Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

09/03/2024, 00:10

240309-agetcabb6y 8

09/03/2024, 00:06

240309-adr99sac64 8

Analysis

  • max time kernel
    120s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 00:06

General

  • Target

    AMASS 2.0/AMASS/setup.exe

  • Size

    140.6MB

  • MD5

    0d8889f0d96f1564f8b990a297e48d1b

  • SHA1

    40d540ada5a734c711ddc8e1967816041dcc60d8

  • SHA256

    94c303148b663e9b069a4254d3a5d858bd14f173e0366053a1c0a076b49a1bf9

  • SHA512

    71caa952272355f290293edd571a3cea4d76f7c29efee5c17ceba8f68c30f2540b2b56835859b3856b5affb6f1b9fedf734c86f454c006f0edfda9c72625a123

  • SSDEEP

    3145728:eRFAvw1IEslZM6FCb9ymhlU8JxRiQtppxCAbWxeTbBJyVcAG09vvF34lMsZl:DiSFFCEmVJxcQRxdbWxGb7yakvyxl

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AMASS 2.0\AMASS\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\AMASS 2.0\AMASS\setup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\{10789B45-B0A7-4C24-8066-F2A69B14497A}\setup.exe
      C:\Users\Admin\AppData\Local\Temp\{10789B45-B0A7-4C24-8066-F2A69B14497A}\setup.exe /q"C:\Users\Admin\AppData\Local\Temp\AMASS 2.0\AMASS\setup.exe" /tempdisk1folder"C:\Users\Admin\AppData\Local\Temp\{10789B45-B0A7-4C24-8066-F2A69B14497A}" /IS_temp
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\system32\MSIEXEC.EXE
        "C:\Windows\system32\MSIEXEC.EXE" /i "C:\Users\Admin\AppData\Local\Downloaded Installations\{45C7EAD5-A76E-4803-9ADF-38D8A95B4990}\Malvern Panalytical AMASS.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\AMASS 2.0\AMASS" SETUPEXENAME="setup.exe"
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2488
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rmdir /s /q "C:\Users\Admin\AppData\Local\Temp\{10789B45-B0A7-4C24-8066-F2A69B14497A}"
        3⤵
          PID:1248
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 241B6E2EB6BB5EC42232CF7129F45F46 C
        2⤵
        • Loads dropped DLL
        PID:2912

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Downloaded Installations\{45C7EAD5-A76E-4803-9ADF-38D8A95B4990}\Malvern Panalytical AMASS.msi

      Filesize

      1.5MB

      MD5

      ee7a0d53f8e0161265397cbedef3df0e

      SHA1

      5572cf7bf1f789af5ccc91542e94301bb8e3020f

      SHA256

      8b1fc861587476b5e1ee09ac9cee9efa220b5bae9f38f3a3e60c591d2137c5f8

      SHA512

      cc4abc1adc5ee047cb439e7441edafc3c78cffcdf2cfca995ca5bdbd0a06ce4cb14758ae728928498ce70570e1a6673c92e15d59bf08dc248c0bd88485529f94

    • C:\Users\Admin\AppData\Local\Downloaded Installations\{45C7EAD5-A76E-4803-9ADF-38D8A95B4990}\Malvern Panalytical AMASS.msi

      Filesize

      481KB

      MD5

      b3159c8050c82aa44ec6125dbdf7bfd8

      SHA1

      f5ce47dab9c255bda8a3b3c23ab7314e318bca25

      SHA256

      f123c165f58974cf935ee73949cc6446f205496ec054659959f73c51b20bd31d

      SHA512

      fa6f08f8dfe1f5d081f42a7085f64d166d4130cf0d1b7c27c95ae7ae089665dea4923d3cfe28330b0917325786774a7b753cd49b7e3025f617053a1472fd0a72

    • C:\Users\Admin\AppData\Local\Temp\{10789B45-B0A7-4C24-8066-F2A69B14497A}\0x0409.ini

      Filesize

      21KB

      MD5

      a108f0030a2cda00405281014f897241

      SHA1

      d112325fa45664272b08ef5e8ff8c85382ebb991

      SHA256

      8b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948

      SHA512

      d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298

    • C:\Users\Admin\AppData\Local\Temp\{10789B45-B0A7-4C24-8066-F2A69B14497A}\_ISMSIDEL.INI

      Filesize

      592B

      MD5

      2e1ebab6bfd816996b5d2bfd2723d785

      SHA1

      b086364c4fffecb1726b8ddc31095f4f5fd5f9f4

      SHA256

      68bd603453d8cd97004ba774c7c3dc5d0cff22b33b7ab84773350a215d9cb7ab

      SHA512

      1fc387c5f5f88ff12068db80396899ce322bd0be481fd2b30da2eb700f611b14af86d2f975531d55bcb4b9daaa2fe731edd28afbf31e9a786ef71c719c134ba7

    • C:\Users\Admin\AppData\Local\Temp\{10789B45-B0A7-4C24-8066-F2A69B14497A}\_ISMSIDEL.INI

      Filesize

      20B

      MD5

      db9af7503f195df96593ac42d5519075

      SHA1

      1b487531bad10f77750b8a50aca48593379e5f56

      SHA256

      0a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13

      SHA512

      6839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b

    • C:\Users\Admin\AppData\Local\Temp\{10789B45-B0A7-4C24-8066-F2A69B14497A}\setup.exe

      Filesize

      3.9MB

      MD5

      9d7597e3b0aada6420261665f60b6454

      SHA1

      383f2f5da705616b929a3258b078467cf90d60db

      SHA256

      589ef0563142ff109e97314b377e56bbed37b1076c68636c74ea6c4d1b047546

      SHA512

      72b0badb32b3f69ae4471d722dc7a08701a78d947817865a80c75025dccb876b1f81e3a85ae492f77eda807c68cea052d032080d00810bc2c511646b673ef642

    • C:\Users\Admin\AppData\Local\Temp\{10789B45-B0A7-4C24-8066-F2A69B14497A}\setup.exe

      Filesize

      4.1MB

      MD5

      65394690de3154cb78fcbfdad7f87950

      SHA1

      8f82376f1dbbb2c8b025d218a4122a3690476284

      SHA256

      cb32a08493fbff1588a522597b332331f3fd77c176cf9de69b5f58b56c3108e7

      SHA512

      df4e3ac12a1d4d6a9b0ce904dcbcf5923dc4b57ada6c67b66ffaecd41ff4e38cd45c19a5abcedc74d2a10b5fd5c8d2de9f5f4e7c0c290cb1de82f4ed1c8c16fc

    • C:\Users\Admin\AppData\Local\Temp\~5C26.tmp

      Filesize

      5KB

      MD5

      dd495e2afa525e1db9450d2de7fc4745

      SHA1

      22cabae8a286d26af8aea8ea1dcfb946a0d9de47

      SHA256

      5425ac9206290d4bf84f8f49b442439bf44fe1bfdbbc18d7b486796261dce87e

      SHA512

      48cc7ec3b2e7ceebd586a13b1b5782d3d26c49b17be482b2733ae6d82f213c2f6654b63a88a4bb1e7d4dc381793944f6cb2384afca83a415956aef3b3f8152af

    • \Users\Admin\AppData\Local\Temp\MSI82C7.tmp

      Filesize

      165KB

      MD5

      b5adf92090930e725510e2aafe97434f

      SHA1

      eb9aff632e16fcb0459554979d3562dcf5652e21

      SHA256

      1f6f0d9f136bc170cfbc48a1015113947087ac27aed1e3e91673ffc91b9f390b

      SHA512

      1076165011e20c2686fb6f84a47c31da939fa445d9334be44bdaa515c9269499bd70f83eb5fcfa6f34cf7a707a828ff1b192ec21245ee61817f06a66e74ff509

    • \Users\Admin\AppData\Local\Temp\{10789B45-B0A7-4C24-8066-F2A69B14497A}\setup.exe

      Filesize

      5.9MB

      MD5

      679d0e0b7eecd75c2857b42c81ef6a49

      SHA1

      03118ac4d52af684fdb8ea05cb42cceded73f32f

      SHA256

      34d6fbcfba5e9bdad3c2ea8e85ecdd2930dfc955519ac17998ec9c9a66a661f6

      SHA512

      bfb1af299263cc2d1bcf95e47a729753fbddab7e1f04099a86dc3e46853d6fc0174cf22574375c51ff5be64fe9f761e2528d3bf5e50c6bf5e1b6bc0e2ac4fc14