Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

30/09/2024, 20:16

240930-y2bt7axdme 8

30/09/2024, 20:14

240930-yzywyaxdje 8

30/09/2024, 20:06

240930-yvhzxsshmn 6

Analysis

  • max time kernel
    88s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 20:06

General

  • Target

    UpdateTool.msi

  • Size

    173.6MB

  • MD5

    90c290ef28ab6f163a446969090f2daf

  • SHA1

    c98b1d586dbb4be7781799a5f414292f11b8326d

  • SHA256

    667c036ba1c67b0e6377a23deca78f35220ff15ec278e34fffa521f779b1ddb4

  • SHA512

    5615cf7e26f9f762e3853b49b42a327dffdb9f601178bb7d743ab362277d0c850fcbbf40b7c759d7a41f9436dc7e16138a91729fb7ec13d199bffc05b0bb660d

  • SSDEEP

    3145728:QP7AKGpPJJgLBZV7MVRy7mURaD8RhDFoqoCPO5R3CvKCNaInqqD7vZbUD02ilsjr:mAKgPLgLBZVR3RBlatCPO2H/5b2iqjr

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 7 IoCs
  • Loads dropped DLL 4 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\UpdateTool.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3964
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 9D4165D6ABE0D3DE320F64A46CE7966D
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\248DDD9FCF61002E219645695E3FFC98_3EA7DE19EE0C309EB676B7E60E82F717

    Filesize

    727B

    MD5

    e5b34a1d4fb702a002aadc2ba0a2c550

    SHA1

    dc66efde97577f57c4d0637126699a8fbc5d1fdb

    SHA256

    4e4e8de8822628ad8a1a124e0787540107599e74c772139127fcc7a77f1dc46c

    SHA512

    729bc09347d0bfebc86865cd0156ca643f7d8ff0a9501fe851d25c43af80ec1f14047e9a43e11dbf8f7613cd99291c1bae6a64f148585290be8375566931b9f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

    Filesize

    727B

    MD5

    7e5e9912de7a985ff6257b5e3005de2c

    SHA1

    3d5557f4d0ce85b5d42ae97579b154c53648c418

    SHA256

    ec0bdea0fcc54be0a302cac5a2513186ccd5a9e1bd9de7c8dd81ce1773141571

    SHA512

    a2a8e2118dcbbeeb1c208fc34ac67d78ba85bddeffe3cc81668ce2b90d8cb992b2be881ed9db2c9847cebc597558060d2cec50337cef115bc2a07773076a6e4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\248DDD9FCF61002E219645695E3FFC98_3EA7DE19EE0C309EB676B7E60E82F717

    Filesize

    478B

    MD5

    1bc8b45fede588166f6064a6994433c5

    SHA1

    a662ed0eaadc13975127fbf84bb372b3914b5a89

    SHA256

    a24dff64b3e45612ea7ebdc19b798ecdffba27beba78ca25045150ecbc2b8bb6

    SHA512

    d3501d00c0015a5722851cbe209da2fa865c2336524363f8beaee744e0b04eb2188df5562ace113d00e3f41b019d5ebac7bdbb7ec4920e40a93da8a632db7e0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

    Filesize

    478B

    MD5

    589368f8d6f497d0f761351d661a6c73

    SHA1

    1a5c47d0b8f6a1aedc119bac2943a4bffbe0be1a

    SHA256

    a2c35da846cf22412c25e9306eae095de653a23a6d5a25cbb8b88963c8a5d35e

    SHA512

    ba81389f15a5956bdd73f92cddc785e509757cc93ca0e1701b00dd9d8c4e6c6a8e5a3ca48d106c78ab9b3bd383be775501a5e786fb1459286525ed0b456516d4

  • C:\Windows\Installer\MSIA0A5.tmp

    Filesize

    550KB

    MD5

    8259dc74965f3c8e91d152862580a773

    SHA1

    d2d029f9f9be25be3c5526c5a52449c034c673e1

    SHA256

    84f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9

    SHA512

    50903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0

  • C:\Windows\Installer\MSIA28C.tmp

    Filesize

    945KB

    MD5

    75fdd4bafba5d7082126be37eef2598a

    SHA1

    73cb2823016ecb1ce287da67e135e02c13c556c6

    SHA256

    4ecd8241776a95987927cc7cc4854f2d1b4ce3e0631aed33c7639e931921ba15

    SHA512

    00bd76d4bb9ac5cb5ded051d37e8df5e4a9c6209e747b2b399f7744d833fad0e957fd4fa897db02bc3ea9ae1da8d25e29623ef19c968c7791481e51fd6a7f891