Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 23:19

General

  • Target

    3718ba20c5c578a8cbfe21d13d383be2822cfd2f346c2e65d817dbfdfea082fd.exe

  • Size

    1.6MB

  • MD5

    f2fd7dae9e4bc8cbac68a6a5a82edcdf

  • SHA1

    f9c5a6d6ea80afbb983da65aa126b4187f2419a0

  • SHA256

    3718ba20c5c578a8cbfe21d13d383be2822cfd2f346c2e65d817dbfdfea082fd

  • SHA512

    ce861fc951759881c59a7613cdaeb2436ae25bb14101bbb2ff62f5bbae6504d51ecad7e9d3965d7edfb644e016ada6f275b5e9b4529289f6b5ed37f91c690589

  • SSDEEP

    24576:4l83JdN3JxEIGeAteivk4Sz9zIZZV57ql/mwgFJTYFoS0me4Ck/+xH1L01AA8wxy:L39zAZrOlmwwJTdqt+xW/t+sYHtgO

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3718ba20c5c578a8cbfe21d13d383be2822cfd2f346c2e65d817dbfdfea082fd.exe
    "C:\Users\Admin\AppData\Local\Temp\3718ba20c5c578a8cbfe21d13d383be2822cfd2f346c2e65d817dbfdfea082fd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\{B705813C-3411-42D1-ACEE-0E1A9EFD216A}\3718ba20c5c578a8cbfe21d13d383be2822cfd2f346c2e65d817dbfdfea082fd.exe
      C:\Users\Admin\AppData\Local\Temp\{B705813C-3411-42D1-ACEE-0E1A9EFD216A}\3718ba20c5c578a8cbfe21d13d383be2822cfd2f346c2e65d817dbfdfea082fd.exe /q"C:\Users\Admin\AppData\Local\Temp\3718ba20c5c578a8cbfe21d13d383be2822cfd2f346c2e65d817dbfdfea082fd.exe" /tempdisk1folder"C:\Users\Admin\AppData\Local\Temp\{B705813C-3411-42D1-ACEE-0E1A9EFD216A}" /IS_temp
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Windows\SysWOW64\MSIEXEC.EXE
        "C:\Windows\system32\MSIEXEC.EXE" /i "C:\Users\Admin\AppData\Local\Downloaded Installations\{7C349C85-E355-435F-841B-DD95D51A60F5}\HP_DockAccessoryWMIProvider.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="3718ba20c5c578a8cbfe21d13d383be2822cfd2f346c2e65d817dbfdfea082fd.exe"
        3⤵
        • Enumerates connected drives
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1700
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F35227124EDB1C6EF47DA0593C8181F8 C
      2⤵
      • Loads dropped DLL
      PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Downloaded Installations\{7C349C85-E355-435F-841B-DD95D51A60F5}\HP_DockAccessoryWMIProvider.msi

    Filesize

    1.1MB

    MD5

    078b60501d9916189a2e9e0a34f1ba31

    SHA1

    67504dba1ceef484600676bf02a9e7891be25776

    SHA256

    62aca9491484301ade44ce8b6edc04630a2656dffe7e16ce54c4900d75aad53d

    SHA512

    aca537da7796c48cf772360d7d60f1d7aa64247b6fae435dc69ebbc17742425cba9b0788e9f34d5e76c9d657c2cbaebf96ff33b02126b3c5fe846c3da8104a99

  • C:\Users\Admin\AppData\Local\Temp\MSI3092.tmp

    Filesize

    173KB

    MD5

    d07d2c85ea1c0af02a99b6cf78ae79ef

    SHA1

    3ac922fc33789b61eb62085f3e49bca6aba4b4a9

    SHA256

    5a36c709648e40ec1224855fb77e7420ee53e267c185f31c2c016115fba4af38

    SHA512

    029bed817c10eebabd39a6c819eda3d76b09c7e34d182ec31c9f7d96fed530cd35feed88891ec61b6fb0d86ba44a07bfe3882e6fb3d9f0e41d48d2a99453789a

  • C:\Users\Admin\AppData\Local\Temp\MSI30F1.tmp

    Filesize

    167KB

    MD5

    e80f90724939d4f85fc49de2460b94b5

    SHA1

    512ea4deba1c97cc7ec394bce0e4a32cd497176e

    SHA256

    8041d3ccbafa491d35f70030c3afeba683b0235bed24f242878d04c7e87b8687

    SHA512

    9494f1cd058dc3923e4f562d8ed2edf3d252f519efc6db4f1b5289d8a1b841a6cb927e14d33dab98e0bd4d22a5a473b8cd9424f77213527fbe0c183126356767

  • C:\Users\Admin\AppData\Local\Temp\{B705813C-3411-42D1-ACEE-0E1A9EFD216A}\0x0409.ini

    Filesize

    21KB

    MD5

    a108f0030a2cda00405281014f897241

    SHA1

    d112325fa45664272b08ef5e8ff8c85382ebb991

    SHA256

    8b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948

    SHA512

    d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298

  • C:\Users\Admin\AppData\Local\Temp\{B705813C-3411-42D1-ACEE-0E1A9EFD216A}\_ISMSIDEL.INI

    Filesize

    828B

    MD5

    9a8c4453203d611571c08591e60c046f

    SHA1

    6be726670d8e473fa94a1999bbbbdb787fcae18e

    SHA256

    c50697b1cd2d6516d669fd9f68748da4e69b5f693371d8e867f888c2ca1d4ab6

    SHA512

    af5e1a4be90d5988d06057c90063e8875ecd71eebb156952f0ad4ba8d89194ad90d923bda9bb52d0ca0d427e2f586874f9c97a02496c07ea485a98065e32f458

  • C:\Users\Admin\AppData\Local\Temp\~1B6F.tmp

    Filesize

    5KB

    MD5

    da995277cd11cb471f6ad99dfe735eb3

    SHA1

    67a7b3f463c0caa4ed889cef6d41390295c5f224

    SHA256

    17ebfb0fbb17c9265d78ff5397683c3331b324177da0a6a9f59b48ba44c90a49

    SHA512

    5a02cc0fec4ddb84dd21d5f0a50b2844633bb03218405165ae012d38e058ad3e80efce616786fac9d5c6c73a71f77b86d022ea8267dd832ce389a2cbb1b62130

  • \Users\Admin\AppData\Local\Temp\{B705813C-3411-42D1-ACEE-0E1A9EFD216A}\3718ba20c5c578a8cbfe21d13d383be2822cfd2f346c2e65d817dbfdfea082fd.exe

    Filesize

    1.6MB

    MD5

    f2fd7dae9e4bc8cbac68a6a5a82edcdf

    SHA1

    f9c5a6d6ea80afbb983da65aa126b4187f2419a0

    SHA256

    3718ba20c5c578a8cbfe21d13d383be2822cfd2f346c2e65d817dbfdfea082fd

    SHA512

    ce861fc951759881c59a7613cdaeb2436ae25bb14101bbb2ff62f5bbae6504d51ecad7e9d3965d7edfb644e016ada6f275b5e9b4529289f6b5ed37f91c690589