ac918bf6be94a5c2

    SHA512

    c726c2c85230defffb7936476b4b3623cec817452033ea50f1739fa3494358e0bc8d6e160205d97c8e34225fab730fb1927592d42954a5c4051d30c5b9e24509

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OSE.EXE

    Filesize

    83KB

    MD5

    83b264f335508ca11403ebdd06fdc3f7

    SHA1

    f3f2132b3731c890eadd02093d9d1cc86a11fc80

    SHA256

    638cf03492a0ee64529202a419e334319af02604a4fa0bd3867a3686ae95ed62

    SHA512

    136e2d37428e7d357529370ee155e609b5f2704582ce2623f4f34c6b038eb8674b113b5e48b1ece19fa624b3820d5f0e453071978a0c9f636ca39eae2ce3fc83

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE

    Filesize

    119KB

    MD5

    bd1d05b05f3acb12030b7ffa011cdf89

    SHA1

    33c1b812f41874514752026c8579c77ebb4955a2

    SHA256

    5c683a6e0fc14122d5c7af561cfdedbb0144eb0b336f51ad4f3e71249292166e

    SHA512

    c7b8de9be15a3047fcf5dde5d6d901ebb80645ce3f4ed346b8342ea161e762e59048afcb2d099265b63c43e403115800eb3ae240ed9697566f9d470b6343e33e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.EXE

    Filesize

    98KB

    MD5

    ebe0b6bb66d0b762bd4a412d3b7e1e4c

    SHA1

    93e0b3f13da534ad539da89dce62dd2ac93ecf28

    SHA256

    51e6e0905cd5fae902d54b66ad0d0bcc3adf0c817b12a41c40e886d70e682724

    SHA512

    9209ac658aeca1d9eb34a496423013125f8e724499f31bf9ab87bcf28bbac358693c6788f4619501dc925c9f83a739fcc11a3cf3dab578ca3b869b5482358e24

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP.INI

    Filesize

    2KB

    MD5

    dcfee47159801fc52071063e032c82d2

    SHA1

    84225713db71c02c00abf1cbc956e3af91e414c7

    SHA256

    c38d913c8b375d4446b6b47d68862e4c9096c473c8313e723a3e1c54f3de07ba

    SHA512

    d015d41d5b63d28dd8804d8affaa9a528e24cd426ec78d7e919b9c112f07a152e64e7b5e26e87dd06567a9b07c9204687f8e3aef39d2f34afea4ccbc3a5bbe49

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WORDVIEW.MSI

    Filesize

    124KB

    MD5

    ffbfc229dd9c9b55fa691a328ebd46cd

    SHA1

    5ff40ef1acff8c9ac0d9b0ad7aa25ab7cccc5eb4

    SHA256

    22dcee0693b488284e0bfe66fafccf53347d6a0186132cf16d80a2a88e5e37ad

    SHA512

    395e94e24d940ec6c52e32b7b13a5d5bc46f0bc8d5b23d2fa3616307a2ab18628115f61b98721c9da245b3a9ddb536a25899dd72bef2ec0d27f8918bbc43ffaa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WORDVIEW.xml

    Filesize

    1KB

    MD5

    76cf0f27ff521b1b1a1134e81c9c0525

    SHA1

    c1099faf9fbe6c476cc577cae52e22b690593384

    SHA256

    6650a77187fe8dc9dad4ccbab5c66d40c2be6685f8a0b12248ac5febd56cd4b8

    SHA512

    745affb1cd92349ef18d7f57af397fec7d2d11e84b2369c7eeeed1538b2cf88c797e52df363ed821c734002f47b784702adaebd01abe046052d5c04d0f48015f

  • C:\Users\Admin\AppData\Local\Temp\MSI1C0F.tmp

    Filesize

    41KB

    MD5

    78619a8eb29c04b1e7d2a00d5569470a

    SHA1

    739c8a44a58941e45d05f773ede23d30b3398f1a

    SHA256

    d9c00796c8cc99449ba7289120e9d0bcad92d14f4ff0eef81246f4175f6ddd04

    SHA512

    c7c08bf46083d0b384839ec1cfd12cd9339ded2238895d7d2017a914cd79dd2e769af2d928940ddf93fd7b96f8efb1ec9b25c802ca3832bcbf9cb3682e4e0d18

  • C:\Users\Admin\AppData\Local\Temp\MSI1C0F.tmp

    Filesize

    4KB

    MD5

    2d2e15122db1d14043667b331fcfcb5a

    SHA1

    8bf878376ac0bf7ad817d9802fa3f82015c31054

    SHA256

    074f958e455d921b1e121b9f851e0c14bfde9146333caf1ab9ad9c43bba00abf

    SHA512

    15fabf740f4724b307e1d19ee43c29a5f082d39ea310d493a2c1e89ce55ad2c00d4161395644c532d4850a38873e1849bfc42d3f80e767d10bc2676a60bab9d1

  • C:\Users\Admin\AppData\Local\Temp\MSI1CFA.tmp

    Filesize

    32KB

    MD5

    14ef0fc13183125dc4e41a98327f1f6f

    SHA1

    498240a17811015f53391fa4ca45a5d81d09f32b

    SHA256

    1473c63fc30269245a75963419f4cc6184c7ce6188615d4c87fdbd5c3436ef81

    SHA512

    efdae5f42e6b63a56101ca86d6b59a953aec4d432a6e2de1c0e7d7225756a69da8e7d321c5f433ba645bd55053e630af3b136f573878c69e1bab1074c029af6a

  • C:\Users\Admin\AppData\Local\Temp\MSI1CFA.tmp

    Filesize

    50KB

    MD5

    15ff1a5dc8a1dbb9bc0744f8ba134bcb

    SHA1

    47e5f57cfab6ef416f946f5368f1e6a6064a59a4

    SHA256

    d2bdd09a4776ec8ace854a0ff962d3799c6e450ac5b5b24a1fc3414c2f843a3c

    SHA512

    7a51946b5ef9a24ecf0aa32174261390b9edbf3e82d1e9b440860b271d557a7c95ae6b80a67c5cb96d2e244db6881a4217085a768e402537acfbd90115452f5b

  • C:\Users\Admin\AppData\Local\Temp\MSI1DC6.tmp

    Filesize

    47KB

    MD5

    61147cf5709fa8e6425f608e8bb8db8e

    SHA1

    165a7aa36c1139dc79d995b3dbcea65bf7c41289

    SHA256

    e6390512165ca56493f1815f0e104378622e4e2227847208d0463e84c4a34c22

    SHA512

    4a107b6dace9c451f2f6bb2c6468e3434b0922a94d1e3e6e37a1cd6349d9151d40d43bcc7087f206351440082b53e0c4d3872d3c623ea7d12f8ab0fe3c3b959e

  • C:\Users\Admin\AppData\Local\Temp\MSI1DC6.tmp

    Filesize

    7KB

    MD5

    d9bbea56e7ae0e9f76c310024d2019c3

    SHA1

    2cf05966c9ea01ef78a85c7fd6d14bd6e6130020

    SHA256

    9c58399dbf92eecb2745e3ee04d10b61b3c189126cc4daa5f456752dbf9f43d0

    SHA512

    7b4fda74105419ef9bf1b785d906ac19986dd414ab2482b24b638853b35fb1443a2d8f1d73f8979fa4f97d7fbf73f40bc946a0905f660e2f696b11e3dc1c3936

  • C:\Users\Admin\AppData\Local\Temp\MSI1DC6.tmp

    Filesize

    42KB

    MD5

    1829bda6317f1d3bac01f4cf7e86e022

    SHA1

    543348751998e49f9559f068c45e22a521d4a4a5

    SHA256

    e907af04d64fd5c120a14df92f4405c2a23a127e2a9674b13870d0076686196a

    SHA512

    6752d44e12bd6accf04d424fa17be78869975c8756b8c68bb80bcab430a85115ce1beb6936dafddc92c6f62f7940b4857ff5d802a41f7f5207dc4f3b48aa1bc2

  • C:\Users\Admin\AppData\Local\Temp\MSI1DE6.tmp

    Filesize

    11KB

    MD5

    b099830c967cec1138da675888641662

    SHA1

    af97fb07c7ea47e81222208ddcd675e77b970414

    SHA256

    bbf3794e7419c7503146ae93146c3f0b13b3dcbaf427af879c5c9d457dfa0a9b

    SHA512

    4f1e84d94cd2a94b29ff0ffbce56dd466cd6b7a149a51d113abd76f74f0655aad4b06b86179dcae145eb3b493b8b286f4139a852d0f9f54e4c3970a902633b9c

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Office Word Viewer 2003 Setup(0001).txt

    Filesize

    2KB

    MD5

    02283481f3437b9c76105321cf720e4b

    SHA1

    de2f9e2aac43f238fb843856cadd552ada220365

    SHA256

    6f7e09060756b3b5d4f0fd08e8e60d3be9a510d495033a7c8b763e7116668913

    SHA512

    d17583f5f18da078aa2cfee567c01f14704f973d50c4c6aa0b7495a313c2cc34078f213191d91a0a12d6295f280ccc8bfb590cffb08a05942db629247ec58122

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Office Word Viewer 2003 Setup(0001).txt

    Filesize

    3KB

    MD5

    89e744c56eeca395e236917ee3302551

    SHA1

    c1d1f6cf6efc3c251fc1de46a27214f51f77d68f

    SHA256

    e2ea7ef87852cca025da888f8f176609a836502be267136277de4e06038514d3

    SHA512

    94358eacc91c6bc64217c80a563331fa522a4ce7d0884355bf62a0c62cd310f3d6c38ac8f092a5590a35e94cfcd26120afcdc8b2d895fa0b8f856d7e0803f5da

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Office Word Viewer 2003 Setup(0001).txt

    Filesize

    4KB

    MD5

    3962ceed6b505a7d80315781cb38ba47

    SHA1

    8cc8d73a525f350064d06e98da9ae28b55af4523

    SHA256

    f82b293b3cdf4c72d311f4cbd99e15b5a9f781e255250e5092d3f880cce30890

    SHA512

    dc90b1cf76cf3ba284663b98a8cc254c7e39e10172114fb7360697fde58d2b60134d8aa327d8f696d34edae09eff286b19acf912d3faac615e70dbd19ac26995