Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
bb7c3b78f2784a7ac3c090331326279476c748087188aeb69f431bbd70ac6407.msi
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bb7c3b78f2784a7ac3c090331326279476c748087188aeb69f431bbd70ac6407.msi
Resource
win10v2004-20231222-en
General
-
Target
bb7c3b78f2784a7ac3c090331326279476c748087188aeb69f431bbd70ac6407.msi
-
Size
724KB
-
MD5
bf17d7f8dac7df58b37582cec39e609d
-
SHA1
0c55b3c75e5759efc6db20b6db4fad790cbcd4e7
-
SHA256
bb7c3b78f2784a7ac3c090331326279476c748087188aeb69f431bbd70ac6407
-
SHA512
6bc90fcbfc3e6fc16d9bc2a8d3ce3b2ada00b05ed36fceb512ed51c941fb51b62c0873c69f942edd7a11a0855f37424251c74bf6cf6c51922395d0ca378a8f9a
-
SSDEEP
12288:V+HbRUFb4H6KJF/pDYkw0gCvoKWg6AZznX4y4NRlozIlGx36Thxv9ipLnGr0Hm:V+uOxtwYXT4NRlVkx303icYH
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe -
Loads dropped DLL 2 IoCs
pid Process 2816 MsiExec.exe 2816 MsiExec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2480 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2480 msiexec.exe Token: SeIncreaseQuotaPrivilege 2480 msiexec.exe Token: SeRestorePrivilege 3052 msiexec.exe Token: SeTakeOwnershipPrivilege 3052 msiexec.exe Token: SeSecurityPrivilege 3052 msiexec.exe Token: SeCreateTokenPrivilege 2480 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2480 msiexec.exe Token: SeLockMemoryPrivilege 2480 msiexec.exe Token: SeIncreaseQuotaPrivilege 2480 msiexec.exe Token: SeMachineAccountPrivilege 2480 msiexec.exe Token: SeTcbPrivilege 2480 msiexec.exe Token: SeSecurityPrivilege 2480 msiexec.exe Token: SeTakeOwnershipPrivilege 2480 msiexec.exe Token: SeLoadDriverPrivilege 2480 msiexec.exe Token: SeSystemProfilePrivilege 2480 msiexec.exe Token: SeSystemtimePrivilege 2480 msiexec.exe Token: SeProfSingleProcessPrivilege 2480 msiexec.exe Token: SeIncBasePriorityPrivilege 2480 msiexec.exe Token: SeCreatePagefilePrivilege 2480 msiexec.exe Token: SeCreatePermanentPrivilege 2480 msiexec.exe Token: SeBackupPrivilege 2480 msiexec.exe Token: SeRestorePrivilege 2480 msiexec.exe Token: SeShutdownPrivilege 2480 msiexec.exe Token: SeDebugPrivilege 2480 msiexec.exe Token: SeAuditPrivilege 2480 msiexec.exe Token: SeSystemEnvironmentPrivilege 2480 msiexec.exe Token: SeChangeNotifyPrivilege 2480 msiexec.exe Token: SeRemoteShutdownPrivilege 2480 msiexec.exe Token: SeUndockPrivilege 2480 msiexec.exe Token: SeSyncAgentPrivilege 2480 msiexec.exe Token: SeEnableDelegationPrivilege 2480 msiexec.exe Token: SeManageVolumePrivilege 2480 msiexec.exe Token: SeImpersonatePrivilege 2480 msiexec.exe Token: SeCreateGlobalPrivilege 2480 msiexec.exe Token: SeCreateTokenPrivilege 2480 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2480 msiexec.exe Token: SeLockMemoryPrivilege 2480 msiexec.exe Token: SeIncreaseQuotaPrivilege 2480 msiexec.exe Token: SeMachineAccountPrivilege 2480 msiexec.exe Token: SeTcbPrivilege 2480 msiexec.exe Token: SeSecurityPrivilege 2480 msiexec.exe Token: SeTakeOwnershipPrivilege 2480 msiexec.exe Token: SeLoadDriverPrivilege 2480 msiexec.exe Token: SeSystemProfilePrivilege 2480 msiexec.exe Token: SeSystemtimePrivilege 2480 msiexec.exe Token: SeProfSingleProcessPrivilege 2480 msiexec.exe Token: SeIncBasePriorityPrivilege 2480 msiexec.exe Token: SeCreatePagefilePrivilege 2480 msiexec.exe Token: SeCreatePermanentPrivilege 2480 msiexec.exe Token: SeBackupPrivilege 2480 msiexec.exe Token: SeRestorePrivilege 2480 msiexec.exe Token: SeShutdownPrivilege 2480 msiexec.exe Token: SeDebugPrivilege 2480 msiexec.exe Token: SeAuditPrivilege 2480 msiexec.exe Token: SeSystemEnvironmentPrivilege 2480 msiexec.exe Token: SeChangeNotifyPrivilege 2480 msiexec.exe Token: SeRemoteShutdownPrivilege 2480 msiexec.exe Token: SeUndockPrivilege 2480 msiexec.exe Token: SeSyncAgentPrivilege 2480 msiexec.exe Token: SeEnableDelegationPrivilege 2480 msiexec.exe Token: SeManageVolumePrivilege 2480 msiexec.exe Token: SeImpersonatePrivilege 2480 msiexec.exe Token: SeCreateGlobalPrivilege 2480 msiexec.exe Token: SeCreateTokenPrivilege 2480 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2816 3052 msiexec.exe 29 PID 3052 wrote to memory of 2816 3052 msiexec.exe 29 PID 3052 wrote to memory of 2816 3052 msiexec.exe 29 PID 3052 wrote to memory of 2816 3052 msiexec.exe 29 PID 3052 wrote to memory of 2816 3052 msiexec.exe 29 PID 3052 wrote to memory of 2816 3052 msiexec.exe 29 PID 3052 wrote to memory of 2816 3052 msiexec.exe 29
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\bb7c3b78f2784a7ac3c090331326279476c748087188aeb69f431bbd70ac6407.msi1⤵
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2480
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F352D9A55F12DCCE71490F2491BBDD46 C2⤵
- Loads dropped DLL
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5b77a2a2768b9cc78a71bbffb9812b978
SHA1b70e27eb446fe1c3bc8ea03dabbee2739a782e04
SHA256f74c97b1a53541b059d3bfafe41a79005ce5065f8210d7de9f1b600dc4e28aa0
SHA512a8b16bc60f8559c78c64ca9e85cd7fd704bba1f55b362465b7accef1bb853d1c9616995a35f972256c57fbe877ce880398ba1fbceaa658604883aa12dcbc4f57