Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    65s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 10:38

General

  • Target

    CRforVS13SP29_0-10010309.exe

  • Size

    374.6MB

  • MD5

    cf2c10349b9a91c62a71116babcf9524

  • SHA1

    986ce6a9718e2762f385dcf50f9de34a9bd2e498

  • SHA256

    f444a8d3170710a908aceb7f940170027e901334c7283905a8bd316bc54b8835

  • SHA512

    6c642e6f4a3709a72fb7eabb38d8033a0f8442944c2fbb8c3e8eb620833e6aaf0b0b5448e112c49952ae379373432c5241415faf61e20acf9b2b9b43a9dae630

  • SSDEEP

    6291456:jiWTNdWXEbLnxByxO+aE3F8fZB+3I2TXnu8YyAzrzsnlYAI770omn0FHBxoRA0wM:OWTNdWcxcxh3FQN27nunzsnCXG0FhxoP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CRforVS13SP29_0-10010309.exe
    "C:\Users\Admin\AppData\Local\Temp\CRforVS13SP29_0-10010309.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1796
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 1C12D7F1D94320E1635FFC1786B203B1 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabF97E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\MSIB64.tmp

    Filesize

    3.4MB

    MD5

    a5e62eb88f1ff6bfc0649415e203bdb6

    SHA1

    befdd15ed57f19013d355dfa3908981f5062c2ec

    SHA256

    e694fbbd7b691674d25c71da30f36dec52e06d0542baa5bdbc3c5b7b696a7934

    SHA512

    20f4e1177b9a0e2850c8cdb79a4f34f2f89aa507ae59bed651c2a971074e436b6bf4935affae431d4a19c1e4d516cb3d7f6c9a6627695106b5ce567819f749d6

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\package\1033.mst

    Filesize

    268KB

    MD5

    23cde22035b62b6e9c87fa2bfa1ca7d4

    SHA1

    21eae83940e30b0f4623efc58ac0fa37528f7275

    SHA256

    330d514ca2d6a93a2bf122dc71b47fb2301aa01695441f2a937a8f66fbf84e42

    SHA512

    45de290f746d7a96a701764dc0b2d0fc68cb168246ed87b836f3a80618dd09b9ff8abf56445386d08367cd2e0e53f3a9af381fff1870d859ebca64e4f2f82cb4

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.ini

    Filesize

    230B

    MD5

    e495d03378fb39b980228abae1c880f5

    SHA1

    50fe165b6fe0cee012bea4fe92120116a8596fc4

    SHA256

    cb9b4b4c065f75ea1c61baaecb14afebd1810b38bf84834980f95ccf71f7c78e

    SHA512

    cce1fd439494de0c1463c31f7fe3a2d60f3f7a5c016fa3af1fbb319cf64b79534c4633fd613572dd0cd91d653073ccefc7b36bb3c5f87a502777245cf910c30e

  • C:\Users\Admin\AppData\Local\Temp\TarFA5B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe

    Filesize

    3.4MB

    MD5

    5b45fb825b3ee4370ab066813002e86b

    SHA1

    1ac63aad11dd26db7dcb1524695dd50cf63f0334

    SHA256

    6b7b104341585703ba1a4ac025ea2c7aa591ec79467270b322e5e9d9f0419d99

    SHA512

    0a1a7e12740f5170a1a2ba3eac3e9ab74f0b32761898f15195bd007279fc9da125f80c99284d4f54cf6a1c9b09d27f5ed7fae94b185560633168d9d9204c52e0

  • memory/2108-224-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2108-308-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2108-439-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB