Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 13:57

General

  • Target

    BlueCatDPMeterPro_vcredist.exe

  • Size

    769KB

  • MD5

    c6cefeab592fd289a71b1891e920fbdc

  • SHA1

    99a15aee36176de11e70fae62392efb0089e838e

  • SHA256

    ed8bf8887a46f032e078d46399eba8433e6f7cf3f39b10aacfd43e398bc385dd

  • SHA512

    f8039b20d64ead941b88efc9c5e79fb9ee143de9aa466f1a01476089ef91cc4ddf25fadad856834d77db9b3dfdcb84d469a823eae47deef099ee1cf59f7e7b9b

  • SSDEEP

    24576:71Qr0sqpWXL1Falk+XgQnDUo1uJ60A/iL8Kff3/Vx:RQr0NEpIlkDQnDUoU8YLbfvNx

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BlueCatDPMeterPro_vcredist.exe
    "C:\Users\Admin\AppData\Local\Temp\BlueCatDPMeterPro_vcredist.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\vcredist-x86.11.0.61030-{1614CF08-F55E-44A6-977E-1E96E55946B7}.msi" /qn
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3908
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e5745b7.rbs

    Filesize

    9KB

    MD5

    615a86681f148ed1ab0acb77599671c5

    SHA1

    5128ce4f105d7499f1d2c073348f071b6b1a07ea

    SHA256

    09527fce34bfca69655e086ce912532356d824ef03399d8cec27d83c7626302e

    SHA512

    43d1e951ee35b19947bbc2309fd32235d1bccd033911d9ae6b291ea5f6dbaeb5f8c839b82aa5b544a2b60e102adff7cc15d9af9c9051f4c4fe0648c59ca9debe

  • C:\Users\Admin\AppData\Local\Temp\vcredist-x86.11.0.61030-{1614CF08-F55E-44A6-977E-1E96E55946B7}.msi

    Filesize

    801KB

    MD5

    0f80620eba4bca47cc196665d07bfba7

    SHA1

    b51a2dd24f62cf31be222c71d58a9a1f2136c11d

    SHA256

    4f4e936713e75d9b1685adada22bd329ce04238d2d5f3a90df40f6c4cdafa5e5

    SHA512

    6f758a5a38748d8ab90e0f7888ca4ccd927a9f78392f25ec6741e202f42513a28d95671a04111d7478c843df416888be75ebf224e8eeaea1b5239ca3961854b9