Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/01/2024, 15:14

General

  • Target

    dotnet-runtime-6.0.12-win-x64 (1).exe

  • Size

    26.5MB

  • MD5

    b904aee532297d7bab64dcdc6dc56988

  • SHA1

    e9f7728237134666fd4cb0875465d1460e3d12b5

  • SHA256

    1f59de85b9172ce651f8e031e946534e02e58bc4dcb56e72430fe8572beb33ab

  • SHA512

    f8c6d7d379ec9ec8e39e6ca20c6015d7c2d049eecd06045818fe95e87b3e515adbdf445f83b79241248fa5a3f3093ce4bf6f7f67cb9f7e6c74e03523a70d9fd5

  • SSDEEP

    393216:LvFbxOLkfjwdSjSovAgb/kIHkKQC5MyItiK3+aFVLfoZbMlw3UJsvI/g1:LvFbxOQf0dSQgzQC52tXdi3UJs7

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 53 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dotnet-runtime-6.0.12-win-x64 (1).exe
    "C:\Users\Admin\AppData\Local\Temp\dotnet-runtime-6.0.12-win-x64 (1).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Windows\Temp\{C705EAA1-FD11-4F0B-9C2F-355B98AAED91}\.cr\dotnet-runtime-6.0.12-win-x64 (1).exe
      "C:\Windows\Temp\{C705EAA1-FD11-4F0B-9C2F-355B98AAED91}\.cr\dotnet-runtime-6.0.12-win-x64 (1).exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\dotnet-runtime-6.0.12-win-x64 (1).exe" -burn.filehandle.attached=684 -burn.filehandle.self=536
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:352
      • C:\Windows\Temp\{D10727D1-AC02-40B8-B718-481248483213}\.be\dotnet-runtime-6.0.12-win-x64.exe
        "C:\Windows\Temp\{D10727D1-AC02-40B8-B718-481248483213}\.be\dotnet-runtime-6.0.12-win-x64.exe" -q -burn.elevated BurnPipe.{10430A53-52DA-4241-8905-69E38733EB22} {166FF724-C634-4468-8759-BA917566A4F3} 352
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3408
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 3647417324837FE8E06307DB85EEF024
      2⤵
      • Loads dropped DLL
      PID:3144
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 6CE0A5601EB30917E6CCA43D255AACC9
      2⤵
      • Loads dropped DLL
      PID:5108
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e57eb1e.rbs

    Filesize

    56KB

    MD5

    f17a98a634bb7d0c0a6bca9020148513

    SHA1

    62ef58dc711a3d7cebf4f436de592e7f3d0b33ef

    SHA256

    87fde1996f6535e1c19aba3a5e86fe7ee7cd02936155be53e80c3c2f2ad063ae

    SHA512

    d896f9eaf3c06c8e3e2ad760da95a711f57457d711746d0b559f75ea215c3ac603539c830a59e9f6d7cc517a398e7dda5f78fec78e66a79985d6d8a14a9f344a

  • C:\Config.Msi\e57eb23.rbs

    Filesize

    9KB

    MD5

    83a4cf7c2197368f8090a507e9aeef3b

    SHA1

    0f0304e15594bfb3aca1de68040e8c3972c9c9db

    SHA256

    ba77f3229101ae497300dd89af74e5e3b89bdcf2b8a0db49deec5d2237e47eed

    SHA512

    4a36ee2288d71bb57858830a0f3d6dd70e8cffc8b4f7e2814702d21e6b0eca07aa2d08820634eba3bfa1a2370ca5af0b23392834698134e6ebe3b8628783d52f

  • C:\Users\Admin\AppData\Local\Temp\Microsoft_.NET_Runtime_-_6.0.12_(x64)_20240123151531_000_dotnet_runtime_6.0.12_win_x64.msi.log

    Filesize

    2KB

    MD5

    5f88bfd652344f81f1ef3516648ba873

    SHA1

    2c3483e0c8f624ebf009465f995bb6550f3c5555

    SHA256

    b8eeec2e8753dd4c613f672d19ff7f01a6b58b90fa0547df51fe4325912158d6

    SHA512

    a9669d9ceef9ec068f97a58be81debb0369d9d99464a48f510453f4c29f09ab2f919fa892672173b799b61899cd748f794a480680122f2f49f8352c8cf141126

  • C:\Users\Admin\AppData\Local\Temp\Microsoft_.NET_Runtime_-_6.0.12_(x64)_20240123151531_001_dotnet_hostfxr_6.0.12_win_x64.msi.log

    Filesize

    2KB

    MD5

    9efc0b15837ebb570964af2310420613

    SHA1

    12fc461920728ba8ad95838955dcf70b560460d8

    SHA256

    d38808e2bfd56453b61e76d18447552ab539da750829d0cf93b28f6c877ebaf2

    SHA512

    75699d1c4886a118025bb2191267d9f4433ec850b0dfb78a6fb4c5128e46f169b51132e9c55b19ed12c656dd545c6c344f94e9ac42217fffbadfcf95f3a57afe

  • C:\Windows\Installer\MSIF02C.tmp

    Filesize

    225KB

    MD5

    d711da8a6487aea301e05003f327879f

    SHA1

    548d3779ed3ab7309328f174bfb18d7768d27747

    SHA256

    3d855b58ce7da9f24f1bef8d0673ba4a97105a7fd88433de7fb4e156b4306283

    SHA512

    c6d1c938e8a0acf080dcab1276d78237e342a98772e23ac887b87a346878c376fb0af8364e52a36c5b949005aa3218308bc6193f8b580f622ef39d9955c7c681

  • C:\Windows\Temp\{C705EAA1-FD11-4F0B-9C2F-355B98AAED91}\.cr\dotnet-runtime-6.0.12-win-x64 (1).exe

    Filesize

    609KB

    MD5

    4e457c83e119923253386bdf662073e6

    SHA1

    756bc1ade8fed0d806a101df392fcbde03be05cd

    SHA256

    8f6a150851d0e59e15d9eee220b7877fdd8e3108e04c468b5633a79244019aef

    SHA512

    db0cbc9a92371ace2e46d6394cc7688114254a774963abd6d7ec8f4d861073056706d7fc09ee6c78208cf3f3b84b33f8fe3f21a3ff140f5a18de3c63ae8095c9

  • C:\Windows\Temp\{D10727D1-AC02-40B8-B718-481248483213}\.ba\bg.png

    Filesize

    4KB

    MD5

    9eb0320dfbf2bd541e6a55c01ddc9f20

    SHA1

    eb282a66d29594346531b1ff886d455e1dcd6d99

    SHA256

    9095bf7b6baa0107b40a4a6d727215be077133a190f4ca9bd89a176842141e79

    SHA512

    9ada3a1757a493fbb004bd767fab8f77430af69d71479f340b8b8ede904cc94cd733700db593a4a2d2e1184c0081fd0648318d867128e1cb461021314990931d

  • C:\Windows\Temp\{D10727D1-AC02-40B8-B718-481248483213}\.ba\wixstdba.dll

    Filesize

    197KB

    MD5

    4356ee50f0b1a878e270614780ddf095

    SHA1

    b5c0915f023b2e4ed3e122322abc40c4437909af

    SHA256

    41a8787fdc9467f563438daba4131191aa1eb588a81beb9a89fe8bd886c16104

    SHA512

    b9e482efe9189683dabfc9feff8b386d7eba4ecf070f42a1eebee6052cfb181a19497f831f1ea6429cfcce1d4865a5d279b24bd738d702902e9887bb9f0c4691

  • C:\Windows\Temp\{D10727D1-AC02-40B8-B718-481248483213}\dotnet_hostfxr_6.0.12_win_x64.msi

    Filesize

    804KB

    MD5

    288f19e824eafccf3654eeebf69c03f1

    SHA1

    14d49baab39001a3459be19f9e760e467b39c90d

    SHA256

    264d63dcaa7052dcf9539fedc99f5a56da6234e3a69433a6cdeaa50cfc143e8f

    SHA512

    3ca3f18db329164f46aab9b8228dc5e79ded4fce571b848556fccc28970829ffb38070daf593c617ba2acdff859f48fc49ccaf77d052f76004cba200f5b2735c

  • C:\Windows\Temp\{D10727D1-AC02-40B8-B718-481248483213}\dotnet_runtime_6.0.12_win_x64.msi

    Filesize

    25.6MB

    MD5

    ed04f657c593c878184f2cacd259d89d

    SHA1

    b3b9ef6c6a7d7b26e1db8a25c9cfca801b4510e2

    SHA256

    c271c90769d282c35da7496b217d8c1b7e1f110f98c910263fd0a511f06b7b6c

    SHA512

    e5540046b4fad6b2848a8a5ec895e1482d1b185ff580e086f998217c4f1af8e101c66724c35f1149014e4bd3037814ebc0f9246f943f129df3f65bb401a9c5aa

  • memory/4888-96-0x000001CC936E0000-0x000001CC936E1000-memory.dmp

    Filesize

    4KB

  • memory/4888-97-0x000001CC936E0000-0x000001CC936E1000-memory.dmp

    Filesize

    4KB

  • memory/4888-102-0x000001CC936E0000-0x000001CC936E1000-memory.dmp

    Filesize

    4KB

  • memory/4888-99-0x000001CC936E0000-0x000001CC936E1000-memory.dmp

    Filesize

    4KB

  • memory/4888-105-0x000001CC936E0000-0x000001CC936E1000-memory.dmp

    Filesize

    4KB

  • memory/4888-104-0x000001CC936E0000-0x000001CC936E1000-memory.dmp

    Filesize

    4KB

  • memory/4888-107-0x000001CC936E0000-0x000001CC936E1000-memory.dmp

    Filesize

    4KB

  • memory/4888-92-0x000001CC936E0000-0x000001CC936E1000-memory.dmp

    Filesize

    4KB

  • memory/4888-91-0x000001CC936E0000-0x000001CC936E1000-memory.dmp

    Filesize

    4KB

  • memory/4888-90-0x000001CC936E0000-0x000001CC936E1000-memory.dmp

    Filesize

    4KB