Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    30s
  • max time network
    31s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/09/2024, 22:49

General

  • Target

    6a1db5af5083758b437f10a1a27f0d4f313b1ef78bfa5491d3d58dbe742a7f17.msi

  • Size

    156KB

  • MD5

    b61ce074ac64253b6f3718b15d634d27

  • SHA1

    439dce9b8c45c4f91ff375ec0c478c3e747b55ca

  • SHA256

    6a1db5af5083758b437f10a1a27f0d4f313b1ef78bfa5491d3d58dbe742a7f17

  • SHA512

    071e068a98208e540201bc9ff65357ba80bac82283edc179126944ebc15cd91c0628bfdd38761968c5693a9e93c53c431ba7c992adf83bdb70911a384cfe516c

  • SSDEEP

    1536:Ek7KKWI59KMnbYYWgdrWw/WNSQm7+8lEgWnwQ5kEMb+KR0Nc8QsJq3UDj0D:v7KKWIO/8oiWNS3+80nwbEe0Nc8QsC

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

5.180.45.105:9999

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\6a1db5af5083758b437f10a1a27f0d4f313b1ef78bfa5491d3d58dbe742a7f17.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4152
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2460
    • C:\Windows\Installer\MSIDFB2.tmp
      "C:\Windows\Installer\MSIDFB2.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1644
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 3C6DBA7E5A28629702EA212C75D61FC3
      2⤵
      • System Location Discovery: System Language Discovery
      PID:536
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:3608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Installer\MSIDFB2.tmp

    Filesize

    124KB

    MD5

    dee96e7a910a9f64cf83e9e8394ffa15

    SHA1

    20550291a07b83d24c1d2c1842a5697e887e639f

    SHA256

    2d5ab6c2da86c853d53837610cd149680523b8ea9677d78d571355fb8086fa2b

    SHA512

    413a57e9b11121833e92f693cbe3c725b5125d36ab04b3ec4c589b0a4ad72c7c0c05d203c1b4fe0524008f5255830c783c1d24609093b1f01f72a3593ff5097b

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    23.7MB

    MD5

    76d0787d0b75bf6e6dcc12050f2ccb14

    SHA1

    7b130efdc43bd7bbc33ae28b8ecb6ecd5a02a917

    SHA256

    ddf47909791e65795d4f1bd5643e817c7d1f48ae4d61642171d46222c97c2a23

    SHA512

    8136e3f77b1dcce9edec00aa3756147fbd6ceb922c6a01f8a314dd551c0a2726bba5537d69e3a6b1b1ae7d9a8ae4c37383d5592b5b30a51348e4648a928e4752

  • \??\Volume{f1c9ec80-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{e2613f49-cd20-4fd5-ac67-a2593d5ad4ca}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    08958c340b7fe836410675c061520806

    SHA1

    0ca35648ed57e9ef0fcc38c9f303c7a3b3dca77a

    SHA256

    39921ada94d5a071f66ab6122b870ea7e3f26d5d48919fe1251643040d0eed43

    SHA512

    c14bfe76df5e8701c7b5255bc907b7afd43de6b73cecaf2f1d29c43504facb0cbc05105f5efb409ecb81fafd6bbf9f8290686d4fce203f9a7024c7165fb320fb