Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 00:28

General

  • Target

    8d0a2a9356a96df4e237bb4f2b3e516603713d623fc198e1a46ea3392fa842cc.exe

  • Size

    96KB

  • MD5

    31fd9f8b733ef7e42bbd4124fc12afeb

  • SHA1

    139b3f36ec31d1d658a1fd30f6dae86039e04144

  • SHA256

    8d0a2a9356a96df4e237bb4f2b3e516603713d623fc198e1a46ea3392fa842cc

  • SHA512

    272a7ad4d700b44f4ad8efe2ba7ed2a65933fd299ae37c96945831e2fec4f7c0c3bffe2d0cce9c647032e8fe482c580e560af937ed1dccb6f3b4ff51ad16efef

  • SSDEEP

    768:TGLqfmaiMLLfxKVHyqqLPQOoIXI0y2CS1OjiR8YwtiCFdRAg5JcJ+WHv1LCbcU19:TqqOMLw9IXFCS1L0TcAgvl0z1VIEf7

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d0a2a9356a96df4e237bb4f2b3e516603713d623fc198e1a46ea3392fa842cc.exe
    "C:\Users\Admin\AppData\Local\Temp\8d0a2a9356a96df4e237bb4f2b3e516603713d623fc198e1a46ea3392fa842cc.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Documents\8d0a2a9356a96df4e237bb4f2b3e516603713d623fc198e1a46ea3392fa842cc.doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2004

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Documents\8d0a2a9356a96df4e237bb4f2b3e516603713d623fc198e1a46ea3392fa842cc.doc

      Filesize

      44KB

      MD5

      04a435ea5652c9d5e7ec2c99355970ae

      SHA1

      b51c9c96ecffa308552593c2cbf8f619644cc21d

      SHA256

      b32ca4fcadfc85fc949a909ec66c450e39424bb4134768051fb21b47bafd616b

      SHA512

      5d640f9201286ae807547fd559d67f50a2b29a5b77afd9d64deecc21c3980e54608bb534f0c317e3c7fd328e8812e8c473b82571280e8984f73e8284bc646a5c

    • memory/1116-58-0x0000000072481000-0x0000000072484000-memory.dmp

      Filesize

      12KB

    • memory/1116-59-0x000000006FF01000-0x000000006FF03000-memory.dmp

      Filesize

      8KB

    • memory/1116-60-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1116-63-0x0000000070EED000-0x0000000070EF8000-memory.dmp

      Filesize

      44KB

    • memory/1116-66-0x0000000070EED000-0x0000000070EF8000-memory.dmp

      Filesize

      44KB

    • memory/1116-67-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1116-68-0x0000000070EED000-0x0000000070EF8000-memory.dmp

      Filesize

      44KB

    • memory/1500-56-0x0000000076201000-0x0000000076203000-memory.dmp

      Filesize

      8KB

    • memory/2004-65-0x000007FEFB991000-0x000007FEFB993000-memory.dmp

      Filesize

      8KB