Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    35s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 16:16

Errors

Reason
Machine shutdown

General

  • Target

    SInstall/Install.msi

  • Size

    12.9MB

  • MD5

    30dd26075a5ca7a4861e9214a99d0495

  • SHA1

    c719f6d5be2f3edd98c0d15fb506b9e880da0494

  • SHA256

    d2e7fb1c52b9edab4d7f24c3abfde4f40fc7b30fae146d54f7a19e8b8aca41a9

  • SHA512

    2427b37738e3f472641b516efa661e4f8d351d93e39324f9ebffd0cdd3cea51d96fff7d473658989e0280fecc3b3e02eadece8c5a14fe5c5c7cf8ad906ee331f

  • SSDEEP

    196608:ZM20xOGXi3lb4LU49Vqo/Uq1b4BATrwt0t1y5ur3Q9Jdj4IiV61flezGT8Dp:r0xfcbgh9VqB3BwwMr0/d0at8D

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SInstall\Install.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1752
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 241BC0B6C143A4385C5F851727A74256
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:888
      • C:\Windows\syswow64\cmd.exe
        cmd /c ""C:\ProgramData\Redist\Oun.bat" "
        3⤵
          PID:2236
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /RU "NT AUTHORITY\SYSTEM" /F /RL HIGHEST /sc onlogon /tn "\User" /tr "C:\ProgramData\Redist\Pun.bat"
            4⤵
            • Creates scheduled task(s)
            PID:1732
          • C:\Windows\SysWOW64\shutdown.exe
            shutdown -r -t 0 -f
            4⤵
              PID:2108
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1092
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005B4" "00000000000003B4"
        1⤵
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:1428
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        1⤵
          PID:2348
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x1
          1⤵
            PID:2952

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\f7686de.rbs

            Filesize

            8KB

            MD5

            54b5e634f66ce94cdcf2e6ed4521ee15

            SHA1

            b027b9d9ad358d7a857100e779e5ef33a9860157

            SHA256

            1bf0f67aff6b895b767efe4dbd39a06280475d123c6114c691abf33672497dbb

            SHA512

            049604912f7c558a9804ec05f8d3c895b18ec48e3eab5595299eea59c5d5eb9b13b4f2ff305d6127f67236f49596df91559381fa541eb384529c1f50d2fc2a7f

          • C:\ProgramData\Redist\Oun.bat

            Filesize

            153B

            MD5

            fd54e5069171fa7cd80ab43dd1d5f385

            SHA1

            0df9b2617b18f6ca4cfb50bb0490bc2705b077a2

            SHA256

            2494d97e37f626f039570b249929a93f0a41adc68bfc611a01dea5112b3a69fe

            SHA512

            d3e5e8fdb2eeb9534df32230a93977ffd4b4963549279c036a08c4c2ba02b9a8482c0ab37623ac3d5ed84c258d0c0696eb6a7a276cd5c706852f3440016d4125

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8555326CC9661C9937DC5053B6C38763

            Filesize

            1KB

            MD5

            866912c070f1ecacacc2d5bca55ba129

            SHA1

            b7ab3308d1ea4477ba1480125a6fbda936490cbb

            SHA256

            85666a562ee0be5ce925c1d8890a6f76a87ec16d4d7d5f29ea7419cf20123b69

            SHA512

            f91e855e0346ac8c3379129154e01488bb22cff7f6a6df2a80f1671e43c5df8acae36fdf5ee0eb2320f287a681a326b6f1df36e8e37aa5597c4797dd6b43b7cf

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            68KB

            MD5

            29f65ba8e88c063813cc50a4ea544e93

            SHA1

            05a7040d5c127e68c25d81cc51271ffb8bef3568

            SHA256

            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

            SHA512

            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            1KB

            MD5

            a266bb7dcc38a562631361bbf61dd11b

            SHA1

            3b1efd3a66ea28b16697394703a72ca340a05bd5

            SHA256

            df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

            SHA512

            0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8555326CC9661C9937DC5053B6C38763

            Filesize

            326B

            MD5

            53ae7a8a5a9f60177afe0792e49d043f

            SHA1

            c01b9200cbefaa3d7d5a0a1e5a8ff789e8d7518f

            SHA256

            1bd96035b42c19964b7b5576f9262396a98a61b307534574be6e5d54e869daa9

            SHA512

            f9fd4f5070b3a86c14f44d3c9637aa9bd137e716ceb0499ea2845d645c4192ba777258d54a4a06df4445c6000b0a896c686895f9c1b86a054693bf590cf9a7d0

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            2b9ff9ff3c789148ea8fad21fcd106a0

            SHA1

            d838cfda3b3ad1cc53fb7b451b5cb8b6cffe0348

            SHA256

            57a586385bb6dbb236f01dd4922053c4af5707cf5be3ae444810a7ee3b94e615

            SHA512

            4c18f543b564025da2fe3e6d348b9307a4173776b07015f6a5786c3c7b2572a4cd09d9246b4c20343adb53e7bd10a4e3a0d3a3e533409d14532689860991ea93

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            242B

            MD5

            ba676decd440fe3c08494d345a0e98f0

            SHA1

            62666c04cf06a7ae68ca9f3ba784451956b32b61

            SHA256

            816afd7eea3129e5df731995666fcd830f9bfa0b5ca294c02e39640664f0f10e

            SHA512

            fa7c4939583b7f647b3cf4b6eb6a50c0d8e9ff659359cb76e8d8df107f3fa06c96157d3a279d67618eaeb2aab643922c3983ac4c8fd464604f8b5302fc4d3490

          • C:\Users\Admin\AppData\Local\Temp\TarEE4.tmp

            Filesize

            177KB

            MD5

            435a9ac180383f9fa094131b173a2f7b

            SHA1

            76944ea657a9db94f9a4bef38f88c46ed4166983

            SHA256

            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

            SHA512

            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

          • C:\Windows\Installer\f7686dc.msi

            Filesize

            12.9MB

            MD5

            30dd26075a5ca7a4861e9214a99d0495

            SHA1

            c719f6d5be2f3edd98c0d15fb506b9e880da0494

            SHA256

            d2e7fb1c52b9edab4d7f24c3abfde4f40fc7b30fae146d54f7a19e8b8aca41a9

            SHA512

            2427b37738e3f472641b516efa661e4f8d351d93e39324f9ebffd0cdd3cea51d96fff7d473658989e0280fecc3b3e02eadece8c5a14fe5c5c7cf8ad906ee331f