Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1754s
  • max time network
    1383s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 17:05

General

  • Target

    Order.msi

  • Size

    2.7MB

  • MD5

    f7fd676f0813c386785974d541ab2c62

  • SHA1

    9b8cad4d93b685fa17428f19bf4a48ed5d065a37

  • SHA256

    1289a868933822979797a526e6fab52460940f1c9dd9231879ecf7da920b9b41

  • SHA512

    4cacdf7494afc7ad99d224c2b57ed5d6f5ccb31237eabf1291b43aa8955c082662ef973e8d8477c5c4cea08a2eeab9ac2ad2ceb9a9b7b646b9bbf73c8a42ee27

  • SSDEEP

    49152:rRC8uwRZFqnrf2F6bdjiC2Q5cQcXX5DEbWvB2I15oh268YXZ8+ROWv:rTS91iC2zZtvB715oUr63

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Order.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5112
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5D00BD30898402277741BE8FFB917ED1
      2⤵
      • Loads dropped DLL
      PID:4544
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 812
        3⤵
        • Program crash
        PID:464
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4544 -ip 4544
    1⤵
      PID:3956
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Installer\MSIC014.tmp

      Filesize

      2.7MB

      MD5

      39c4da67f37b474fc44dc8f7a833a235

      SHA1

      611dc8f73eb6e770488a3ab88ddac86b6074899a

      SHA256

      7cbfef08f4be732b65aaa4c181257935fa3518537750b1bfe2b0aa811271ffc7

      SHA512

      7d696189b3769f2ec18a5a4600ec349077d62b95f252c87e49ca9dc299196068162b5c29e0afadead31041ad3eb8e5e08f8303e3db374b968c9fd6f6ae3167ab

    • memory/792-9-0x000001D3E2D20000-0x000001D3E2D21000-memory.dmp

      Filesize

      4KB

    • memory/792-10-0x000001D3E2D20000-0x000001D3E2D21000-memory.dmp

      Filesize

      4KB

    • memory/792-11-0x000001D3E2D20000-0x000001D3E2D21000-memory.dmp

      Filesize

      4KB

    • memory/792-21-0x000001D3E2D20000-0x000001D3E2D21000-memory.dmp

      Filesize

      4KB

    • memory/792-20-0x000001D3E2D20000-0x000001D3E2D21000-memory.dmp

      Filesize

      4KB

    • memory/792-19-0x000001D3E2D20000-0x000001D3E2D21000-memory.dmp

      Filesize

      4KB

    • memory/792-18-0x000001D3E2D20000-0x000001D3E2D21000-memory.dmp

      Filesize

      4KB

    • memory/792-17-0x000001D3E2D20000-0x000001D3E2D21000-memory.dmp

      Filesize

      4KB

    • memory/792-16-0x000001D3E2D20000-0x000001D3E2D21000-memory.dmp

      Filesize

      4KB

    • memory/792-15-0x000001D3E2D20000-0x000001D3E2D21000-memory.dmp

      Filesize

      4KB