Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 19:17 UTC

General

  • Target

    e6a7b74210342e244a5a0d692e49d205fded4f2d75357785ad971a31767923d0.xls

  • Size

    119KB

  • MD5

    bc975b54fc42712a23b86c4f9cb072a3

  • SHA1

    d19a838a3569ed2831248c2045b6d6f3b340442b

  • SHA256

    e6a7b74210342e244a5a0d692e49d205fded4f2d75357785ad971a31767923d0

  • SHA512

    4729ac1dac2a3547ed664fc5fa27dc3880f20285fcfae8a6fde6594c6302cabc119a869538bc1db904cc11c80085151af742ed6e0640a6d2241a32009bbffc47

  • SSDEEP

    1536:UG666clXwWXbAI7cvwQq/B5ZJChyRfMZ95e+ejRBSWVbrzNKQsz7ITkR62lD5EeU:lx+NWVbrzcz7ITk9fEdJtXwY5kHGNv5

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Deletes itself 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\e6a7b74210342e244a5a0d692e49d205fded4f2d75357785ad971a31767923d0.xls
    1⤵
    • Deletes itself
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:588
      • C:\Windows\SysWOW64\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:1536
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:1812
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1184-76-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-72-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-58-0x00000000767F1000-0x00000000767F3000-memory.dmp

    Filesize

    8KB

  • memory/1184-59-0x000000007298D000-0x0000000072998000-memory.dmp

    Filesize

    44KB

  • memory/1184-60-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-61-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-62-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-63-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-64-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-65-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-66-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-67-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-68-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-69-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-70-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-71-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-74-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-75-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-57-0x000000007298D000-0x0000000072998000-memory.dmp

    Filesize

    44KB

  • memory/1184-54-0x000000002F041000-0x000000002F044000-memory.dmp

    Filesize

    12KB

  • memory/1184-78-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-79-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-80-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-73-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-77-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-87-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-86-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-85-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-84-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-83-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-82-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-81-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-88-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-110-0x0000000000641000-0x000000000064B000-memory.dmp

    Filesize

    40KB

  • memory/1184-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1184-385-0x000000007298D000-0x0000000072998000-memory.dmp

    Filesize

    44KB

  • memory/1184-55-0x00000000719A1000-0x00000000719A3000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.