Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 00:55

General

  • Target

    Shure64x.msi

  • Size

    86.2MB

  • MD5

    58f442aa99f04239cb7d1da33bd89612

  • SHA1

    82d0c3a408ee9d235f8c6145ec1597eac3ec0fec

  • SHA256

    13aad31e3a1bec69fab1729867e6f7819d2741f7c7ef34cc789c8f195b641b91

  • SHA512

    e282f9d8a79581c9c0d8a220bfa0e28c899ab1d8e18072271fad54b218ef5d4ba886dde8b3d547dd1f625b2c66974805569e2186f9efb385ad0fd7d39913307f

  • SSDEEP

    1572864:sTg79nEDugaAModrO12nW/sCmFTJdtFHLAvHlYy3peYGg0IWM9f/QGsv:sE79IurAMerW/56Ndte2y3MgtWG/

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Shure64x.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2540
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Programs\Shure64x\Shure64x.exe
      "C:\Users\Admin\AppData\Local\Programs\Shure64x\Shure64x.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:664
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1696
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005F8" "00000000000003A8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76c15e.rbs

    Filesize

    20KB

    MD5

    ebb4e6f74bebe84caac8718131fced51

    SHA1

    dfd93f43d8de125d6cc29b2c144041806c3c9300

    SHA256

    a756b15d4489168ddea80d260ca89d953a2edf72ff99fd8db5eda0db3d43c703

    SHA512

    92a82cf739e4c3212c09391d639d6196143f8148897d487816003bf9712f0a7c9819f194d8b880cd93c523da14b5c87ed221be5c83af2272832f45450f4473cd

  • C:\Users\Admin\AppData\Local\Programs\Shure64x\ffmpeg.dll

    Filesize

    2.7MB

    MD5

    d49e7a8f096ad4722bd0f6963e0efc08

    SHA1

    6835f12391023c0c7e3c8cc37b0496e3a93a5985

    SHA256

    f11576bf7ffbc3669d1a5364378f35a1ed0811b7831528b6c4c55b0cdc7dc014

    SHA512

    ca50c28d6aac75f749ed62eec8acbb53317f6bdcef8794759af3fad861446de5b7fa31622ce67a347949abb1098eccb32689b4f1c54458a125bc46574ad51575

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Shure64x.lnk

    Filesize

    2KB

    MD5

    2f1ffd1d7c0168be4b58503acaa9fddd

    SHA1

    0a9bbe5e683aa438daf6d3f870271f1813b0889a

    SHA256

    071a83bb1a54d995a11709d06723ae379a5f13c00c3074135a136dd7ebe43805

    SHA512

    75ceaffd0eaeed6079d984c71b74990e29d16274a7f4c958af27745b56428a75b04ac916da13ab13e3bcad6f9f3b1d7e2884b1cae4f300823a484c5e3031ebd8