Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/10/2024, 12:02

241013-n7wrfazfnm 6

13/10/2024, 11:47

241013-nxwzfszbrq 6

Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 11:47

General

  • Target

    YoudaoDict_fanyiweb_navigation.msi

  • Size

    187.0MB

  • MD5

    70aeba0286a77763521f8c06a1cebf60

  • SHA1

    24af28f2b995668258e108dd44bc4c9111192c13

  • SHA256

    04c09c1d4c7674a6a70fcc6aa742aa300bd78f724d6de610d3809b444326b12f

  • SHA512

    4f2b9d38e8abdcb4bcc75b6445519a8ebec0c6770b4f5c0c2c0e8890c88bce47bfcfa0fc22b523304b155782151d32e7501cbd2d36af7cd9f5492360e8bbaee0

  • SSDEEP

    3145728:rObtNwBblcqir6N2pdI5OExQPPc0Bi8NKIM5ZTs5+IVzqYqBMeutEsSQHXLY+gQe:Shdueq5dxQncq2RBs5XzqABtEqTjtxO

Malware Config

Signatures

  • Blocklisted process makes network request 10 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 16 IoCs
  • Loads dropped DLL 7 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\YoudaoDict_fanyiweb_navigation.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3736
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4168
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3996
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 15EF163783627B10E351153F1F9A8EC7
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3152
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 00C4640E81E5242F1ADCA7284DE7E2E3 E Global\MSI0000
      2⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      PID:2964
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Installer\MSIA335.tmp

    Filesize

    904KB

    MD5

    421643ee7bb89e6df092bc4b18a40ff8

    SHA1

    e801582a6dd358060a699c9c5cde31cd07ee49ab

    SHA256

    d6b89fd5a95071e7b144d8bedcb09b694e9cd14bfbfafb782b17cf8413eac6da

    SHA512

    d59c4ec7690e535da84f94bef2be7f94d6bfd0b2908fa9a67d0897abe8a2825fd52354c495ea1a7f133f727c2ee356869cc80bacf5557864d535a72d8c396023

  • C:\Windows\Installer\MSIA994.tmp

    Filesize

    760KB

    MD5

    df6d353853f28e4c4c0464b83f5220f2

    SHA1

    d714c58314b018f6599c4ff0518d2867bb3eca44

    SHA256

    dc64604e2a5dd9f1c01fd583f847d871269d680f1241644db0828e3adaf7067b

    SHA512

    3cfd6150e69c3e1201c57a43ab31a8021703ebf03271d1f6eb9cd20b3283484364bad905041b4a1b5e7139e9ecbb60764be6cb4c975be73e3c9413d6cd6a22be

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    24.1MB

    MD5

    c1c40841e2cce21534eb8fe95fec80b5

    SHA1

    7eb3d80c59df55d0800d0d97cbf4c8a20b9a4c22

    SHA256

    e922552c41f2835996d7e81604fa904579682cd2cf953673f92c43a5f54197d5

    SHA512

    b0017df04b883fb38a83175243de82d9737fc22730f6d1f20a984ae9516d0cf00513773bdf967e91d7f180513925a3c5c92d674ed4d9894f6d888263b4856e31

  • \??\Volume{77a2731a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{8fd24401-52a7-4fc7-9165-5e827485d11a}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    a9604fb54af3b26d72876bca11dbf773

    SHA1

    49f8addc0fa9016a0336b8df69bcc31b2404e047

    SHA256

    0766c4b579fe9074cd841f18d1691568acbbd425615e5efa87d21c4a65547183

    SHA512

    33d3209f61a7e27c3c5f293f6c54639b26290a6d6295ac1bcb742c9724d01d6bbcb8c36ae22710cf7ecae9eb374b715d77e05c5198bb34286fc3abe09aad641b