Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2022, 14:47

General

  • Target

    https://www.evernote.com/shard/s564/sh/97c87758-2c61-1075-42ef-174a05fd256f/ec1cdf97b6251b6b8d9d3d81dd267367

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.evernote.com/shard/s564/sh/97c87758-2c61-1075-42ef-174a05fd256f/ec1cdf97b6251b6b8d9d3d81dd267367
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1040
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275476 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1160
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1036
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x500
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1820
    • C:\Program Files (x86)\Microsoft Office\Office14\msohtmed.exe
      "C:\Program Files (x86)\Microsoft Office\Office14\msohtmed.exe" C:\Users\Admin\Downloads\message (1).html
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:692
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Downloads\message (1).html"
        2⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:1556
    • C:\Windows\system32\notepad.exe
      "C:\Windows\system32\notepad.exe"
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1952

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      0574537938780fa8fd1fe42464f6939d

      SHA1

      b336b0849fa8bee27ac642f6da3f0327317693be

      SHA256

      e20430497fd6ac5e1009174f7211faa8d5684348be6e58fdbedabc46e44dbdd4

      SHA512

      434be5a0f8151db097433ffa84bd1551d9043eb9378ff9f3c50a95162d75ea9d6ce0ce13934c1681b133fd6314ef90e4ba0307780976c51d52e8c0957eac89b6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      df08ee6338ea21249c086d137a7c8e8a

      SHA1

      8c84963709f58c0959a41069088b18a44d9b1935

      SHA256

      e56f9839411b377c8ed9627188f1e88e42434e0bf24084f7c0eebb714a1e50b7

      SHA512

      851d4aa3b218ee83e9e601baca06c1ee2457d278d05b303120411db000dc7b3b0ea9a06e9744063dd7692002dc35f537f86f5563e456cc650d50dc733bccdc36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      60KB

      MD5

      d15aaa7c9be910a9898260767e2490e1

      SHA1

      2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

      SHA256

      f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

      SHA512

      7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      724B

      MD5

      f569e1d183b84e8078dc456192127536

      SHA1

      30c537463eed902925300dd07a87d820a713753f

      SHA256

      287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

      SHA512

      49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      c0d7da96d964ac4e0d7821f6ee18d056

      SHA1

      dcb56ed76925cc703c0ba4d3779233cf9870906e

      SHA256

      4a742cb7b61373e4331347c3a762555bf70c6038af3a15f00e656593abc1e453

      SHA512

      90b5ab0b857e85b78ea10e9efd17313a79089452896b83bda578445990dae31c74de35ea3c661a253d8117f6b59d3398453d89887d7bcc24cd7f77455e7e2ec0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      f61281531e0917cfbf20bb46aa041302

      SHA1

      f95da4d76f0e74f2f3b65b6abd31159e30bf3ef7

      SHA256

      4745a8f672911569a0e0ea925d3d10c618591bfeacc84fb548af9dfc0ffe4ada

      SHA512

      84402304a673721ff7d26d6283e3581d587577f1d56e2153da798de46dfaca29e301bc602a3f291afee2c1ff96dcb74e7fe1b922c7e4158621dab7880870dffd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      81b45e43b0f88a53b9dbe4737a25468a

      SHA1

      d301bd52f6fa26c18a49c26abc794942efb20cf6

      SHA256

      9caabb86eb7dfd0f265c3a7c8988dae53ae29686c5bebf04e39054055d6773c9

      SHA512

      1ac9cd87e435319f350fb1cc61c3ab8946cc0ad86cf6423934a9cfe997c122b76d323a7dc279049194c1820cb04c0f914d3c8bb30d05664c75338108ac29f638

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      65061de2b7ca0e8892055f1b5179d6ec

      SHA1

      a665b24093d6c4460bcbaa1064e8f21271f30062

      SHA256

      3915ee3a61ab7c10974cdda387e23b1437739be7923f1e91a4d63143ba73b758

      SHA512

      ee5cd4cba8984d7014c8a40e4a06fb8be7704acbd22fae5242b8a3e003562107bfd1cc063d7a1cba3e2be74a4a04419dc403ffc3d571fc6350f47e3d8a5eb697

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      392B

      MD5

      21387501a553a84126fd1c4690e6ccc0

      SHA1

      617025c6cc281f74cf8d99b266efa897a79bb569

      SHA256

      b1267c17f9ce8d35dd39abc2334092f5934697749fa6f2b1010372f8aa84fa11

      SHA512

      2f99864cf3396971499cc2e75a9d25cafe62ee1c20304d5345b0e265c7b007190e69bc3a10490923569d274286879ae24c3e33f3494f84ab3e21429c318a1379

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      5952d4a54ac5f51aed420d18ef41ccb5

      SHA1

      909498c7a25f53210591526c5551775336259916

      SHA256

      f23630232bb0b321da6152d8934363bec55091f96bdae6648499721c643990ad

      SHA512

      784dae588fd72aee01005dd756090761c7dfe002cfe3d57ea5f22e92cdcf65ceec0ea882d384e1fed7833f3fbcea0313b12f6f35d81c3971341039be56276f7c

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

      Filesize

      37KB

      MD5

      40bbe1f63c2c8e868851c98c96aec674

      SHA1

      345e5dd80194db4cf2cf0d9efb7e947f75286147

      SHA256

      2d9f634b138ff011925b3406d2a6a7406972e50bce34bf8a0a86429a325951e0

      SHA512

      0cba89929c8620371f782c3d22740890cddaa68e7ebc2c51193e89162c39901e7d3045fe72ac55bb0ecacdafdb43fbc91e012fa221e5f663742cbba85284756c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VXHCE8VS.txt

      Filesize

      603B

      MD5

      3fffb9ce73055bc6939e7aa36a696060

      SHA1

      674671e4132c8e2863798ae112c04c0d10dfd982

      SHA256

      d975dfecab004ee3f54a31820659014b8123242e0e1893c45dbb8e25b5c0b840

      SHA512

      8f8823779ede1e35d4089836d539cc6e56934018ad14813e57d2c0db81d0bca06a561edb945277a500d856d46097e3bbb21cd58a81cd13d71b60179b5db9c719

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\X6316D3C.txt

      Filesize

      371B

      MD5

      a187ee16528dc08e73a3f86f5cbc72b7

      SHA1

      ff8736e5575aa99e686a9abd9a8ae83717ff9e19

      SHA256

      41054313be308a0a0080b2f06f61684fef37421167903c63da351b6231998be7

      SHA512

      a73ded88ac18732a87d9eabaf9ef778332f96b159979b01318bbf0eacd371d0b1474db06396204ca3eb4007b50cc57ae3c07250df43ff57f1a94f9ea8e63d6fd

    • C:\Users\Admin\Downloads\message (1).html.p15bzh9.partial

      Filesize

      799KB

      MD5

      0ff05a3811ea41a14316b680ec285d1f

      SHA1

      dc5882ad5de4b8b4bf40b4da5df81784fca6c33b

      SHA256

      822f715bcfa0addb288433e50b8fd9cd4b9225368dcd08a0b8641058ff3bf393

      SHA512

      de000bf6c60cd7327b1f46a17bf5cd02c2104729bfa1c7ed1869ecbbb4b8050632c055a19addbc22aa119b0c5999d72aa4ed1f931de2ca029e428255c8e81b8d

    • memory/692-70-0x0000000075A11000-0x0000000075A13000-memory.dmp

      Filesize

      8KB

    • memory/1036-69-0x000007FEFB631000-0x000007FEFB633000-memory.dmp

      Filesize

      8KB

    • memory/1556-72-0x000000006FC41000-0x000000006FC44000-memory.dmp

      Filesize

      12KB

    • memory/1556-73-0x000000006D511000-0x000000006D513000-memory.dmp

      Filesize

      8KB

    • memory/1556-74-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1556-76-0x000000006E4FD000-0x000000006E508000-memory.dmp

      Filesize

      44KB

    • memory/1556-77-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1556-78-0x000000006E4FD000-0x000000006E508000-memory.dmp

      Filesize

      44KB