Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    284s
  • max time network
    288s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/11/2024, 14:47

General

  • Target

    08112024_1447_BluetraitAgent381.msi

  • Size

    3.6MB

  • MD5

    0c7d30468c0d5975866b6f10017330d9

  • SHA1

    0f2d7d1d9fa10d46e8d73c75db7509f950578bc6

  • SHA256

    1cd8f56f9213249e555dedda4380add02cbe74fb81a5806ef1eec3935a7f041a

  • SHA512

    6b42376e6c0b69eb5e005a64c1cf6e92a27938ede43badf599c496a508c7d10e5178109e899de79d4aa01b15d982c748f3e5ece657815916f68dcd3fdb2dfd5e

  • SSDEEP

    98304:7JAqhv+JtUaJRWta/Tbs9JVzlgroDWX9Ha:7Jzhv+MaR/c93BW2S9

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 17 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 25 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\08112024_1447_BluetraitAgent381.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2524
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 7DFCD4D7BAF1A5811781D046A7541876
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1912
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F8B2879FDC15A11296E14E243260B129 M Global\MSI0000
      2⤵
      • Drops file in Windows directory
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2884
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2652
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004BC" "00000000000003D0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1388
  • C:\Program Files (x86)\Bluetrait Agent\Bluetrait MSP Agent.exe
    "C:\Program Files (x86)\Bluetrait Agent\Bluetrait MSP Agent.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:684
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2200

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f76be23.rbs

      Filesize

      223KB

      MD5

      3828279d0ec8fd2c4ed736fec1d1d109

      SHA1

      4bbbd3c4194bc8c0094f48c0a32fc676765351f1

      SHA256

      b2f8acb506af155d073e879f1c3a79f957fd3a3ea67eb81e245fa4e3e116f13d

      SHA512

      096651317652a14cedad64b670dd5b9fce23facf64cb72425dea37d1f7a19d15cefb3147ff1fc0bdf3aefcd461283325ac23f6156a34b10946fe15ff8cc14954

    • C:\Program Files (x86)\Bluetrait Agent\Bluetrait MSP Agent.exe

      Filesize

      144KB

      MD5

      0bf209e4007d441249ae049c623f6544

      SHA1

      52c4d547190f60ba2f9a69764365a6f9bb1d78f1

      SHA256

      53313cd27befc363c5d49ff70de54ef0dace6e6470b9b53875f40b67980ea263

      SHA512

      afc05675331082d8242cdfa187533b152dfdcd7ed78bcb3169f46c75a349e3688e89ae6c88194287f33ae1cd62aa95b6d96c53bd024a36b5ec3ad6e675d6ea7e

    • C:\Program Files (x86)\Bluetrait Agent\Newtonsoft.Json.dll

      Filesize

      695KB

      MD5

      195ffb7167db3219b217c4fd439eedd6

      SHA1

      1e76e6099570ede620b76ed47cf8d03a936d49f8

      SHA256

      e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

      SHA512

      56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

    • C:\Program Files (x86)\Bluetrait Agent\System.Data.SQLite.dll

      Filesize

      421KB

      MD5

      edd007cf3fcb18ccef985f58004b1aee

      SHA1

      c3a697e0552ab600132f8fd4635f78517d4cb4e4

      SHA256

      9b0581b003161d1605405ab4ae2a31e03bf3287673c148f4a1d90253aaad2c30

      SHA512

      f848b4c4ba2f95ab9e8f90b5de8d169013b6c0ed7465c24f378c3df44d5bcc52e44c15e05973392e4d53c5b53007c8122ce4fd632d0ac203040fed10abb0b75f

    • C:\Program Files (x86)\Bluetrait Agent\System.Management.Automation.dll

      Filesize

      303KB

      MD5

      abcd646cb66d95ce0283ac6a888befb7

      SHA1

      5f375e113da40c0870d0027625e1ffb129a9727f

      SHA256

      40aecc98d1878c93acad8f41db3c310c382be92c3bce396e3f6e6a03a37df193

      SHA512

      f69f25e39264b5552b80b3500f917c202c1ab16d2f03ca42f7d30104f6492a427bc3280e68f813d01c1ae0b1d111ca7403df4a040e5358ca0737c8e7a1a4410f

    • C:\Program Files (x86)\Bluetrait Agent\defaults.json

      Filesize

      150B

      MD5

      c5e8ee5b64c5c90671d9f622c44d961f

      SHA1

      cb0e5bf2d02c786010a4a90b7472a33bec9993d8

      SHA256

      bda80f52fe54822967f104e46bc300d4c8f07365ad1c446b5995e02493560354

      SHA512

      6cacc76e49b9df5becce19a7337a7b6b361a52387a0c17f812e2e194137455d1e0e4a9b5ec137d178715261597bacaf399377107ab37bcc6cb113fd52b78acfa

    • C:\Program Files (x86)\Bluetrait Agent\x64\SQLite.Interop.dll

      Filesize

      1.7MB

      MD5

      65ccd6ecb99899083d43f7c24eb8f869

      SHA1

      27037a9470cc5ed177c0b6688495f3a51996a023

      SHA256

      aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

      SHA512

      533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

      Filesize

      765B

      MD5

      7a5523670eb6edef99a7e8c68a08f72f

      SHA1

      78dad216bdbe5eae1bc353a81163018b994d500a

      SHA256

      c2008c47d97a33763379c33a710ef7ebf95e1b8668382997a8eee5c7aa51cf59

      SHA512

      b40ac448bbc2d4ae3807c2efb799895cdb8e10dac2df5889ed19e2dafe1598abcfd379162f403861a322580ce83e55ea8ed7434855054d22cf01a31c5b7099ac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_5001C7BC78598D0B752119C0FACA0CDE

      Filesize

      637B

      MD5

      af38f50bd1cc3aa82102915cf617fac0

      SHA1

      06187fd77a0e6ef81f7650ba96631c973c7b8e69

      SHA256

      18700357e0bfbb69c6a6da4d61d7b3fdfaa0642efaef5698b316c18017462a76

      SHA512

      4e932f82b33c93221f4e91a4d4db5d88359dbd2ccc685c75861a05cea63847262a08d5344aa699a27e1df9bffa824f89a11bd7efa86dedb77209979cc9d77f49

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

      Filesize

      1KB

      MD5

      a49813a199dca7806e0d9e75afccf1ed

      SHA1

      509ff362730afd40ea482c760fb6a561af75e3f4

      SHA256

      fb0dc1baaa57ec867bd9332adec22afcf205192d60e923d63a152b9ee5379bd1

      SHA512

      686b7df717e7f247c682a072fd047d8acca25609d119a75e6ebdf750d66622e848aeee4605c7523c62611ca3184870bd5b6a3bb26d05ba259d6d89cd774e5706

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

      Filesize

      484B

      MD5

      0d3beb5cc4c61bf7d846571cf7ba8f5e

      SHA1

      e19efe7d29aca68b788370f44085ef21d78a9a7e

      SHA256

      e2d9ecdc57af735e9aebc2a7124911a1bed9c89ef6feaee0802720e61fde83c2

      SHA512

      e82b3482e5761f7733c7c5ed2a61d5a6b57619b72f43e53864182f87e848ba4e5d784a0c8630c0e10ab55aba63602c511f89660b3e5b253314a5c08e7e1e1092

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4051a59d58f9169129dcbe1df31f3716

      SHA1

      dea922ac590322942a5e480d4fbc68d33d1e2773

      SHA256

      10099d9fb167002e6c8aaa4a46f4969a6353f0229b98ab3b7799d8b13222c0b9

      SHA512

      156ab7f91ff31fbb4b99c318fd80ba46df699d5e7b5bb2035b31da6a6ae1a00c7c7fb4690f323b7e22dc7993365376106f64710db967df50a877f4a25df4ac28

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_5001C7BC78598D0B752119C0FACA0CDE

      Filesize

      488B

      MD5

      217b2322b9cc7d16d44dd3f5ec859bd3

      SHA1

      3cc3b2d4ad14f46769983c3cb8d4ee7e209ff414

      SHA256

      cd514dd46da3981fdc6c7e8c94267ae3bcc29a43cb8f0fadae72478ab34fd46e

      SHA512

      c2eb759e1306ce05339cbc8ca0349c6985f07f5fe10e9ab4f0cefe136f8f55ab28d1587c607dbc44d5178d816da689229ee6c663ee40fbd3e3cfe890d80ba15a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

      Filesize

      482B

      MD5

      f937c016b117507b929d45154ce8efe8

      SHA1

      0c41427d2682c97f1f027d79b6bbf8160843b12b

      SHA256

      4588e5889b04f78fbd8c745b1f47fc56646f0b5c4e7db9910bfc8964bb21a996

      SHA512

      60aecf4e8fd0fbe529ea76cb813cacffa6d2c2378a3c902696016740c05ef1250f853857d75bd40051cdede7e20802b180de160dcc816c68bc591b6ac413318d

    • C:\Users\Admin\AppData\Local\Temp\CabA0A5.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarA0C7.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Windows\Installer\MSIBF1E.tmp

      Filesize

      211KB

      MD5

      a3ae5d86ecf38db9427359ea37a5f646

      SHA1

      eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

      SHA256

      c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

      SHA512

      96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

    • C:\Windows\Installer\f76be21.msi

      Filesize

      3.6MB

      MD5

      0c7d30468c0d5975866b6f10017330d9

      SHA1

      0f2d7d1d9fa10d46e8d73c75db7509f950578bc6

      SHA256

      1cd8f56f9213249e555dedda4380add02cbe74fb81a5806ef1eec3935a7f041a

      SHA512

      6b42376e6c0b69eb5e005a64c1cf6e92a27938ede43badf599c496a508c7d10e5178109e899de79d4aa01b15d982c748f3e5ece657815916f68dcd3fdb2dfd5e

    • memory/684-117-0x0000000019830000-0x000000001989A000-memory.dmp

      Filesize

      424KB

    • memory/684-120-0x0000000000350000-0x0000000000375000-memory.dmp

      Filesize

      148KB

    • memory/684-112-0x0000000019CB0000-0x0000000019D62000-memory.dmp

      Filesize

      712KB

    • memory/684-166-0x0000000000AA0000-0x0000000000AEE000-memory.dmp

      Filesize

      312KB

    • memory/684-110-0x0000000000AF0000-0x0000000000B18000-memory.dmp

      Filesize

      160KB