Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    106s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 11:14 UTC

General

  • Target

    1c3b7d3757119af7b0d44cbafc04fa283b17e4c77f1ac3970bbf9cdc584ec941.xls

  • Size

    98KB

  • MD5

    efd065eeed2afee5ea4a3fab7f609eb9

  • SHA1

    c82de7cd2fed6faa3e60b7da26a151d7b9c6e2e7

  • SHA256

    1c3b7d3757119af7b0d44cbafc04fa283b17e4c77f1ac3970bbf9cdc584ec941

  • SHA512

    2670824868c39b2f1854e8cb33e2ea4d9f5c0caf490482d7acaab3748542508e5d85984b699f84667368e67215c575a1af23808bd3a2de0598dca1fb8196e1d6

  • SSDEEP

    1536:sVVVVZETJnPtDHaWevwP3B+7v8Vcfo7fVz3Z95ODoJEM5ue+tt2jcc0lbxOvTgZ6:bS2jcc0lbxOrEjqaV9o

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Deletes itself 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\1c3b7d3757119af7b0d44cbafc04fa283b17e4c77f1ac3970bbf9cdc584ec941.xls
    1⤵
    • Deletes itself
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Windows\SysWOW64\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:1804
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:1176
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:1808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/864-54-0x000000002F5C1000-0x000000002F5C4000-memory.dmp

    Filesize

    12KB

  • memory/864-55-0x0000000071971000-0x0000000071973000-memory.dmp

    Filesize

    8KB

  • memory/864-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/864-57-0x000000007295D000-0x0000000072968000-memory.dmp

    Filesize

    44KB

  • memory/864-58-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB

  • memory/864-223-0x000000007295D000-0x0000000072968000-memory.dmp

    Filesize

    44KB

  • memory/864-384-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/864-385-0x000000007295D000-0x0000000072968000-memory.dmp

    Filesize

    44KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.