Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    114s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2025, 04:21

General

  • Target

    7d907d9d7f607508f3786b142d4572be9294f4c33f234d546fda6037564cbf0e.msi

  • Size

    2.0MB

  • MD5

    0cc2fa779d757287fbc75c72fa82350f

  • SHA1

    3bfe4a489d2d709dc9d03aba8696e39eeb7bbc24

  • SHA256

    7d907d9d7f607508f3786b142d4572be9294f4c33f234d546fda6037564cbf0e

  • SHA512

    b6daf164ce8779896fa78d2a79ea017a94e4212e485f6d80e8a16790fc3bcbf12a561a8fe5fd2aea9c20dd8ecb9afd89d7a84721536dd2b01f9d94ac6d6270a8

  • SSDEEP

    24576:Bt9cpVDhR6flamhHegS/JZBTd59I5EoE/HXnI9sbqU4XA:2pRhwdayegS3sW7qo

Malware Config

Extracted

Family

metastealer

C2

kiyaqoimsiieeyqa.xyz

ssqsmisuowqcwsqo.xyz

ykqmwgsuummieaug.xyz

ewukeskgqswqesiw.xyz

cscqcsgewmwwaaui.xyz

cyoksykiamiscyia.xyz

okgomokemoucqeso.xyz

ikwacuakiqeimwua.xyz

aawcsqqaywckiwmi.xyz

aiqasksgmyeqocei.xyz

qgumcuisgaeyuqqe.xyz

eiesoycamyqqgcea.xyz

ywceswakicsqomqw.xyz

auaieuewouawygku.xyz

cmiascusccywowcs.xyz

uiqkkomkaceqacec.xyz

quqeciymqmkqccqw.xyz

ssqsauuuyyigouou.xyz

aogaakukuugqswcy.xyz

ucgwcwsuqsuwewgc.xyz

Attributes
  • dga_seed

    21845

  • domain_length

    16

  • num_dga_domains

    10000

  • port

    443

Signatures

  • Meta Stealer

    Meta Stealer steals passwords stored in browsers, written in C++.

  • MetaStealer payload 1 IoCs
  • Metastealer family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\7d907d9d7f607508f3786b142d4572be9294f4c33f234d546fda6037564cbf0e.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4384
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5088
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4440
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 39E6E1F7B7884464138B9846129E1650
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-dbb46c05-52ca-4a01-88dc-bdcd38b872c3\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:1696
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2100
      • C:\Users\Admin\AppData\Local\Temp\MW-dbb46c05-52ca-4a01-88dc-bdcd38b872c3\files\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-dbb46c05-52ca-4a01-88dc-bdcd38b872c3\files\setup.exe" /VERYSILENT /VERYSILENT
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4796
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Microsoft\Windows\search.exe"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1604
        • C:\Windows\SysWOW64\systeminfo.exe
          systeminfo
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers system information
          PID:1228
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MW-dbb46c05-52ca-4a01-88dc-bdcd38b872c3\files.cab

    Filesize

    1.7MB

    MD5

    c26ba6d271eefb6c9b9b3c1c59f5cb02

    SHA1

    93caabedd0312ffa671dcd77cd8ac584315998ad

    SHA256

    09ba32ab39638978e7c6f23b715522a53eea592fcce521c30348bc7c37d11cc7

    SHA512

    c9c1c80e1066e22f057d7dab8779dc1e5bcfe574090cb32052707a1ada1e42cee9374c6764881efc5c2b920da75599ecea934d97710ebebe43751ec473aded89

  • C:\Users\Admin\AppData\Local\Temp\MW-dbb46c05-52ca-4a01-88dc-bdcd38b872c3\msiwrapper.ini

    Filesize

    1KB

    MD5

    76c693a88e95116bf1c8e80d9bc68b7a

    SHA1

    8199c27ad3291280d87e5320c406eac4094394be

    SHA256

    4cf961fa0383213630a51c445cdcb2810fc11ac6ffaa6605712a2e7cccf9baee

    SHA512

    ab5b890f3eb0f531ce25610edf0ed000df3aef07c21334e2518a3d8d5c30da269966cfa55e9cbe75a0e5cf9345a7ca0df36845871eac96c3c2b05c2e8f23c2b4

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qbhg3mwl.cee.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Windows\Installer\MSIE9F2.tmp

    Filesize

    208KB

    MD5

    0c8921bbcc37c6efd34faf44cf3b0cb5

    SHA1

    dcfa71246157edcd09eecaf9d4c5e360b24b3e49

    SHA256

    fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1

    SHA512

    ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    24.1MB

    MD5

    fb99b11e31c9016b1af9c933e3f34e9d

    SHA1

    31af11ec0c7339822e9d9fc430205bb7f8aba934

    SHA256

    b437c8e17057ae343af3a21662116163f4a733991b7854e192b286ece91480ca

    SHA512

    bd47589d6c04dd12c20c5dc1726b58829ff99cc9148ad83b67a18e51822e3f57cf702c300def60a73f38c7773eda589b0d8ded51ba07bb7331865f9403ad0415

  • \??\Volume{612d9cf5-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{69912086-d134-4052-b2f8-c7d0a96e5c3e}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    4c45ea6a6b37cc844246d6ff6d8e77bb

    SHA1

    3c917eaf5d9081cd8baa8920228e268c4f000fc9

    SHA256

    65cd78fd0ac918d73f072c99cec233088b1006007ee29bd563ea807f3054ece0

    SHA512

    752032ccb42e8ddd0b5d1614a4a2e8f9d9bdd8a09fbf7f3869772e82dcc21a42feb0067c7a797d6bbf3a4d47bd6f9f7565b19f1f8d646fd8abdfca472e38bbc3

  • memory/1604-100-0x0000000006890000-0x00000000068DC000-memory.dmp

    Filesize

    304KB

  • memory/1604-112-0x0000000006E30000-0x0000000006E4E000-memory.dmp

    Filesize

    120KB

  • memory/1604-86-0x0000000006000000-0x0000000006022000-memory.dmp

    Filesize

    136KB

  • memory/1604-87-0x00000000060A0000-0x0000000006106000-memory.dmp

    Filesize

    408KB

  • memory/1604-88-0x0000000006110000-0x0000000006176000-memory.dmp

    Filesize

    408KB

  • memory/1604-83-0x0000000002F80000-0x0000000002FB6000-memory.dmp

    Filesize

    216KB

  • memory/1604-98-0x0000000006330000-0x0000000006684000-memory.dmp

    Filesize

    3.3MB

  • memory/1604-99-0x0000000006850000-0x000000000686E000-memory.dmp

    Filesize

    120KB

  • memory/1604-122-0x0000000007E00000-0x0000000007E08000-memory.dmp

    Filesize

    32KB

  • memory/1604-101-0x0000000007840000-0x0000000007872000-memory.dmp

    Filesize

    200KB

  • memory/1604-102-0x000000006ECD0000-0x000000006ED1C000-memory.dmp

    Filesize

    304KB

  • memory/1604-84-0x00000000059D0000-0x0000000005FF8000-memory.dmp

    Filesize

    6.2MB

  • memory/1604-113-0x0000000007A80000-0x0000000007B23000-memory.dmp

    Filesize

    652KB

  • memory/1604-114-0x00000000081D0000-0x000000000884A000-memory.dmp

    Filesize

    6.5MB

  • memory/1604-115-0x0000000007B80000-0x0000000007B9A000-memory.dmp

    Filesize

    104KB

  • memory/1604-116-0x0000000007BE0000-0x0000000007BEA000-memory.dmp

    Filesize

    40KB

  • memory/1604-117-0x0000000007E10000-0x0000000007EA6000-memory.dmp

    Filesize

    600KB

  • memory/1604-118-0x0000000007D80000-0x0000000007D91000-memory.dmp

    Filesize

    68KB

  • memory/1604-119-0x0000000007DB0000-0x0000000007DBE000-memory.dmp

    Filesize

    56KB

  • memory/1604-120-0x0000000007DC0000-0x0000000007DD4000-memory.dmp

    Filesize

    80KB

  • memory/1604-121-0x0000000007ED0000-0x0000000007EEA000-memory.dmp

    Filesize

    104KB

  • memory/4796-79-0x0000000010000000-0x0000000010738000-memory.dmp

    Filesize

    7.2MB