Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2024, 22:21

General

  • Target

    94bc438fe73af777b3339972a5e4e5d93cba3e937a134a27e7ff4fb41d7eb62a.exe

  • Size

    7.3MB

  • MD5

    eaa9e76db93e9fb08f82f7efb39dabcd

  • SHA1

    48b0965b735e3600deb6652b26873e01ec681408

  • SHA256

    94bc438fe73af777b3339972a5e4e5d93cba3e937a134a27e7ff4fb41d7eb62a

  • SHA512

    b5ea15f76a340c0e1bc59861f77b1d47b7f6ac49ac7dcb271cf85573a45b7fe3661e8df74438a52bf0ba9a5a8c8759d654e65a03232e5936e6125f1a3bcda225

  • SSDEEP

    98304:/yDQkeSLhuba4o3r0fCjA5DT08GHXngvuHEkvPj/zODZVWsikrdrn+oulLguUra0:mQTSLXg6r8G3n4uHNeVThrdrn+F+1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 8 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\94bc438fe73af777b3339972a5e4e5d93cba3e937a134a27e7ff4fb41d7eb62a.exe
    "C:\Users\Admin\AppData\Local\Temp\94bc438fe73af777b3339972a5e4e5d93cba3e937a134a27e7ff4fb41d7eb62a.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\MonKeyDu\zj 1.0.0\install\B22545E\zj.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\94bc438fe73af777b3339972a5e4e5d93cba3e937a134a27e7ff4fb41d7eb62a.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1715916707 " AI_EUIMSI=""
      2⤵
      • Enumerates connected drives
      • Suspicious use of FindShellTrayWindow
      PID:2240
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 66ACB74A3683EB66ED09AA2C4E36033B C
      2⤵
      • Loads dropped DLL
      PID:3660
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2324
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 6D9F391F08ED4AB9C9C1BB7DB86F5062
        2⤵
        • Loads dropped DLL
        PID:3084
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 75098DC1A6935A18C7FDB65D3F8DD632 E Global\MSI0000
        2⤵
        • Loads dropped DLL
        PID:4376
      • C:\Program Files\MonKeyDu\zj\数据处理器4.7.exe
        "C:\Program Files\MonKeyDu\zj\数据处理器4.7.exe" start
        2⤵
        • Executes dropped EXE
        PID:4964
      • C:\Program Files\MonKeyDu\zj\svchost.exe
        "C:\Program Files\MonKeyDu\zj\svchost.exe" start
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4652
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic cpu get processorid
          3⤵
            PID:1952
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic diskdrive get serialnumber
            3⤵
              PID:4296
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Checks SCSI registry key(s)
          PID:5076

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\e57665e.rbs

          Filesize

          215KB

          MD5

          cde9b66f4dda99793d497ce682233485

          SHA1

          62f31d1f79c86be4e8850929c83ff658ca821501

          SHA256

          5c3d43db26f4d31ed14d38e6be56b56d157536c9263a680f790d2de0dff67dc7

          SHA512

          57cf61ed10073cfb7ad25c07475c92821f6bc3e9399ae06e3ba85d2cad87b79c25abbf813ae8732ca1d25d8b3338822b2f7fd40cd560d4ac66507ab3f4aec194

        • C:\Users\Admin\AppData\Local\Temp\MSI3588.tmp

          Filesize

          587KB

          MD5

          c7fbd5ee98e32a77edf1156db3fca622

          SHA1

          3e534fc55882e9fb940c9ae81e6f8a92a07125a0

          SHA256

          e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6

          SHA512

          8691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a

        • C:\Users\Admin\AppData\Roaming\MonKeyDu\zj 1.0.0\install\B22545E\libcef.dll

          Filesize

          5.6MB

          MD5

          a02f756c1f46697a79855e1b307f07c6

          SHA1

          d9bc053fe67f638dbfaed19323f8de4ca76e8013

          SHA256

          d53875560cdd7144439812a4f948a9992ffc8d34c1d9545b0e27f55c47e20c8e

          SHA512

          483355954218a486ca79cd72d2b4db437f1710ccc2670233bff8c2a4b4457db715ef83a826c79a70928266169b2054bb53be649643fd6115af7b564e59ce2958

        • C:\Users\Admin\AppData\Roaming\MonKeyDu\zj 1.0.0\install\B22545E\svchost.exe

          Filesize

          2.0MB

          MD5

          9037a40fb3c7b5948345acb3a9401c53

          SHA1

          2957d67dc98c7058e9e556f0690f86b22b1dbd5b

          SHA256

          97b33e2b233b779dad59cecb75f8da31f7a197c278118452dffa94bb6e178aa3

          SHA512

          b129e98fc7bc22186562d9b18f9236f1cc44ad8df657135029f4e1c577eb016d982ae7dce18eb06a3d207cf07a85f9c4986b765b6e918dad902c69ba3424f6cf

        • C:\Users\Admin\AppData\Roaming\MonKeyDu\zj 1.0.0\install\B22545E\zj.msi

          Filesize

          2.0MB

          MD5

          c6a0667438a9173ff5042a2247b5565a

          SHA1

          2a4df3785344f4e8f651f8344bcfb98be47eb64d

          SHA256

          3acbf3783ad80d157c852e7156c64539d805806ff3d4f0867d3858a0dfb5b32b

          SHA512

          acb3929f261b33e70f6d381832953ceef7ffd2b96c80143265b5cf814dc1001859c9c11b609216d50d28923282daab2a06aa077f3bfc295bc6ccdc97c061b23b

        • C:\Users\Admin\AppData\Roaming\MonKeyDu\zj 1.0.0\install\B22545E\数据处理器4.7.exe

          Filesize

          356KB

          MD5

          426bf2fd41c332bfae147c629409527b

          SHA1

          8481f6e0e4ac2dbab1cb4022f3b151de3a23b619

          SHA256

          06a85f5f5fe77b9564e9cc4d795dfc926236788f0f63b2b25d7841190c822f9e

          SHA512

          e42994581f833a98e385d90737952163c9777ef4d88eb25c2a6a80689193cbd244c3b27b28b48212c7d084c58a62e9c558c0e1b22b79a1b8d6ea2aa09fddf10f

        • C:\Windows\Installer\MSI6815.tmp

          Filesize

          709KB

          MD5

          89136bfd28a2e1ec6b6d841214e1e670

          SHA1

          4c6aab98925cb556f7bf2dbbc9f7ed0da92ef2ab

          SHA256

          1a3c0e60aad0a3bb92a6e0b786df93920aed7b0c7ec56ab49f2692102ac5adec

          SHA512

          22237702745fe11a6f23a943f16a12f23b42fe04d87af6383afeccd854320f3a6961590a76ab6a04f020f9830fb3d9f8b34315ad007a5464dbdba2d543851812

        • C:\Windows\Installer\MSI69BD.tmp

          Filesize

          206KB

          MD5

          385488c351d17ecfa075a763eb5fecee

          SHA1

          88cadb754000d467a5a6cdba1b77a8b2b38f905e

          SHA256

          b3c88eddf3c6f36b0063fe0c4db62950643846c5c616dc2f255aa3a411cbbcff

          SHA512

          64e4341316fa0d10be92720b92adb34e1ef3ca4d39797d97f84d97bca429dd3d46bd6d3849d92652a87cd938cef96166d0cb3f5a79be8fe3899dcb7a8db3a1e3

        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

          Filesize

          23.7MB

          MD5

          119613996fbc418de1c3e78780c8038a

          SHA1

          8f8548dac4a0b4161096fac7b33f4fb5af6ec035

          SHA256

          d181c1076d1320b30c12a94f714c87916a0e9d506998798d68847f833b27f76e

          SHA512

          5f0d6cebf4d0b4c852707e8f04458310e24a399e7e440cd1266013208bbbb01bd25b0c197d42b9feec0206706bbba09c43678739718f65dfed26b049b31ba756

        • \??\Volume{b8b1c3f9-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{0d461d64-92bc-46c6-867d-1f45eacfc8b0}_OnDiskSnapshotProp

          Filesize

          6KB

          MD5

          a4370070a775164f108e2fc52879b919

          SHA1

          285896ecd21fad391ded9113d54aeac6ed927c85

          SHA256

          35b92bf82464b502e57b987243b223f0a52b563e586f8d03b2b3b9a27d0e5ff6

          SHA512

          dcb3790fc429da50ab22dbc21ed51a00dab42f3e7946475b8e7d601ebb57e4acb4684976a3284d5b8de1129de841d38339786b66019b77cc6de9ee55cb09876e

        • memory/4652-105-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-97-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-108-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-107-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-94-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-103-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-100-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-99-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-98-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-110-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-96-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-95-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-111-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-109-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-106-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-104-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-102-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-101-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4652-91-0x0000000010000000-0x000000001017D000-memory.dmp

          Filesize

          1.5MB

        • memory/4964-81-0x0000000000C00000-0x0000000000C5C000-memory.dmp

          Filesize

          368KB