Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
30/09/2024, 20:16
240930-y2bt7axdme 830/09/2024, 20:14
240930-yzywyaxdje 830/09/2024, 20:06
240930-yvhzxsshmn 6Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
UpdateTool.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
UpdateTool.msi
Resource
win10v2004-20240802-en
General
-
Target
UpdateTool.msi
-
Size
173.6MB
-
MD5
90c290ef28ab6f163a446969090f2daf
-
SHA1
c98b1d586dbb4be7781799a5f414292f11b8326d
-
SHA256
667c036ba1c67b0e6377a23deca78f35220ff15ec278e34fffa521f779b1ddb4
-
SHA512
5615cf7e26f9f762e3853b49b42a327dffdb9f601178bb7d743ab362277d0c850fcbbf40b7c759d7a41f9436dc7e16138a91729fb7ec13d199bffc05b0bb660d
-
SSDEEP
3145728:QP7AKGpPJJgLBZV7MVRy7mURaD8RhDFoqoCPO5R3CvKCNaInqqD7vZbUD02ilsjr:mAKgPLgLBZVR3RBlatCPO2H/5b2iqjr
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2696 msiexec.exe 5 2696 msiexec.exe 6 2896 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSICE9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID19.tmp msiexec.exe File created C:\Windows\Installer\f77058c.msi msiexec.exe File opened for modification C:\Windows\Installer\f77058c.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIC6C.tmp msiexec.exe -
Loads dropped DLL 3 IoCs
pid Process 1824 MsiExec.exe 1824 MsiExec.exe 1824 MsiExec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2696 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 2696 msiexec.exe Token: SeIncreaseQuotaPrivilege 2696 msiexec.exe Token: SeRestorePrivilege 2896 msiexec.exe Token: SeTakeOwnershipPrivilege 2896 msiexec.exe Token: SeSecurityPrivilege 2896 msiexec.exe Token: SeCreateTokenPrivilege 2696 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2696 msiexec.exe Token: SeLockMemoryPrivilege 2696 msiexec.exe Token: SeIncreaseQuotaPrivilege 2696 msiexec.exe Token: SeMachineAccountPrivilege 2696 msiexec.exe Token: SeTcbPrivilege 2696 msiexec.exe Token: SeSecurityPrivilege 2696 msiexec.exe Token: SeTakeOwnershipPrivilege 2696 msiexec.exe Token: SeLoadDriverPrivilege 2696 msiexec.exe Token: SeSystemProfilePrivilege 2696 msiexec.exe Token: SeSystemtimePrivilege 2696 msiexec.exe Token: SeProfSingleProcessPrivilege 2696 msiexec.exe Token: SeIncBasePriorityPrivilege 2696 msiexec.exe Token: SeCreatePagefilePrivilege 2696 msiexec.exe Token: SeCreatePermanentPrivilege 2696 msiexec.exe Token: SeBackupPrivilege 2696 msiexec.exe Token: SeRestorePrivilege 2696 msiexec.exe Token: SeShutdownPrivilege 2696 msiexec.exe Token: SeDebugPrivilege 2696 msiexec.exe Token: SeAuditPrivilege 2696 msiexec.exe Token: SeSystemEnvironmentPrivilege 2696 msiexec.exe Token: SeChangeNotifyPrivilege 2696 msiexec.exe Token: SeRemoteShutdownPrivilege 2696 msiexec.exe Token: SeUndockPrivilege 2696 msiexec.exe Token: SeSyncAgentPrivilege 2696 msiexec.exe Token: SeEnableDelegationPrivilege 2696 msiexec.exe Token: SeManageVolumePrivilege 2696 msiexec.exe Token: SeImpersonatePrivilege 2696 msiexec.exe Token: SeCreateGlobalPrivilege 2696 msiexec.exe Token: SeRestorePrivilege 2896 msiexec.exe Token: SeTakeOwnershipPrivilege 2896 msiexec.exe Token: SeRestorePrivilege 2896 msiexec.exe Token: SeTakeOwnershipPrivilege 2896 msiexec.exe Token: SeRestorePrivilege 2896 msiexec.exe Token: SeTakeOwnershipPrivilege 2896 msiexec.exe Token: SeRestorePrivilege 2896 msiexec.exe Token: SeTakeOwnershipPrivilege 2896 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2696 msiexec.exe 2696 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1824 2896 msiexec.exe 31 PID 2896 wrote to memory of 1824 2896 msiexec.exe 31 PID 2896 wrote to memory of 1824 2896 msiexec.exe 31 PID 2896 wrote to memory of 1824 2896 msiexec.exe 31 PID 2896 wrote to memory of 1824 2896 msiexec.exe 31 PID 2896 wrote to memory of 1824 2896 msiexec.exe 31 PID 2896 wrote to memory of 1824 2896 msiexec.exe 31
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\UpdateTool.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2696
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5CD0A10F291BDBF54286DC00B7A4B2732⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e11e31581aae545302f6176a117b4d95
SHA1743af0529bd032a0f44a83cdd4baa97b7c2ec49a
SHA2562e7bf16cc22485a7bbe2aa8696750761b0ae39be3b2fe9d0cc6d4ef73491425c
SHA512c63aba6ca79c60a92b3bd26d784a5436e45a626022958bf6c194afc380c7bfb01fadf0b772513bbdbd7f1bb73691b0edb2f60b2f235ec9e0b81c427e04fbe451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07298EE8EBA9732300AE62BDCA6B6898
Filesize312B
MD5b5106d0e1a34f078af0a4bc022f2b5ce
SHA1c4da3f7fe605c456cfda010a02f4b9187e882b3a
SHA2560f8cd2c784387ddc41cb8192a2c3432a9f35a4a248c385230148f479e57f8740
SHA512973bb01e0bd334cb48248d93a8305aa5909d3609922318a3dc72018e927b61e93ec7731d8dd181ad6cc4c31b1fd90fa991dfd96d568144d91febb11cddfaff11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3a1de9c8d4e9789cc338d138de5b68f
SHA13780c0da8e41c11b7ebc813f5bcc901f43515c0d
SHA25677d0d97c705588f9b2b92e646e59c83f65bf50a23d6bac4f86428616543f8b92
SHA51237b9135794a50abf96a8bec3741f081ab292a8d46e956fbd075b869a051014086b1a6f1dd8cac8dc8be787766f99731def474e93f5f08330eb4d0e4884a14f26
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
550KB
MD58259dc74965f3c8e91d152862580a773
SHA1d2d029f9f9be25be3c5526c5a52449c034c673e1
SHA25684f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9
SHA51250903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0
-
Filesize
945KB
MD575fdd4bafba5d7082126be37eef2598a
SHA173cb2823016ecb1ce287da67e135e02c13c556c6
SHA2564ecd8241776a95987927cc7cc4854f2d1b4ce3e0631aed33c7639e931921ba15
SHA51200bd76d4bb9ac5cb5ded051d37e8df5e4a9c6209e747b2b399f7744d833fad0e957fd4fa897db02bc3ea9ae1da8d25e29623ef19c968c7791481e51fd6a7f891