Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
59c018670ad133252213f9d31c16acfb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
59c018670ad133252213f9d31c16acfb.exe
Resource
win10v2004-20240508-en
General
-
Target
59c018670ad133252213f9d31c16acfb.exe
-
Size
67.9MB
-
MD5
59c018670ad133252213f9d31c16acfb
-
SHA1
7c18c23b40676e6726ed926d5afad1b7f108b10e
-
SHA256
7b86c782f970ed3fb7232d9c87e6dcb7be9dc2c17dc234888996589c6b89f415
-
SHA512
5cfa9741ac5d43b32b15d7a5515b1f57d9099b239bee9b62059ec3ba3413a404e8d427fd5f978ab5195ca64755ee9991981521917cf1e462cc6912e0dc029432
-
SSDEEP
1572864:ZVc0s6ZMsz5Yi9l88Ex0ZZ5CBola3FSQCbU7weuNIp:Z9LZbSiY85r5Cga3Cb0X
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2124 59c018670ad133252213f9d31c16acfb.exe 1384 MsiExec.exe 1384 MsiExec.exe 1384 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\X: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\G: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\M: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\V: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\T: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\S: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\I: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\J: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\K: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\O: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\U: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\Y: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\N: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\Q: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\R: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\W: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\Z: 59c018670ad133252213f9d31c16acfb.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1384 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2156 msiexec.exe Token: SeTakeOwnershipPrivilege 2156 msiexec.exe Token: SeSecurityPrivilege 2156 msiexec.exe Token: SeCreateTokenPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeAssignPrimaryTokenPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeLockMemoryPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeIncreaseQuotaPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeMachineAccountPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeTcbPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeSecurityPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeTakeOwnershipPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeLoadDriverPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeSystemProfilePrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeSystemtimePrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeProfSingleProcessPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeIncBasePriorityPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeCreatePagefilePrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeCreatePermanentPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeBackupPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeRestorePrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeShutdownPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeDebugPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeAuditPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeSystemEnvironmentPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeChangeNotifyPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeRemoteShutdownPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeUndockPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeSyncAgentPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeEnableDelegationPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeManageVolumePrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeImpersonatePrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeCreateGlobalPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeCreateTokenPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeAssignPrimaryTokenPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeLockMemoryPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeIncreaseQuotaPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeMachineAccountPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeTcbPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeSecurityPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeTakeOwnershipPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeLoadDriverPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeSystemProfilePrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeSystemtimePrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeProfSingleProcessPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeIncBasePriorityPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeCreatePagefilePrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeCreatePermanentPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeBackupPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeRestorePrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeShutdownPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeDebugPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeAuditPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeSystemEnvironmentPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeChangeNotifyPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeRemoteShutdownPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeUndockPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeSyncAgentPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeEnableDelegationPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeManageVolumePrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeImpersonatePrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeCreateGlobalPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeCreateTokenPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeAssignPrimaryTokenPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe Token: SeLockMemoryPrivilege 2124 59c018670ad133252213f9d31c16acfb.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1384 2156 msiexec.exe 29 PID 2156 wrote to memory of 1384 2156 msiexec.exe 29 PID 2156 wrote to memory of 1384 2156 msiexec.exe 29 PID 2156 wrote to memory of 1384 2156 msiexec.exe 29 PID 2156 wrote to memory of 1384 2156 msiexec.exe 29 PID 2156 wrote to memory of 1384 2156 msiexec.exe 29 PID 2156 wrote to memory of 1384 2156 msiexec.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\59c018670ad133252213f9d31c16acfb.exe"C:\Users\Admin\AppData\Local\Temp\59c018670ad133252213f9d31c16acfb.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5C9FD9245146F31BB124D4D7A48574C2 C2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
719KB
MD589f70b588a48793450dd603b6cd4096f
SHA19b6509c031856c715d62853c4e93efbdf48d5aeb
SHA256066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281
SHA512fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a
-
Filesize
1.1MB
MD558c6476771f68f57661d0f6533cb70ef
SHA18080de39939f0a8f1e0c529cca30bf38b0e6abf2
SHA2567eb240ef6e75de05b2a199bc55fdc8d13f467d5b4e58457011653312fffcc65f
SHA5122b4b4e4466a7eea2d28631a80f257ced0a7263aa81c945105b793371534580dff1b66779bab36b9157b596c352c234a19c568e105faa1ba8681aa39feb5950c5
-
Filesize
835KB
MD53fe648959c7496beb28a3638fcc2e944
SHA16c73ebcdf517e2b30ad90f046f50f9e64c7a636c
SHA256e6d18685b2e231f9166909764c3b90bbc3c51f30736d18873166e5dc9133e290
SHA5121be58c011987b67396e052d32b6b3576823d612e4e678a18641a55fb6159b32e106cadeeebc22f179aa07902e1bbf517cc10d1ebf7233bf68fe198de3f20bca2
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
7.4MB
MD5fdc57f7ae8f7f2f53d7982fd1db6fb7a
SHA184bb76aa6dbecd017c5fee22a4941e1548c0dff6
SHA256b931fd5c731fe5289d408cb5ac478fa4c7c6693d33227e1561b1d8a51972e4b1
SHA5126c1a7d64f24bef0f1f474b22eda75e282ddb9e9c2b005126b95fd8fca8a9bff138ed023e1958ed3fb67a29e107a8091211320ba2d7e3ff8a15a271204980e879
-
Filesize
1.0MB
MD5806e65956064190d6154d5de5cc96a5e
SHA1f2fa1b10dec6f4166b79e710d81147c9028c4198
SHA25617f79990c5455ac18abbca13fcd8f8584518881487f9fedcbd7cbbdbe003c6f8
SHA512ae72ec2fe5895ca5e9e44b6c5e677356f9b7ba342d686a59be42b16027013d4b7c8c83ed0530705d792ac7b5881d10ec72dff546c2ee3c1452372d363501c62f