Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 20:08 UTC

General

  • Target

    TwDush.msi

  • Size

    66.4MB

  • MD5

    9800a890a4819b574c5aa5ca9e063d96

  • SHA1

    ede8c738d4e58c770f0ba7792e330756aaf28c7f

  • SHA256

    ec40da7be23e50181fb692525cc62f6cd5f5caa74f653fabaf5d57df1201263b

  • SHA512

    ae52316d3f17cab0370ce6a772861ae5ca5a556f140955c93edf91852695964b57b108c1b85a342d2c52ae8090a6c3d97e7fe5a1c4bd87435135572ab5ca12cf

  • SSDEEP

    1572864:vXU1B6zASrGGq3ymZM4yLpQBoxFlfAwwsUZWOVH:vXU1B6ASrGGqCcM/DxFBDwhZzH

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 11 IoCs
  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 50 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\TwDush.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2380
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C7C0DC154DC099864EA127D99817B10F M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Program Files\PlanAnalyzerOptimistic\mvlKSjKRHbPQ.exe
        "C:\Program Files\PlanAnalyzerOptimistic\mvlKSjKRHbPQ.exe" x "C:\Program Files\PlanAnalyzerOptimistic\VKWrWBaIcvTlXvwirqQe" -o"C:\Program Files\PlanAnalyzerOptimistic\" -pyjlAFQsGZRtyUdVIXREr -y
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:528
      • C:\Program Files\PlanAnalyzerOptimistic\PtsxcsyatT16.exe
        "C:\Program Files\PlanAnalyzerOptimistic\PtsxcsyatT16.exe" -number 132 -file file3 -mode mode3 -flag flag3
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        PID:2028
      • C:\Program Files\PlanAnalyzerOptimistic\ToDesk.exe
        "C:\Program Files\PlanAnalyzerOptimistic\ToDesk.exe"
        3⤵
        • Executes dropped EXE
        PID:1988
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2860
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005DC" "0000000000000070"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2720

Network

    No results found
  • 103.235.46.96:443
    PtsxcsyatT16.exe
    236 B
    212 B
    5
    5
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76a6fb.rbs

    Filesize

    7KB

    MD5

    64165913ce08744a488915251f506571

    SHA1

    a2a7c628ef6d6569cbcb6f3f413aff0b0dd8d93b

    SHA256

    ddf864c614e18ec2b2567163e31955eccbbdba8ccdf845ed68791705cd5fe7ce

    SHA512

    4b9e6caa68598e19f57ceb1a4cf184ece5eb1a333aa55c33b95895c44b6b3429a5e6cb7620a2f3a37c3793699703a8d5b3ceea98198a7fb8c1c8a6f4e7755e01

  • C:\Program Files\PlanAnalyzerOptimistic\MOELauncherSetup_V0TKW.exe

    Filesize

    35.6MB

    MD5

    f0b4afeb9a9582a84c04d33b4f9c93e5

    SHA1

    0b9229e8e3879fc4d1310ba493280894cac1f259

    SHA256

    d71c5c27f6e68be09e40921321a2c6d3b95f65787c33dcc2d66e6939a798a3c9

    SHA512

    d4c3593590a5574bbfc1270d3aca3b419ea5126735206b5e2104e42fda961844ba90073ebacd917b9b0152c103670d1a64b88c76b03b358feae73794418abe51

  • C:\Program Files\PlanAnalyzerOptimistic\PtsxcsyatT16.exe

    Filesize

    2.9MB

    MD5

    772375794abfe39763f2057e845ff14b

    SHA1

    08ada20435475025e8b22d4a7460725fdcb0c3d5

    SHA256

    c31afb76379f0adaaa98d52f7a6dca18cd9f374672e1e85c6c4f7214080e2248

    SHA512

    ab67f8af704b0bf8902120b23fd2d31a1b12f05dc64f17b0f5fafb1c96bbf93481d4e147967a891028c2f4f0c5dc0b1eb135c003a2bc33ca4e118c60b70a2ad2

  • C:\Program Files\PlanAnalyzerOptimistic\ToDesk.exe

    Filesize

    48.3MB

    MD5

    1193d280fe00a77b753b8c196969fddf

    SHA1

    2ba757374129b149823d67a99e907989732c31dc

    SHA256

    56e4cbc58c71fbab44bef5bb191659e92fa6713b6e1834465464f4dea44498ad

    SHA512

    dd62534de37eae14cce7e83ccdf2e9f1fd6d87ea104c25bb107af4826a128ee40507958ce37c3df937ea238f1370a5e3f3cdcf701d015f6e2d31e45d4c0d1327

  • C:\Program Files\PlanAnalyzerOptimistic\VKWrWBaIcvTlXvwirqQe

    Filesize

    1.7MB

    MD5

    2b86a11112da3cafddcd7ee308cea7c9

    SHA1

    994cce38475425226d857550c86f1651fcfdc2dc

    SHA256

    5f80ac378a228c920d0dd85c05c986c06ef3bc05b0b98a85df03428a00c6f9e3

    SHA512

    da141c69561b862dec313b23a636a34ce831c18973c71c1450372350b1aba9be8291b3ecaa909166bb25f4bfbbd0477c6ff2711bb7475ca8c333a9c677ad56a2

  • C:\Program Files\PlanAnalyzerOptimistic\mvlKSjKRHbPQ.exe

    Filesize

    574KB

    MD5

    42badc1d2f03a8b1e4875740d3d49336

    SHA1

    cee178da1fb05f99af7a3547093122893bd1eb46

    SHA256

    c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf

    SHA512

    6bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c

  • \Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.exe

    Filesize

    832KB

    MD5

    d305d506c0095df8af223ac7d91ca327

    SHA1

    679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a

    SHA256

    923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66

    SHA512

    94d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796

  • memory/1240-12-0x0000000000390000-0x0000000000392000-memory.dmp

    Filesize

    8KB

  • memory/2028-43-0x000000000A770000-0x000000000A79A000-memory.dmp

    Filesize

    168KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.