Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    124s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 00:32

General

  • Target

    Setup/Install.msi

  • Size

    9.8MB

  • MD5

    aa782581d9182bf0414c8818350e432e

  • SHA1

    1ec2b80e6ed04e0e64083aca04f54f23a4f7766e

  • SHA256

    5782bc88f68fce85a8678ba89b24e15a6079486943997516a5c9692b4b0f0501

  • SHA512

    fbbdd5a0ca4c1f9067985bd1e3c635d6d178dfef4760e398239383f54a9d09facd92bd719a1bf9e03b18d7bb0b0379e7dc5d63bc67100b299b1652ce289380e9

  • SSDEEP

    196608:vkEM6+lNleMnEIbedpahmby81qM5ZjE7U49bM1b0lUjieuP5r:vG6aeMnERjbdI7U4tM1b0neuN

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Setup\Install.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4904
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3120
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 1628DCFA0626D383E10F631EE9C1769F C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIA930.tmp

    Filesize

    13KB

    MD5

    b5dee73421d4c156143371161173bc3f

    SHA1

    835fd4e746515485ac6baad4273c587d13e24ccd

    SHA256

    d3be2427ca4d43d08c8a8f7575c2b0748092e52f4a976f894746f962ca977841

    SHA512

    4888d5dcba735cdf9a4e041af99f443c082f96d9a7ac5f8d45be1a547b654459e35fbb75c117b4c0019f6bc42874653e9594bb1c4191986b0de5b1658a55cfaa