Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
bb7c3b78f2784a7ac3c090331326279476c748087188aeb69f431bbd70ac6407.msi
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bb7c3b78f2784a7ac3c090331326279476c748087188aeb69f431bbd70ac6407.msi
Resource
win10v2004-20231215-en
General
-
Target
bb7c3b78f2784a7ac3c090331326279476c748087188aeb69f431bbd70ac6407.msi
-
Size
724KB
-
MD5
bf17d7f8dac7df58b37582cec39e609d
-
SHA1
0c55b3c75e5759efc6db20b6db4fad790cbcd4e7
-
SHA256
bb7c3b78f2784a7ac3c090331326279476c748087188aeb69f431bbd70ac6407
-
SHA512
6bc90fcbfc3e6fc16d9bc2a8d3ce3b2ada00b05ed36fceb512ed51c941fb51b62c0873c69f942edd7a11a0855f37424251c74bf6cf6c51922395d0ca378a8f9a
-
SSDEEP
12288:V+HbRUFb4H6KJF/pDYkw0gCvoKWg6AZznX4y4NRlozIlGx36Thxv9ipLnGr0Hm:V+uOxtwYXT4NRlVkx303icYH
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Loads dropped DLL 2 IoCs
pid Process 2272 MsiExec.exe 2272 MsiExec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2760 msiexec.exe Token: SeIncreaseQuotaPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 3024 msiexec.exe Token: SeTakeOwnershipPrivilege 3024 msiexec.exe Token: SeSecurityPrivilege 3024 msiexec.exe Token: SeCreateTokenPrivilege 2760 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2760 msiexec.exe Token: SeLockMemoryPrivilege 2760 msiexec.exe Token: SeIncreaseQuotaPrivilege 2760 msiexec.exe Token: SeMachineAccountPrivilege 2760 msiexec.exe Token: SeTcbPrivilege 2760 msiexec.exe Token: SeSecurityPrivilege 2760 msiexec.exe Token: SeTakeOwnershipPrivilege 2760 msiexec.exe Token: SeLoadDriverPrivilege 2760 msiexec.exe Token: SeSystemProfilePrivilege 2760 msiexec.exe Token: SeSystemtimePrivilege 2760 msiexec.exe Token: SeProfSingleProcessPrivilege 2760 msiexec.exe Token: SeIncBasePriorityPrivilege 2760 msiexec.exe Token: SeCreatePagefilePrivilege 2760 msiexec.exe Token: SeCreatePermanentPrivilege 2760 msiexec.exe Token: SeBackupPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 2760 msiexec.exe Token: SeShutdownPrivilege 2760 msiexec.exe Token: SeDebugPrivilege 2760 msiexec.exe Token: SeAuditPrivilege 2760 msiexec.exe Token: SeSystemEnvironmentPrivilege 2760 msiexec.exe Token: SeChangeNotifyPrivilege 2760 msiexec.exe Token: SeRemoteShutdownPrivilege 2760 msiexec.exe Token: SeUndockPrivilege 2760 msiexec.exe Token: SeSyncAgentPrivilege 2760 msiexec.exe Token: SeEnableDelegationPrivilege 2760 msiexec.exe Token: SeManageVolumePrivilege 2760 msiexec.exe Token: SeImpersonatePrivilege 2760 msiexec.exe Token: SeCreateGlobalPrivilege 2760 msiexec.exe Token: SeCreateTokenPrivilege 2760 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2760 msiexec.exe Token: SeLockMemoryPrivilege 2760 msiexec.exe Token: SeIncreaseQuotaPrivilege 2760 msiexec.exe Token: SeMachineAccountPrivilege 2760 msiexec.exe Token: SeTcbPrivilege 2760 msiexec.exe Token: SeSecurityPrivilege 2760 msiexec.exe Token: SeTakeOwnershipPrivilege 2760 msiexec.exe Token: SeLoadDriverPrivilege 2760 msiexec.exe Token: SeSystemProfilePrivilege 2760 msiexec.exe Token: SeSystemtimePrivilege 2760 msiexec.exe Token: SeProfSingleProcessPrivilege 2760 msiexec.exe Token: SeIncBasePriorityPrivilege 2760 msiexec.exe Token: SeCreatePagefilePrivilege 2760 msiexec.exe Token: SeCreatePermanentPrivilege 2760 msiexec.exe Token: SeBackupPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 2760 msiexec.exe Token: SeShutdownPrivilege 2760 msiexec.exe Token: SeDebugPrivilege 2760 msiexec.exe Token: SeAuditPrivilege 2760 msiexec.exe Token: SeSystemEnvironmentPrivilege 2760 msiexec.exe Token: SeChangeNotifyPrivilege 2760 msiexec.exe Token: SeRemoteShutdownPrivilege 2760 msiexec.exe Token: SeUndockPrivilege 2760 msiexec.exe Token: SeSyncAgentPrivilege 2760 msiexec.exe Token: SeEnableDelegationPrivilege 2760 msiexec.exe Token: SeManageVolumePrivilege 2760 msiexec.exe Token: SeImpersonatePrivilege 2760 msiexec.exe Token: SeCreateGlobalPrivilege 2760 msiexec.exe Token: SeCreateTokenPrivilege 2760 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2272 3024 msiexec.exe 29 PID 3024 wrote to memory of 2272 3024 msiexec.exe 29 PID 3024 wrote to memory of 2272 3024 msiexec.exe 29 PID 3024 wrote to memory of 2272 3024 msiexec.exe 29 PID 3024 wrote to memory of 2272 3024 msiexec.exe 29 PID 3024 wrote to memory of 2272 3024 msiexec.exe 29 PID 3024 wrote to memory of 2272 3024 msiexec.exe 29
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\bb7c3b78f2784a7ac3c090331326279476c748087188aeb69f431bbd70ac6407.msi1⤵
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2760
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1CA00E9F4E866319A52943D07D91278C C2⤵
- Loads dropped DLL
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5b77a2a2768b9cc78a71bbffb9812b978
SHA1b70e27eb446fe1c3bc8ea03dabbee2739a782e04
SHA256f74c97b1a53541b059d3bfafe41a79005ce5065f8210d7de9f1b600dc4e28aa0
SHA512a8b16bc60f8559c78c64ca9e85cd7fd704bba1f55b362465b7accef1bb853d1c9616995a35f972256c57fbe877ce880398ba1fbceaa658604883aa12dcbc4f57