Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/10/2022, 20:49

General

  • Target

    document.doc

  • Size

    136KB

  • MD5

    842752ba59970ad2dd43ddd732b9b9b4

  • SHA1

    d06185aa778e9847e9f2b64ca14e204db85ad34f

  • SHA256

    6d16b1496ef4abeb729dd90058bc032bae51f17b02fddce7a86a0f2ce14aa382

  • SHA512

    f5075cc2429f002af973633a3b9b9a66bb5c006bbd7ecc2a7089833ba330deeb79759fcb3ed627e501e55d6a2be065561e28db977e0d60c832b340a0b5a477f4

  • SSDEEP

    1536:svjgRFh10xSHGGTwY2P5umwJDGy9PikmZQiGY6x8ktkJkudD63KywEonS8en62L0:sbgB1wkkY2P5lwIdN6x6nnB2Qn

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\document.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1708
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\explorer.exe
      explorer .
      2⤵
        PID:1596
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:920
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1456

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD

        Filesize

        128KB

        MD5

        3ba0c9179b092a207f50066f9bb13ab4

        SHA1

        f3d2ccfa1615e4d488da381d903c4868aa710dfd

        SHA256

        bde7192157565ef185de031f3f2080dbbcf19038d505f57a5b71341d10a43d4a

        SHA512

        0958dad948e1386df23d573c9ac9c246680337071a0b8c2a1702ee60351f1940de468a4dfc77e736dfe0458227a5dd2c63670c32ce875c3d90b5d30390641a68

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{D301BD05-270E-431D-B0CD-2FEE75F9395F}.FSD

        Filesize

        128KB

        MD5

        59313f286471f93a8de883c0281de4d5

        SHA1

        d6ad0719b40389adc9d185875611099685d66b60

        SHA256

        4818b868a7d6f3e94287cf9e244a00389de95cf7cc12c214d1ec67ca931a6d89

        SHA512

        30227ccce21896216b44f668d5971d0704d86d67d8c9b879690149dee11133109c4b135856378f225079dfe25bb3630ffa922a32bf92006d6df573344507dc3d

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF

        Filesize

        114B

        MD5

        09aec19b7223dd49ded97419b582a0f0

        SHA1

        e0e048dd3ed1d4c3654dc1e7225d9d492cf6842d

        SHA256

        bf2c90b50eb8cfab6b4e6cd0b5ce758aa1e48bbf19b6c3bbdadbd24600e1a772

        SHA512

        c301d0df9c7b8a0cdb8460685871c6eee378d4c734b5ffae4f54d09ce4c5e5a7db785d216ea6285ee5908b15442fdc50e73acd79e2d0f2c4f1c4fd46a358a9c9

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

        Filesize

        128KB

        MD5

        1f11545c0dd58e1329fd297ac376b0cb

        SHA1

        52b20cf5b96ff942940faf674239d4600b88a4e8

        SHA256

        4be63bf041241a2fb6e6a35b73cccb92d3b1d7d023109042056d37b0a965bba8

        SHA512

        2df229920d5355875c8dc25a6e089dea0bd09089e0c3228ee8ea8f72eee00796a45ace92697e669b8480a048eda50e14dfa358dd640e419a6caeab97464bb455

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{720BA1AD-B3E8-486D-A3FC-94757CA36E7F}.FSD

        Filesize

        128KB

        MD5

        49e78bcbe1060508898b90bd15c31d9f

        SHA1

        7b365687692926650cbde4f05bab309e7af8776f

        SHA256

        4f8adf90e81ea6cc8be3930d2f243609573cf419688626bf82266e5902961eea

        SHA512

        2fbcfc2c050cc2d835602e61b3b582978a2823bee905538b4b8e4870f8555a72bbd98ba5815b11ee493550118950b2a7344aa815f954635e87393f4e4c2ef6c7

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF

        Filesize

        114B

        MD5

        eef01fd8999cd426553b6c0e2b935cd2

        SHA1

        745ddf612bd4940dcba4caef0cb66b76eb6089cb

        SHA256

        c8caf45747cbbf6edddcd95178449433d7421e76348f1321ff2c942ac39b377b

        SHA512

        4087aa5ce1740c416cca00c7e64fb6206e04990b934ba2b6024c11a810939cdf72ba2d035a66962226acc7ace5103c172a2a58a124074417759e520fd5b00e07

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\MSO1033.acl

        Filesize

        36KB

        MD5

        c9e1adfd598390b2b85cf8782ce92c8d

        SHA1

        3ef269ca19181d7bcd43e6458719586d4be88f07

        SHA256

        750e7ccf1242dc1f9ed84d3e83b43698a677cf1ffad9207fb4b1d5ecb5424368

        SHA512

        634659ebe37c4a9a133e635217d240f7840c1540dbc7fe4df3af1754ff5e29de18f109b6382d2d5cabc0c74acc143508ca1bcdc8a4f6e014e472e31fd343c12b

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • memory/1412-66-0x00000000712ED000-0x00000000712F8000-memory.dmp

        Filesize

        44KB

      • memory/1412-72-0x00000000712ED000-0x00000000712F8000-memory.dmp

        Filesize

        44KB

      • memory/1456-71-0x00000000039C0000-0x00000000039D0000-memory.dmp

        Filesize

        64KB

      • memory/1596-69-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp

        Filesize

        8KB

      • memory/1708-54-0x0000000072881000-0x0000000072884000-memory.dmp

        Filesize

        12KB

      • memory/1708-60-0x000000006B2A1000-0x000000006B2A3000-memory.dmp

        Filesize

        8KB

      • memory/1708-59-0x00000000712ED000-0x00000000712F8000-memory.dmp

        Filesize

        44KB

      • memory/1708-58-0x00000000712ED000-0x00000000712F8000-memory.dmp

        Filesize

        44KB

      • memory/1708-57-0x0000000076681000-0x0000000076683000-memory.dmp

        Filesize

        8KB

      • memory/1708-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1708-55-0x0000000070301000-0x0000000070303000-memory.dmp

        Filesize

        8KB