Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    02/02/2023, 16:34

General

  • Target

    MICROSOFT OFFICE 2021 JULIANTECNOLOGICO/MICROSOFT OFFICE 2021 PRO PLUS/files/Configure.xml

  • Size

    754B

  • MD5

    e9c9ccf06891cb0d0a448f41cbbca9fa

  • SHA1

    f75a984a62ec2014e979a90eee2c543898d5414c

  • SHA256

    22a160770a166a7fca16c12e560f5dd8226bc2a0dd49b0c5137b4911ab5ff8f5

  • SHA512

    628d1850b1eacd84461862b87f3a16e35e6ef6582fe7084266eb537bb335ce262ce6a3a067ee7de8c17ce668181594e024f5eae3384acd03d568ab3c1c5d60de

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\MICROSOFT OFFICE 2021 JULIANTECNOLOGICO\MICROSOFT OFFICE 2021 PRO PLUS\files\Configure.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\MICROSOFT OFFICE 2021 JULIANTECNOLOGICO\MICROSOFT OFFICE 2021 PRO PLUS\files\Configure.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:688
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:688 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    8795643bd9448f355f1e817b1beb8f13

    SHA1

    fc5afcd5dc1c57ec501109cb987bec2e7b628514

    SHA256

    c9a53a6962ee0ada77bad358699a886e9d54243a3ae24cc182acfeaef4dba134

    SHA512

    4a8bc9001359c55a68bb329ef000ea7506c003ef6a98d57d769ca020758bcde63d52b03add74e39294b7b0c52abb9a07ff6ec3bd1e66f9eca0e0675b2b9cd2f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    0bf647a8aa574790a2f6594a87916958

    SHA1

    c90109c617c869151d285f523378af2a57ab686f

    SHA256

    ea769125e1804c02fa4ac5cdb190eef68a687a1e6077ae244ee25dae906cdb17

    SHA512

    60e27d3b45aed3d2fc80a18666fa52d25a66f3cbd3c87dc167c9742559da5c9f6e23f1328de22f30ac15719a501cbf4b71eb5736f84c7a7eed75e309fdbc98d8

  • memory/892-132-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp

    Filesize

    64KB

  • memory/892-133-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp

    Filesize

    64KB

  • memory/892-134-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp

    Filesize

    64KB

  • memory/892-135-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp

    Filesize

    64KB

  • memory/892-136-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp

    Filesize

    64KB

  • memory/892-137-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp

    Filesize

    64KB

  • memory/892-138-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp

    Filesize

    64KB

  • memory/892-139-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp

    Filesize

    64KB

  • memory/892-140-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp

    Filesize

    64KB