Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    104s
  • max time network
    98s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2024, 17:40

General

  • Target

    ICCSafe.Installer.msi

  • Size

    107.8MB

  • MD5

    9599a8f5b6c834d4f16a8e7132acea39

  • SHA1

    1306c6d51382fdfac74a6fd777ce93b293dc1a82

  • SHA256

    af59c36b03ee77d584a3af87cc6444613bacf49094b7233369a835004cd0ad82

  • SHA512

    28ad8b8f532460ba6b7401232e7abfe2946f9e895ceeac91d1b63f769c345d3d0bf7ef47ceb23b2450c3611292bfcc4679d9ead87fccf5b4f6c3e17ff9e24d62

  • SSDEEP

    3145728:0GD6Whj3b1fnRj1llWxtHNhk14zpGJrGwxfr8kNq5RJ/64:H6Whj3b1fRRLkHN64NGJrFxf1Nq5D

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 3 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 23 IoCs
  • Loads dropped DLL 16 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ICCSafe.Installer.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2264
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D0B7DE24814DE163A7122EC1321C56A8
      2⤵
      • Loads dropped DLL
      PID:2556
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 3316BAF454E818C05FD0C75224B39985 M Global\MSI0000
      2⤵
      • Manipulates Digital Signatures
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIA73.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259525353 63 ICCSafe.CustomAction!ICCSafe.CustomAction.CustomActions.SaveConfigJson
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:776
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2040
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000580" "000000000000031C"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f77dcca.rbs

    Filesize

    102KB

    MD5

    719fbda58fec8710582b0380e4516381

    SHA1

    6b2a45ad995bae82ec219034c60cad91360895f0

    SHA256

    e3d07b776612b666b811f58fd457498941dbc370df99e2f14907a35919602925

    SHA512

    fd1a1bf8b5b73b0a1c5816b74959a3296e7a4926be7daf8e53240bd86da7735360e2362ff2602be4e249f394debc1690dc23d1b15da31123467d011b0ce3c78d

  • C:\ProgramData\Autodesk\Revit\Addins\ICCSafe\AppConfig.json

    Filesize

    783B

    MD5

    47b11a8d356442dab4645737c0be6954

    SHA1

    d5c75a282565f9ee7ac31acfc34d371864d7a6a1

    SHA256

    43d1db3d41453d1b8d9b2814ed2c502536d07e387d649769352752628fe5be11

    SHA512

    4f770f817631d474fbaaf2835b0ed6c72c16c83788c6e6ff963210c8d2952cd058e74387eb384e89f89865e819cbd1de94f5f2202153241f3be283903d95dbd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8555326CC9661C9937DC5053B6C38763

    Filesize

    1KB

    MD5

    866912c070f1ecacacc2d5bca55ba129

    SHA1

    b7ab3308d1ea4477ba1480125a6fbda936490cbb

    SHA256

    85666a562ee0be5ce925c1d8890a6f76a87ec16d4d7d5f29ea7419cf20123b69

    SHA512

    f91e855e0346ac8c3379129154e01488bb22cff7f6a6df2a80f1671e43c5df8acae36fdf5ee0eb2320f287a681a326b6f1df36e8e37aa5597c4797dd6b43b7cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8555326CC9661C9937DC5053B6C38763

    Filesize

    326B

    MD5

    92c2468f68331c4a38f4b5f2b35ceb8e

    SHA1

    46d3ed0fc1cf957e9e73cd833fd1938cd1df1d04

    SHA256

    39d299f0e57e754760813746cfc06c279518c1b179cb7925b883bd2cab197860

    SHA512

    998eeb62963b4df7a0b44fd729abc91be8ebd35bd3bd434d436f77013df8ff03f9057ddcb788a54cc05e45e56c7ce48ba1b7b8395bf35c3041d6ca3cbd06b318

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9dfc1289eeb027a1573d38e29c6ecd5

    SHA1

    d15b4f8360699b92430f194af1b34ea7f62a7965

    SHA256

    e89ac1bb22b536e3ba6688473e06fc052dccde3a5ef1500872986f90917484ef

    SHA512

    e6ca2b1ad9c9d8af4e673b71c36808fce65f5e881331fba8b621e8a9de994a11f48786ddfff1fad373162f79940fd45dbcb092cd79dc72610f55541d1467dc7b

  • C:\Users\Admin\AppData\Local\Temp\Cab986B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar98AC.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tmp5FA.tmp

    Filesize

    2KB

    MD5

    97085b889cc3f31cc6d453276184cb9c

    SHA1

    b406ca70673463db3ec6151008f19548c55d4ced

    SHA256

    c1b61a27b13e788da13c71699b379334dfb135f9da6365133c23f5bf67819934

    SHA512

    3178cf71b8beca122d219d921a41ca04fec5659544e77f4725045179181e0ce62dd23b9b53f484881ea89e6aec48c3c30fd88a0d110df15ef859734dc0574840

  • C:\Users\Admin\AppData\Local\Temp\Tmp6C5.tmp

    Filesize

    2KB

    MD5

    3cd0b9fe9ab61cc06d50bf2e4778b776

    SHA1

    a270038fe17d57bd76d381e7c9ad0110860509e6

    SHA256

    be0445cfa571f9b7e41743e577dacfdaa62221381ec9d83dbd2ba1652427d0e1

    SHA512

    e94781e8c10b11d7d71755efc1cc551eca33c120ebd173fdb4b68b7e1d7fb035323f90e2b0156d1b4c675353e97f6509257cdc9f7a219e725742482f4f38bed9

  • C:\Users\Admin\AppData\Local\Temp\Tmp7A1.tmp

    Filesize

    2KB

    MD5

    c840aa3fab09920811128fcdf379fc46

    SHA1

    7001bca924ec212b55deff310e24b0701d20840c

    SHA256

    4145eb118ffd67df9a67a2361b80cdbe6c5fcea1e56578361b3a69ee89109b26

    SHA512

    f044e742244b2cbee275fc893c8d874bc13b6d4bb74c523282601c3d1b9d227c42ab1ad45c4f28c4734dd65eb960bd0a7fa47809f1fa033560bb37c8fdc62b9e

  • C:\Windows\Installer\MSIA73.tmp

    Filesize

    469KB

    MD5

    05443d07e99428a958238614d092ff03

    SHA1

    98a1362ea8a31583beac37c5855bf4b730991b99

    SHA256

    422f51b0455b13b8ecd9cb86340de02620663a9c98147c063e33c324b0363795

    SHA512

    7f9524db8ef6fa496dc7a8c804e3d5275360a6335f82e1159b1bef092a4e88bd4bd298b7009ed1b4c2ed9cab5dbb4b308c7e563f4bb630fa9a50a200c204208d

  • C:\Windows\Installer\MSIA73.tmp-\Newtonsoft.Json.dll

    Filesize

    685KB

    MD5

    081d9558bbb7adce142da153b2d5577a

    SHA1

    7d0ad03fbda1c24f883116b940717e596073ae96

    SHA256

    b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3

    SHA512

    2fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511

  • C:\Windows\Installer\MSIE713.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\MSIEE84.tmp

    Filesize

    297KB

    MD5

    7a86ce1a899262dd3c1df656bff3fb2c

    SHA1

    33dcbe66c0dc0a16bab852ed0a6ef71c2d9e0541

    SHA256

    b8f2d0909d7c2934285a8be010d37c0609c7854a36562cbfcbce547f4f4c7b0c

    SHA512

    421e8195c47381de4b3125ab6719eec9be7acd2c97ce9247f4b70a309d32377917c9686b245864e914448fe53df2694d5ee5f327838d029989ba7acafda302ec

  • C:\Windows\Installer\f77dcc8.msi

    Filesize

    100KB

    MD5

    0b34edd7f7e78ba4224f0ff457d1cc70

    SHA1

    9dc6da0ed29ecb87cd3849fab4acac5192257280

    SHA256

    fd700c56d83dc0731db2ecf1b777d78451bfeb7ffe93e6b1623a4609d81e8520

    SHA512

    b1d11bd23519e0fd9caa042cdb5415b0f06c10f5e20387a1be9c5af028653bd629dd628d7a7586bc9a4036ea83bef0f26d40a29c5bdd27d656f31b9c3a2ee9d6

  • \Windows\Installer\MSI552.tmp

    Filesize

    224KB

    MD5

    4837bbfa20c65ac97910388f07d1785e

    SHA1

    e066a3d68c8a5c099633f22a32e22cb8c4f24d8c

    SHA256

    29b9f6167ea343f279c7ebafa18f8fba0fa8c3c21f9f33e7741452c856d45664

    SHA512

    91cade5a43fedce4c06e21cd68023ad13ecc18ddf34379544f8111569868980d3852e93d8f0ccbb013df317f9ee1ac97d9a16862878371ec2cb0fd51b3468037

  • \Windows\Installer\MSIA73.tmp-\ICCSafe.CustomAction.dll

    Filesize

    8KB

    MD5

    d92d7cd04ba1d714e083c249bde42b7c

    SHA1

    e0ef82fa55b14cbf1e32fff499c4fd97e835dee6

    SHA256

    45a43b2179421541025a173e24d3f3f845a5fac3b6c58d54cac1204d25ec8f0d

    SHA512

    d3a6bd3f77a0b699f7f27741bcc047d2226aa2a90e3ee4be9a1551df7091f1c3c0ac4366cfde2a84cff233e5dcd8d77b155dbebbd4edf14179b4a74d0b3f7797

  • \Windows\Installer\MSIA73.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSIA73.tmp-\Newtonsoft.Json.dll

    Filesize

    117KB

    MD5

    2e1c82a9133c16be8acee263103713b8

    SHA1

    350138dcb8d3eb8309f860acb862ba7c01c850e7

    SHA256

    8a501a6fe11f9f80926158da6bb2df601b838ff880d79ef7dadcbe2a6fd5b69e

    SHA512

    75b61c79b3dc46e81fbbf26dcef7ad7fcd9224115a463a5bcae51ff2f9c31dfcaa506c07051c87ece1a7ab8df49d2f8130939e964524c1c3943b4dbe2e503b3a

  • \Windows\Installer\MSIA73.tmp-\Newtonsoft.Json.dll

    Filesize

    190KB

    MD5

    361d2983ff21580e13b28fdf32255ae0

    SHA1

    87646a7159369aacf1ea39d0be88f61987c6a2d2

    SHA256

    8fac30eccdde4abf0b52b5500eb2af7c6885c7a1bff11a85d1dc956e6c360e9f

    SHA512

    b7bc78d447088f51466f412584260b1721e7454b97583a09fca1884eb3b585a34e7b751f494fbe7250a9eda1b463547c4442cebd849a64f115bec0796a651c68

  • \Windows\Installer\MSIA73.tmp-\Newtonsoft.Json.dll

    Filesize

    85KB

    MD5

    fdc7cb39a45de55020c2d04a35d01d85

    SHA1

    b1970d7170c76262c5c86a24e3566af900e8612a

    SHA256

    8ef6454984b3c6f8b7fc289a75303053684fb8b84cb75e185149f50f44f3755d

    SHA512

    356a05364f6cdaf63c0084f098dfcb1070052f3516087a72d0b9b8dbb3c6a231be87b1317413aba3049c6825c2acf46d666e861b415ee3ccc8a2a9d29306edfd

  • memory/776-429-0x0000000002160000-0x0000000002210000-memory.dmp

    Filesize

    704KB

  • memory/776-425-0x00000000004C0000-0x00000000004C8000-memory.dmp

    Filesize

    32KB

  • memory/776-421-0x0000000002210000-0x0000000002250000-memory.dmp

    Filesize

    256KB

  • memory/776-420-0x0000000000430000-0x000000000045E000-memory.dmp

    Filesize

    184KB

  • memory/776-444-0x0000000073100000-0x00000000737EE000-memory.dmp

    Filesize

    6.9MB

  • memory/776-416-0x0000000073100000-0x00000000737EE000-memory.dmp

    Filesize

    6.9MB