Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    672s
  • max time network
    619s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/04/2024, 12:12

General

  • Target

    PPClientInstaller.msi

  • Size

    5.5MB

  • MD5

    00980613a95af934dfff12eea77d3bd4

  • SHA1

    8d9869186bf6236dcfc75891879d4afe817534c6

  • SHA256

    60a85ea9008ff6df7260d2a4e325fee8658ed8df5b90b80ae85a4f8c8ce8f9a3

  • SHA512

    ea7801151c02bb67ab32f3aefb7daec4cc9ea10a18df410919059efbaa4c2c5faeb2bcd00d1ba5b830fe480e9f87697e48c40aebee7810e2d584a2729c8bb67e

  • SSDEEP

    98304:OGII8+2hdfoVEZfPqMg0sloe7Rx3LqxHksWFTfSGa3k/1T+P2wG5Nlzp:/12hZ6EN+O+R1qHks8TfS30tT+UN5

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\PPClientInstaller.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1932
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DCC0A754F47651CE0E5C4DA5AA2DDC57 C
      2⤵
      • Loads dropped DLL
      PID:2880
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\PPClientInstaller\Install.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Windows\system32\java.exe
        java -version
        3⤵
          PID:792
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c java -version 2>&1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1368
          • C:\Windows\system32\java.exe
            java -version
            4⤵
              PID:1568
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
          PID:2364
        • C:\Windows\system32\DrvInst.exe
          DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000334" "00000000000004E0"
          1⤵
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          PID:2728
        • C:\Windows\system32\mmc.exe
          "C:\Windows\system32\mmc.exe" "C:\Windows\system32\services.msc"
          1⤵
          • Drops file in System32 directory
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2984
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          1⤵
            PID:1528
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0xc8
            1⤵
              PID:1772

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Config.Msi\f770ec2.rbs

              Filesize

              7KB

              MD5

              1a890ef5d9eeb89cfb850724834d2bf5

              SHA1

              d9f7eb07e3c63fa4d241536a3c3a93742b54a028

              SHA256

              475ac8ac2e376fbea0818557720e58dac7e8878ac9aae11dd4106c9fc30264e4

              SHA512

              815a373bcad1ec9990250711dc12657e6b706b103348063abc214421766bb55d700715994456de8a44fc5d770fd3d3d63cfe50ebfc0ce814515abee8da2c81ca

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

              Filesize

              471B

              MD5

              ddc479d21c448dfbcf2f85fe1e7534b9

              SHA1

              d2b4da585aea51fc5fb2c347f7272627ca0baf31

              SHA256

              bbf9ee059bd896cb6b041ae66e3e04613f8edf7928a75d1798e2a6c4c0d24ae3

              SHA512

              880337e34f966452886036fe2570e1bef26bd629ff3918a1140240c4d2c54a03034cf313d058d7d25b201860f1882d558eb84a749625156959a95ed63863b46e

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_E241BDBAADD09335A51B5C97D3F911B3

              Filesize

              727B

              MD5

              4af21687b21f32b5c93de9c9c48e287d

              SHA1

              a00c812c9ba609725bd5baed90bffa6e2ed0a44f

              SHA256

              01fd4137773d5fae85df800ffb5aca9d0698f38203a223d1132108f3ba1d5a28

              SHA512

              678db0cfc43969f5419e8276a885d847cc852fd4021545eaf25d770dc126608a09b2b4f155e88288f7d68d27cbc47e306d44de7998ce092199d014d4fb4b1f56

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

              Filesize

              68KB

              MD5

              29f65ba8e88c063813cc50a4ea544e93

              SHA1

              05a7040d5c127e68c25d81cc51271ffb8bef3568

              SHA256

              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

              SHA512

              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

              Filesize

              727B

              MD5

              5a2f55932a33a33eb8a332f8d9a633c4

              SHA1

              132a352b4a40c3ed0452c2388119524a9874c9d0

              SHA256

              666a6c6c02f553c7b188feec8ca392314146ca6dbc1f7dc9050d47d3585837c4

              SHA512

              be18e8372bb88a4318e65b682c0714b2a9790bd21ae4d6de280351b954c535890071495f2990f4e5807ed2fd83aa9b5f33beefc85035533ec9a3cfe738122be7

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

              Filesize

              400B

              MD5

              5af95a11223649666c7db86ab0f395d0

              SHA1

              cdf5a2b20303e58f642f29eeac6df88897b55517

              SHA256

              8c41dd8de02e2c89bf0c6c427c18de1cc6266e5771a3be147f8730914f1cdab9

              SHA512

              9a6310458ff48c87756922c35aae4d2f2f8d690ec551efd8a4b1355b02c478987aca3021e47d9cb61f557d49ef449266585e3aadf5c35b6f7473bb5a6cf1afe6

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_E241BDBAADD09335A51B5C97D3F911B3

              Filesize

              404B

              MD5

              6be3fde49ccedcffe055406599c97e2b

              SHA1

              6c4369c3cdcf038be10ff58d0e8d57cca29bba75

              SHA256

              7520067ebd6c166d8abbe1ee059069858bb82a102ef88c1d1089d2aff524098e

              SHA512

              2af1dd98e69d3134c08597f8cce33eedd6cb421e664d4ff6a162da22e979645dd89a09afbda93ed5f97d669566f8f5dda5b40bf686c3860d7ed6930783e684fb

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              d97159630667febf020c0125bc24dbe6

              SHA1

              a34bc1c5da58558e513b572b57778c57d042fad5

              SHA256

              d1a5d3ebc91effa3913f15647c4ba8d2ebe561d749159477968e9fc426d4f249

              SHA512

              01283adc24867c1b4454cffecbd199ebc85fa9c04d4d494174b52b2472de1a29297770445aa469fd0ec6b0632dfa50b3332db1a768616e6af8db8046a0b55a72

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

              Filesize

              412B

              MD5

              3964ce7f0ea4b5418edc462230be0768

              SHA1

              61e379b7a306cdf8fe57fcb4146b67b66fa075cc

              SHA256

              29d122defdbfbb625bc357eb23c9cb939f44727e35ee22e254b59f2af5717a16

              SHA512

              539cc6665c9dc1e573c64290f9e1628f6b6fa2180054e3ba8f73ec63d17e7a9bbb156e6bef00ba3acfbf46e12ed91a409ef0370a395ae73dc4d69028941e7b71

            • C:\Users\Admin\AppData\Local\Temp\MSIA866.tmp

              Filesize

              74KB

              MD5

              bb373102912c77f80a4bf5089391f1b7

              SHA1

              e5b67e597690af18e8f5271520946f856f86750a

              SHA256

              0fd225cb064e60e864a001c687274abb3dc774f1820f2afefc6b14b838e939f2

              SHA512

              0133669aa262f5392121f44616978c178dd7c7c63766dc0f25421b2616f6b301936b97759c453f537e600bdee3ea940c4d29a9d5b7acac20e69b7c4ba1b39dad

            • C:\Users\Admin\AppData\Local\Temp\TarF6D.tmp

              Filesize

              177KB

              MD5

              435a9ac180383f9fa094131b173a2f7b

              SHA1

              76944ea657a9db94f9a4bef38f88c46ed4166983

              SHA256

              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

              SHA512

              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

            • C:\Users\Admin\AppData\Roaming\PPClientInstaller\Install.bat

              Filesize

              1KB

              MD5

              44972c406eee830c152ff39189201db6

              SHA1

              4d121abd15769358ca7d54f2eac2da5584bcd97f

              SHA256

              44632019c05c4adbed38cd68a9de20c103fb39c6460140f28fdf5b0db7218e66

              SHA512

              0c216b7ea7fb544c7e4aa7d7f89f6a5725b8085fdc4197620be5f8475791ff90b030349929c1c34d14f51081da577953371de9e5cf4bd3b1ad412afe6f1dbbcb

            • C:\Windows\Installer\f770ec0.msi

              Filesize

              5.5MB

              MD5

              00980613a95af934dfff12eea77d3bd4

              SHA1

              8d9869186bf6236dcfc75891879d4afe817534c6

              SHA256

              60a85ea9008ff6df7260d2a4e325fee8658ed8df5b90b80ae85a4f8c8ce8f9a3

              SHA512

              ea7801151c02bb67ab32f3aefb7daec4cc9ea10a18df410919059efbaa4c2c5faeb2bcd00d1ba5b830fe480e9f87697e48c40aebee7810e2d584a2729c8bb67e

            • memory/792-94-0x0000000002080000-0x0000000005080000-memory.dmp

              Filesize

              48.0MB

            • memory/792-101-0x0000000000120000-0x0000000000121000-memory.dmp

              Filesize

              4KB

            • memory/1568-113-0x0000000000430000-0x0000000000431000-memory.dmp

              Filesize

              4KB

            • memory/1568-112-0x0000000002020000-0x0000000005020000-memory.dmp

              Filesize

              48.0MB

            • memory/1568-114-0x0000000000430000-0x0000000000431000-memory.dmp

              Filesize

              4KB

            • memory/2984-124-0x00000000023B0000-0x00000000023B1000-memory.dmp

              Filesize

              4KB

            • memory/2984-143-0x00000000023B0000-0x00000000023B1000-memory.dmp

              Filesize

              4KB