Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/09/2024, 22:49

General

  • Target

    6a1db5af5083758b437f10a1a27f0d4f313b1ef78bfa5491d3d58dbe742a7f17.msi

  • Size

    156KB

  • MD5

    b61ce074ac64253b6f3718b15d634d27

  • SHA1

    439dce9b8c45c4f91ff375ec0c478c3e747b55ca

  • SHA256

    6a1db5af5083758b437f10a1a27f0d4f313b1ef78bfa5491d3d58dbe742a7f17

  • SHA512

    071e068a98208e540201bc9ff65357ba80bac82283edc179126944ebc15cd91c0628bfdd38761968c5693a9e93c53c431ba7c992adf83bdb70911a384cfe516c

  • SSDEEP

    1536:Ek7KKWI59KMnbYYWgdrWw/WNSQm7+8lEgWnwQ5kEMb+KR0Nc8QsJq3UDj0D:v7KKWIO/8oiWNS3+80nwbEe0Nc8QsC

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\6a1db5af5083758b437f10a1a27f0d4f313b1ef78bfa5491d3d58dbe742a7f17.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1716
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\Installer\MSIFA29.tmp
      "C:\Windows\Installer\MSIFA29.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1600
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 24DB5C81B615D0AD00A42217A5D9562F
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3036
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2892
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003C8" "00000000000005DC"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Installer\MSIFA29.tmp

    Filesize

    124KB

    MD5

    dee96e7a910a9f64cf83e9e8394ffa15

    SHA1

    20550291a07b83d24c1d2c1842a5697e887e639f

    SHA256

    2d5ab6c2da86c853d53837610cd149680523b8ea9677d78d571355fb8086fa2b

    SHA512

    413a57e9b11121833e92f693cbe3c725b5125d36ab04b3ec4c589b0a4ad72c7c0c05d203c1b4fe0524008f5255830c783c1d24609093b1f01f72a3593ff5097b