Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 20:23

General

  • Target

    Eon_Launcher_1.0.6_x64_en-US.exe

  • Size

    87.8MB

  • MD5

    31d8373a7511deb336ed279202d1a3fa

  • SHA1

    bc6f1610bb7aaef75e9a6efb3b9881326abdccde

  • SHA256

    16d0d399410366ffe6192ee385f69f23cad13513740117a20cac0190347908b9

  • SHA512

    f8d469be0ee70e7570c33b29ff4e017ce76257d1cf1c83157bcbb911b0d94bf1ab2e680e9da01e26945637edd1ac3cb4a4e06570c612666a454dd85e4dd31930

  • SSDEEP

    1572864:WQ9WxSaqMKfOR7vaK+3m1Hgv+u3aFvwcdjmib/PKfwWZCifCKEWDMuLUt9:14aiSH3QHIsrdxPKkBWDMtz

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Eon_Launcher_1.0.6_x64_en-US.exe
    "C:\Users\Admin\AppData\Local\Temp\Eon_Launcher_1.0.6_x64_en-US.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Eon\Eon Launcher 1.0.6\install\Eon Installer.x64.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\Eon_Launcher_1.0.6_x64_en-US.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1724617232 "
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      PID:2868
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C129DC5E0F57DBB24927E92979710391 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2016
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 99B25CA44633A8C05BA10E2785FCAA24 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIBA5A.tmp

    Filesize

    719KB

    MD5

    c9c085c00bc24802f066e5412defcf50

    SHA1

    557f02469f3f236097d015327d7ca77260e2aecc

    SHA256

    a412b642de0e94db761ebd2834dde72eed86e65fc4a580670a300015b874ba24

    SHA512

    a6fa1f34cd630a7509a6441be7ad060de7e039967d2ec015e27c2a643b04e0eecf53902b7173c4c2e92e3a890bd7acb6a3307d9923838f0bfc71496fb184b1de

  • C:\Users\Admin\AppData\Roaming\Eon\Eon Launcher 1.0.6\install\Eon Installer.x64.msi

    Filesize

    1.9MB

    MD5

    dfee8c7263a5872b68c1b11ba40733a0

    SHA1

    f5b8f72f2a8bc798ec9f2cf3b71bc794fc8f3f5c

    SHA256

    c3b2cdffbfd760f207488cef4c726b9b5abf19da105741bd420412ebe4b35e8f

    SHA512

    b3bed3e3f1ea737ffdfd37617417ce67dc12038d71d43856290bb878bac1b656509689b7a866b2dedf0a436f8dd2c3ba2959ff3a2e368320bab36e90d8642d03