Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 14:31

General

  • Target

    CapTalkSetup.msi

  • Size

    22.0MB

  • MD5

    73137946a664fcf4c79a8d4ab7e3e90e

  • SHA1

    f9c0dd55ba400af20bab9fd9faf881c361810700

  • SHA256

    1ffe8209764db06b2f65a1bf47d208bbd7c08f5b31d5f798ba6b397f04ae421c

  • SHA512

    d7e122b43a4d8bc52386a4d2919091a4a3ff4e7900883f5242e6e8b646b6514081d95c9d748947088b8e47b2798709ade3df5c54b0d232a3445b3c9ff66d06af

  • SSDEEP

    393216:oRXWmhkB2RevIOXmc87p5jcCknXXnS4BzYRzgG8vccAzT1H//jA44:7mS2GIumc8jjcCmBzQsGt/t4

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 39 IoCs
  • Drops file in Windows directory 23 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\CapTalkSetup.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3040
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Loads dropped DLL
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C152A153297618AE99DDDC5781B2FC46 C
      2⤵
      • Loads dropped DLL
      PID:2428
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 15D7BAF486244B47D0F86385DE7DD48C
      2⤵
      • Loads dropped DLL
      PID:2296
    • C:\Program Files (x86)\BECOWare\CapTalk M-6280 Series Model S-6280\USB Drivers\dpinstx64.exe
      "C:\Program Files (x86)\BECOWare\CapTalk M-6280 Series Model S-6280\USB Drivers\dpinstx64.exe" /f
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Executes dropped EXE
      PID:1956
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2928
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000032C" "00000000000004DC"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:1192
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{0b1c524e-faca-1a8b-77dd-de4297946c58}\beco.inf" "9" "63fd6b05f" "0000000000000300" "WinSta0\Default" "00000000000003B8" "208" "c:\program files (x86)\becoware\captalk m-6280 series model s-6280\usb drivers"
      1⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{7a8e3d69-4829-6f0f-e7b0-5e2a6acd996b} Global\{7e044caf-1beb-2ecd-ecd5-956653b7bb12} C:\Windows\System32\DriverStore\Temp\{62ccaf94-a33a-5fab-ca9e-df0f09592b5e}\beco.inf C:\Windows\System32\DriverStore\Temp\{62ccaf94-a33a-5fab-ca9e-df0f09592b5e}\beco.cat
        2⤵
        • Modifies data under HKEY_USERS
        PID:2084
    • C:\Program Files (x86)\BECOWare\CapTalk M-6280 Series Model S-6280\CapTalk S-6280.exe
      "C:\Program Files (x86)\BECOWare\CapTalk M-6280 Series Model S-6280\CapTalk S-6280.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f76ece0.rbs

      Filesize

      20KB

      MD5

      1b009f43464d12cb14214b7ab00d7b17

      SHA1

      1f46672135178f85ba2216f25021bd04c63461d1

      SHA256

      74354f8e344b7ed7e5afb63229bef3e146de3a2c14e429fb1cc416409f5a1702

      SHA512

      2c2a2b709301020e5e66664aceb624cb906e0077baf6763681f8f50bccd02f133f64d468917db0f7e3f13b08c2bf5a1b3e37f3a180cce6e5b4497800db873fde

    • C:\Program Files (x86)\BECOWare\CapTalk M-6280 Series Model S-6280\BasicControls.dll

      Filesize

      308KB

      MD5

      49c1bf9fa936459912b8e5a4ace28310

      SHA1

      6007e77a36e867fa5f302a87d8f412c8eba3026b

      SHA256

      a971bf658fd921c6e385893244015ff4b5ad0fea6def12cf6a4f64154cbabf59

      SHA512

      4c033ba4e4beac0498ec2e5ddc07eb6efdf2cb0d729ec0c61e517396a2ced86d6e73038a0cc340e3828911166cda0c2b82a1acf7d69822af3e84ec29f08c5002

    • C:\Program Files (x86)\BECOWare\CapTalk M-6280 Series Model S-6280\CapTalk S-6280.exe

      Filesize

      322KB

      MD5

      ef8b2c59d036cc3d180febd88009c466

      SHA1

      39bd856b08d8e166ff77df80e145d2fd899647cf

      SHA256

      a3f66833257309e0911068817437c020a79cf4f8b606c7712e1b0ba89dc9ea18

      SHA512

      141baadf52f7c293fe1c4b8b1f7cbff39d11dda2aae60f9d017d8be4a1c8ab1d9ad5182bdeb77d9d101ee953b165255dc6ecc076aa8a99f37ea6fbd10098351d

    • C:\Program Files (x86)\BECOWare\CapTalk M-6280 Series Model S-6280\DNP FILES\M6280A_dnp_V03.13.06.xml

      Filesize

      85KB

      MD5

      4b6c0c84d74e958475d89404d6b479aa

      SHA1

      bd8037e497980ed4ab6d233305df58c1d72de644

      SHA256

      a8a4d277ef0cb082f9ec92aea1acee3ae5e8452f835e30e57d3fdd02f0d53b73

      SHA512

      44b1083fa7744fce9cd54d25054e9d5bc140d4390925aca9057c866c7d50ad440ea90a3b5061efadd66723d0b923a3e4363ea18fecd1a3281d70116d05863d4f

    • C:\Program Files (x86)\BECOWare\CapTalk M-6280 Series Model S-6280\Devices.cfg

      Filesize

      14KB

      MD5

      8cc98f01b10f787e1270421a40ef1a54

      SHA1

      319521884465ffb978e6f6959a333e079c1b0b2f

      SHA256

      8bdb3a5f3927851fcc346e7e4bd0137b74c1e2b6bc39f871da310f069dc0c46b

      SHA512

      0eb1562fa1cb3cf9c4afaca46541ab7d88c7a0599975ef34d7285fa177fb3e4f3b68333bf05d16768a9d73756dcc34a60147254426809a6fd336441cd86a9b0c

    • C:\ProgramData\CAPTALK\S-6280\CAPTALK.xml

      Filesize

      120B

      MD5

      8c375891f9cd3a649d66a078439ad496

      SHA1

      9c24cc506eddf7be121fc1c2bfd5625096e0da51

      SHA256

      599210cbc0e7fffa6b2d3f7c26f090c0e6684cafee6b55c4e84af0473d2b7841

      SHA512

      cf6b03ba614a3e1e75f3ae1ca9e549fdecf165601f4817581aeac015ae0bba30d038d09293ead122a9476991dda72b2e1d7bcf2705a455e4ce2e2596a7ff2259

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

      Filesize

      471B

      MD5

      6e60c7d70f253cbb0fe9e4334cc493b5

      SHA1

      290ff5123a064905b2c5486084617bd230665608

      SHA256

      4d87456c38bb4c374d8e65f86a16165d991c3f925298d14677814ff1a4c3a454

      SHA512

      fd6664180fc351d412d25a15f427fa3bca27706395cc0ae12d99a71e4874213d4a4afb513dd282d9ca2122433df88e8f0ecf2a77fc091500f25c57521ccfc474

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_8CE18CC9C36B05C7F783250A89467500

      Filesize

      727B

      MD5

      f1a0b5728d8c7b23d4aee89361667133

      SHA1

      8153bda3d0fb7a2f28b6e5c36824508e47113099

      SHA256

      5b63e4d7f1eb93fa113961099d1015cb32e34df3708db27577503c238040a77f

      SHA512

      3b3e7a191171ae69134fb3a093a9af6b669a9af5570abb644a408ee0a8e0dce4552d76eba2913bfa1b57e30b93cd70ac1483c77c2d33f613b9f0c60520b80c45

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

      Filesize

      727B

      MD5

      c95296415b0542e4ed1c124b3ad3aac5

      SHA1

      8ac2e9105e61504d4b2815e8eb63ed9604d76ced

      SHA256

      41b41335a4341612da1cf360c5dee5d8d7953f042536d2ad4a6521e82c6226d2

      SHA512

      955e8667da578bca010a01e74ac243bedbb9b28e3515b0b12c9f38959d5dd269e31bf86c083e66bc7a62a334d575ba46fd5c6b5fa815ac6f33ea34e72adf6128

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

      Filesize

      400B

      MD5

      b8d25542274d012e3ba8bb3f2fcfa7e8

      SHA1

      587a14909e2991a2950f81ac543abd54611ad7a9

      SHA256

      700f930d0a61c6e47dea05d224b0a74b01b7f58f100595ed29ed370b8a8159fe

      SHA512

      f3e037ce9f534ae8987bddeb0720ee244d88f5f919ae8b9e547a8b619fcdc89dc6bea639ca325bfa38593f2ef2eded330c65361a93f39282daed8a6cae9712d6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_8CE18CC9C36B05C7F783250A89467500

      Filesize

      412B

      MD5

      21fe94cdc90bcc31de166a499ab88cfd

      SHA1

      fb35413c3fee081aaf6c35594c334ce6273c0b2d

      SHA256

      b6aebcfcd195f04e6344d57f3359048bc2b11e92662394d9ae5161a2a30c6636

      SHA512

      4cdc9229aec9002895ee8e03641fb423fafc2d71225da9260a5fddaeb6f519632ec7b61cb63ce8dbfd8dd1d610ab98dd5782bbdf2ca3cf84be5dff49dd1f2f15

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      073e4cc121fef47e7ac0cfba40dde0eb

      SHA1

      2368e8919cff909cda200575d4944291321565bd

      SHA256

      28072da441f4d02be6d2af8e75979735675b08b1f6418e0f6701be5005e3cbba

      SHA512

      c8015a1df935caba5926049d13196d9559a5674f450d155cacbd3054c23648834a5c712a678db812f4a04d3396580017128b519183b74e1d5112bdad870eeaa6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

      Filesize

      412B

      MD5

      1ee52df5f3d3e46b406e3045549a17c9

      SHA1

      bb324bf62b2c274b454455520d2d6ff9d85aff9d

      SHA256

      648f27da25c942ea18f44f6f5d49b36e4b93565b5435ad395a0686cc00090e44

      SHA512

      f37fc556094719e5225dabe2a30631a0a6f7aa19a501ba2396a8653fcd81341b612fd92ee70e04a19676f80d4637649b0e7a33ea3c37e938b7a009be95d2fb18

    • C:\Users\Admin\AppData\Local\Temp\MSI4F20.tmp

      Filesize

      231KB

      MD5

      5494165b1384faeefdd3d5133df92f5a

      SHA1

      b7b82805f1a726c4eee39152d1a6a59031d7798c

      SHA256

      ba0ad3a4d2112b269e379a2231128e7ebe23e95d5d04878d6ee8815e657bb055

      SHA512

      ecd5012df2a060fa58664e856a84716f162d3420e7a7a1368612451ec65f2dcd674c7031d780a6c9d357700f6baeb31325748bc29270850ee4070079f15be613

    • C:\Users\Admin\AppData\Local\Temp\TarEE56.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • C:\Windows\Installer\f76ecde.msi

      Filesize

      22.0MB

      MD5

      73137946a664fcf4c79a8d4ab7e3e90e

      SHA1

      f9c0dd55ba400af20bab9fd9faf881c361810700

      SHA256

      1ffe8209764db06b2f65a1bf47d208bbd7c08f5b31d5f798ba6b397f04ae421c

      SHA512

      d7e122b43a4d8bc52386a4d2919091a4a3ff4e7900883f5242e6e8b646b6514081d95c9d748947088b8e47b2798709ade3df5c54b0d232a3445b3c9ff66d06af

    • C:\Windows\Installer\{51DECD58-63FE-4EA5-AB32-B7139D3F2FB9}\_831F1991D64B517E904204.exe

      Filesize

      766B

      MD5

      4a7a1e7e7a98bf69082ef12699f30feb

      SHA1

      176ebade5f152c33403b23c3e06042191d7bb0cf

      SHA256

      001294756c87e0903ef7d6b13607378614d3a1f2b30bd28fe4b2ff4380a16cde

      SHA512

      13640ad80b795d01e693b4361110603803b5f4060b1b3d9812bedbc84ce2501d0a05ac0ef4448398106eeca5031e9452c860eec2b9714a15a4e1e2696b232959

    • C:\Windows\System32\DriverStore\FileRepository\beco.inf_amd64_neutral_6a871fe0193c1534\beco.PNF

      Filesize

      7KB

      MD5

      22c69f3fa9a8c3da0612e41aed56305f

      SHA1

      15777b5a76e2920bdecb922ca0f821b8c24d2479

      SHA256

      205bc769635b3058d7f24ec101695a27b18c545d263fdf34d07a01bebe7c4f77

      SHA512

      f19e7b054c5881ffdca721eb01758df5aa169a6df469928f94bb9509d0dd8a2c3b87e1a4cd217594f783b25bed308d96700e3fc288a05c894b856aebc1182213

    • \??\c:\program files (x86)\becoware\captalk m-6280 series model s-6280\usb drivers\beco.cat

      Filesize

      11KB

      MD5

      aa820cd50b9e373b2bd16bbab7f8cba2

      SHA1

      ca0a64d9b865dc85e676f1a5e833db3ff5a35a5f

      SHA256

      d7a4ae53ded255d53a78545d9b66d0c936afc54701b3e51b728dd673c581f7ab

      SHA512

      758c0ac32c95f4f69193d5dcb096e0108aa80a826e99eadc2bfde76b7ce8d196a1e8cce6ab9fe20f3c421b591c9ff72d0af42e0ef13325a3e7bf7384b9b9eefc

    • \??\c:\program files (x86)\becoware\captalk m-6280 series model s-6280\usb drivers\beco.inf

      Filesize

      2KB

      MD5

      0ed3a9c7fc84f3654a3e526112212eeb

      SHA1

      77b97dc5d5ed89698410a91753a53b9302fb016c

      SHA256

      9ad980c0f5a718b9d7e2dfe201f1a51da991cae7cef113baa1ee95adfb8c8731

      SHA512

      43f7e93f9124527427147e29482fe6ebd5c7cf0a2f23150d40a5bb52040a877f3812ed9680fc617b20b22abbf9a75df0b67ef529be7cfad92aa0cea3fc51f1e2

    • \Program Files (x86)\BECOWare\CapTalk M-6280 Series Model S-6280\USB Drivers\dpinstx64.exe

      Filesize

      666KB

      MD5

      2f016e7f3a600f6f507a9fd26d5c0762

      SHA1

      bbed11f79756cec74782001c8eda3fb1fe512b65

      SHA256

      37b6e09fdd3691444514fbc7ab87f213b55fb0c8ba6a4c80cd508a7758588475

      SHA512

      c0dd42b9ecbf358f036a73fc2f82e6aee18138fdc6e644cf8fd1b3926c52d5e06bb17ebfd74aa1c293662b34a22c29b6879622aa5058f55431819d6538687c43

    • memory/1636-195-0x0000000074150000-0x000000007483E000-memory.dmp

      Filesize

      6.9MB

    • memory/1636-194-0x0000000000BD0000-0x0000000000C24000-memory.dmp

      Filesize

      336KB

    • memory/1636-199-0x0000000004CC0000-0x0000000004D00000-memory.dmp

      Filesize

      256KB

    • memory/1636-200-0x0000000000460000-0x00000000004B0000-memory.dmp

      Filesize

      320KB

    • memory/1636-205-0x0000000004CC0000-0x0000000004D00000-memory.dmp

      Filesize

      256KB

    • memory/1636-222-0x00000000021E0000-0x00000000021E2000-memory.dmp

      Filesize

      8KB

    • memory/1636-223-0x0000000074150000-0x000000007483E000-memory.dmp

      Filesize

      6.9MB

    • memory/1636-224-0x0000000004CC0000-0x0000000004D00000-memory.dmp

      Filesize

      256KB

    • memory/2084-165-0x0000000000430000-0x0000000000431000-memory.dmp

      Filesize

      4KB