Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

21/09/2024, 02:03

240921-cgz6dszfpl 8

21/09/2024, 01:42

240921-b4q1kazbkm 8

21/09/2024, 01:37

240921-b12b5aygrg 8

21/09/2024, 01:13

240921-bk8fhayblp 10

21/09/2024, 01:00

240921-bc36taxgmj 8

21/09/2024, 00:55

240921-a9rcvaxerk 8

Analysis

  • max time kernel
    1563s
  • max time network
    1567s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 01:00

General

  • Target

    EZFNLauncher.msi

  • Size

    8.8MB

  • MD5

    c094ae439f4a97409d752fa64f6eab86

  • SHA1

    e607d4616a2262bb245c43269d7c3f769269e5d0

  • SHA256

    9ab1f0f955d23c0a2a0e3727a9f778bef9057d4b615df3f6194906dac49e2c26

  • SHA512

    df8bd4db2130cdf94493caa170801cfc1e273aa22253d33b066db3be56b164c904f54172bb6f60afd131f9459a8e9895d718bb905420f067936862d86ed9506e

  • SSDEEP

    196608:hwrQNEqoCdzOx618QNSi2lfVc6VpvPH62RM7tBIbK1/JuhC:hgcOxvQgllfjXtr8/kh

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Powershell Invoke Web Request.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 12 IoCs
  • Loads dropped DLL 7 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\EZFNLauncher.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1916
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Loads dropped DLL
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A7DFB2DBD01886DBD975815720530E12 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2012
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -NoProfile -windowstyle hidden try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 } catch {}; Invoke-WebRequest -Uri "https://go.microsoft.com/fwlink/p/?LinkId=2124703" -OutFile "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" ; Start-Process -FilePath "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" -ArgumentList ('/silent', '/install') -Wait
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1332
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2440
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004C0" "00000000000003E8"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2968

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\EZFN Launcher\EZFN Launcher.lnk

      Filesize

      2KB

      MD5

      86a926fdbcf94901224e3c3a353e39c0

      SHA1

      4ab66187df90905b438986187b7339c448764854

      SHA256

      cfb9f5a862573e532182b5abd26d5a09ad55472ef2ec4d0f716c243511db4738

      SHA512

      bf391452efa80baf34ad59fed2fb44283f4bea11ee3381f3239f9ee1de269a41f014e9015f9f231065884ae12333cfe4fa34a16d389790145ac246d2de0cae44

    • C:\Users\Admin\AppData\Local\Temp\MSIA64D.tmp

      Filesize

      113KB

      MD5

      4fdd16752561cf585fed1506914d73e0

      SHA1

      f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424

      SHA256

      aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7

      SHA512

      3695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600

    • C:\Windows\Installer\f78cca2.msi

      Filesize

      8.8MB

      MD5

      c094ae439f4a97409d752fa64f6eab86

      SHA1

      e607d4616a2262bb245c43269d7c3f769269e5d0

      SHA256

      9ab1f0f955d23c0a2a0e3727a9f778bef9057d4b615df3f6194906dac49e2c26

      SHA512

      df8bd4db2130cdf94493caa170801cfc1e273aa22253d33b066db3be56b164c904f54172bb6f60afd131f9459a8e9895d718bb905420f067936862d86ed9506e

    • \Program Files\EZFN Launcher\EZFN Launcher.exe

      Filesize

      9.4MB

      MD5

      4f33ce3ea36ef1f99b6825a86b2470ff

      SHA1

      baca999aadc039799d779088276704b14b5c665b

      SHA256

      5f05babffaded0eae013bcea5de6821cb51c82acbb6889c4b01ebde41b3dafa8

      SHA512

      a96e86906b195d035a824f48f89db9455208dda2ca7ad1d7dc88881cbf6b0649bafea39fa384254aebc23f6a903cd18cf7dda375194390119c0111d901fbc0b6

    • memory/1332-63-0x000000001B560000-0x000000001B842000-memory.dmp

      Filesize

      2.9MB

    • memory/1332-64-0x0000000002860000-0x0000000002868000-memory.dmp

      Filesize

      32KB