Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
429s -
max time network
422s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-es -
resource tags
arch:x64arch:x86image:win10v2004-20240426-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
27/05/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
CDFCT.275.msi
Resource
win7-20240215-es
Behavioral task
behavioral2
Sample
CDFCT.275.msi
Resource
win10v2004-20240426-es
General
-
Target
CDFCT.275.msi
-
Size
19.9MB
-
MD5
dccc2e7e5409227be256b0821469a648
-
SHA1
b3d056aa648ee904e4bfa17dfd4f936d9dc3f040
-
SHA256
47e17a67d6c06a2870bd756f961c29c4a11bcf2944cd9f8e8da2f5bf999bd79f
-
SHA512
4ad81e87cdcf78c6b96a8a9d34a6ec890588719b1d7f9a823aef6564867d3df77142440520494664ffc2d46492344a3df8aa1e9c4d093d00fcfc635189521b02
-
SSDEEP
196608:wAlrHoMYKQTWT1ZNNNoqUG5CikomWln2uSO:wAlrHOTINNr9Cikofln2ux
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Uuinats = "C:\\f9ih2xd2\\histon.exe" histon.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 3 3928 msiexec.exe 6 3928 msiexec.exe 16 2216 MsiExec.exe 34 2216 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e573eed.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI40C5.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{XJFRUYTE-IF9Y-GAV2-4OE5-OU8DO7QFOCGN} msiexec.exe File created C:\Windows\Installer\e573eed.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI3FA9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4027.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4076.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI420E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI426D.tmp msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 histon.exe -
Loads dropped DLL 8 IoCs
pid Process 2216 MsiExec.exe 2216 MsiExec.exe 2216 MsiExec.exe 2216 MsiExec.exe 2216 MsiExec.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3080 msiexec.exe 3080 msiexec.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1668 histon.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 3928 msiexec.exe Token: SeIncreaseQuotaPrivilege 3928 msiexec.exe Token: SeSecurityPrivilege 3080 msiexec.exe Token: SeCreateTokenPrivilege 3928 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3928 msiexec.exe Token: SeLockMemoryPrivilege 3928 msiexec.exe Token: SeIncreaseQuotaPrivilege 3928 msiexec.exe Token: SeMachineAccountPrivilege 3928 msiexec.exe Token: SeTcbPrivilege 3928 msiexec.exe Token: SeSecurityPrivilege 3928 msiexec.exe Token: SeTakeOwnershipPrivilege 3928 msiexec.exe Token: SeLoadDriverPrivilege 3928 msiexec.exe Token: SeSystemProfilePrivilege 3928 msiexec.exe Token: SeSystemtimePrivilege 3928 msiexec.exe Token: SeProfSingleProcessPrivilege 3928 msiexec.exe Token: SeIncBasePriorityPrivilege 3928 msiexec.exe Token: SeCreatePagefilePrivilege 3928 msiexec.exe Token: SeCreatePermanentPrivilege 3928 msiexec.exe Token: SeBackupPrivilege 3928 msiexec.exe Token: SeRestorePrivilege 3928 msiexec.exe Token: SeShutdownPrivilege 3928 msiexec.exe Token: SeDebugPrivilege 3928 msiexec.exe Token: SeAuditPrivilege 3928 msiexec.exe Token: SeSystemEnvironmentPrivilege 3928 msiexec.exe Token: SeChangeNotifyPrivilege 3928 msiexec.exe Token: SeRemoteShutdownPrivilege 3928 msiexec.exe Token: SeUndockPrivilege 3928 msiexec.exe Token: SeSyncAgentPrivilege 3928 msiexec.exe Token: SeEnableDelegationPrivilege 3928 msiexec.exe Token: SeManageVolumePrivilege 3928 msiexec.exe Token: SeImpersonatePrivilege 3928 msiexec.exe Token: SeCreateGlobalPrivilege 3928 msiexec.exe Token: SeRestorePrivilege 3080 msiexec.exe Token: SeTakeOwnershipPrivilege 3080 msiexec.exe Token: SeRestorePrivilege 3080 msiexec.exe Token: SeTakeOwnershipPrivilege 3080 msiexec.exe Token: SeRestorePrivilege 3080 msiexec.exe Token: SeTakeOwnershipPrivilege 3080 msiexec.exe Token: SeRestorePrivilege 3080 msiexec.exe Token: SeTakeOwnershipPrivilege 3080 msiexec.exe Token: SeRestorePrivilege 3080 msiexec.exe Token: SeTakeOwnershipPrivilege 3080 msiexec.exe Token: SeRestorePrivilege 3080 msiexec.exe Token: SeTakeOwnershipPrivilege 3080 msiexec.exe Token: SeRestorePrivilege 3080 msiexec.exe Token: SeTakeOwnershipPrivilege 3080 msiexec.exe Token: SeRestorePrivilege 3080 msiexec.exe Token: SeTakeOwnershipPrivilege 3080 msiexec.exe Token: SeRestorePrivilege 3080 msiexec.exe Token: SeTakeOwnershipPrivilege 3080 msiexec.exe Token: SeRestorePrivilege 3080 msiexec.exe Token: SeTakeOwnershipPrivilege 3080 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3928 msiexec.exe 3928 msiexec.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2216 MsiExec.exe 2216 MsiExec.exe 2216 MsiExec.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe 1668 histon.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3080 wrote to memory of 2216 3080 msiexec.exe 86 PID 3080 wrote to memory of 2216 3080 msiexec.exe 86 PID 3080 wrote to memory of 2216 3080 msiexec.exe 86 PID 2216 wrote to memory of 1668 2216 MsiExec.exe 96 PID 2216 wrote to memory of 1668 2216 MsiExec.exe 96 PID 2216 wrote to memory of 1668 2216 MsiExec.exe 96
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\CDFCT.275.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3928
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6D8AE6C8737BA2C2A9D99F54E9A1811D2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\f9ih2xd2\histon.exe"C:\f9ih2xd2\histon.exe"3⤵
- Adds Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_9897376CC04A19E03CB6873856275F45
Filesize1KB
MD5b89be4bdb22ecf59a21353f83177669a
SHA17b43fc040807897d2c5d81c97e7547cf98f64db2
SHA256ee61d04e92b0c7bb6d786e9e97b08c26585bf465b5f2ade03457f29db9fb9d7b
SHA5121c3a4ec7338da4461197c70c63a02befd84fd2893517738bc03e7b63dbb059475f3a2086d90ef7c189dddf16221772d6a1a5d6f5474741672044b8414cf8b609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize1KB
MD5269c480e0a69e32055f5e32e7eaf3060
SHA144310f0f5381a04cf703a8f59f26803bc72125f1
SHA25612990bf58de6a9bad0b7673292801a2c10ff0325c38bcd77da3b932b838dde3d
SHA5125574c7083e0a3ced3b0d7c1c72a84e45997f8122b6cd3c1e81c806994c2345ea886ba2d6ac6fcded9473261ba61d793fdd7e6593dfa335874706cace953b3596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_9897376CC04A19E03CB6873856275F45
Filesize540B
MD5352c4690789304457b761f345afaaa0b
SHA179cd6ed78bf3ab3a8407b0700b7686013544a575
SHA2564580c41240d8e709185634aac7d19e834f38d26c419e13aa90a90a1cd5be4712
SHA512722037da5d624f25c573df19e273704dd4391c8d852afeeb9694d565adf3a2b20a6906768068bc2c622fc7b58ad8d1aabcf4fb5d8e7e945f719a710a2731d12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize536B
MD5718112638bd6689976606b5c4db6c5bf
SHA1b56df89fc9058d53fac5785825214beb4a2a33e6
SHA25603f2265ebfd00b0ec3cd084ca3473e6eb9ea08cdf08589175562fbebb46b46d4
SHA512d7c7b4f7524b939cebe3143413da635de1c2417bd9b99c48e01bf1a52cd7a81cc11859941b207a92d1861e962d8b963088b0baf64131825fd99558413d90d3e2
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
18.7MB
MD5879f73622dabb79984da60c4401472ca
SHA1ffece85483e21f6b1d7d0eed4759fca42086df93
SHA2567bb2ee5c120757307fe7f97b652f8ef36216258036432996d81343ed83920ba0
SHA5122afba348192ff5f84dbd1cd23abb11d62f2219a5832f76eedc98125c6020da06bb83fb74640d8dddd87adb872d0d238415ac55a188420a14bae07e6fbf3280d3
-
Filesize
1.5MB
MD59e5aa15a31eb279cc89aa4aab29e5611
SHA18534d576fa9e9b1b5d4cfe697b71d0a87a379381
SHA256d76c62368c4460ba683893adea061652900ba9cc923fe30585b8a169f58baa8a
SHA5122c0fdd5170ba82a47884ceefa0c83d9cd9d740eb7fb18a7ec3baec76c8c6f890e2397dff65baf6197e1690e2e8765bb081c6a1d91bcc7f4ea2a34616832a9ea6
-
Filesize
9.1MB
MD574d3f521a38b23cd25ed61e4f8d99f16
SHA1c4cd0e519aeca41e94665f2c5ea60a322deb3680
SHA2561d822b3faabb8f65fc30076d32a95757a2c369ccb64ae54572e9f562280ae845
SHA512ec1c8b0eb895fd8947cad6126abc5bca3a712e42475228b9dcb3496098e720abb83d4cba4621edbd8d3ad7f306a5f57ced9c2c98fe2c2d0c8ebbbf99d7faf0f1
-
Filesize
174KB
MD54289541be75e95bcfff04857f7144d87
SHA15ec8085e30d75ec18b8b1e193b3d5aa1648b0d2e
SHA2562631fcdf920610557736549e27939b9c760743a2cddec0b2c2254cfa40003fb0
SHA5123137a7790de74a6413aca6c80fd57288bcc30a7df3a416f3c6e8666041cd47a9609136c91405eee23224c4ae67c9aebbba4dd9c4e5786b09b83318755b4a55fd