Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2023, 08:35

General

  • Target

    Rech.doc

  • Size

    544.3MB

  • MD5

    03a4b5b411f8705e8f20b3e994bae110

  • SHA1

    778e6b3a2fc573ce19c7a7224f4bd4b304c55472

  • SHA256

    de8081cfbb09b591530ae0d10a274e5c308e076f79512323b5c2d5dc590c4498

  • SHA512

    1f1c4abfa9ac5e07f392e5c57c282730210fc6adb5f3960e37fc8e2bbaa92d731086dade7d8bf4e33de7c8d4c1800b3a1a1dc4e5a6b461dd581bac0093c15b25

  • SSDEEP

    6144:xPn4VZXbatu7MDogsDkHS50LdfcGcbz1f5M9KTFrMpSlMK3Ru+Q28:xP4PbNMkgg3Ru+x

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Rech.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\093603.tmp"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Users\Admin\AppData\Local\Temp\093603.tmp"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1628
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KJfOIX\SGfvh.dll"
          4⤵
            PID:1392
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1088

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\093603.tmp

        Filesize

        517.7MB

        MD5

        9b1e551cd585f8166cd937f2a0980f81

        SHA1

        15fd840efab66b5b385992882a57aa06eb84cb1d

        SHA256

        cfad0dcd5988f2f30d91b4c51bf68ff571ec988393934ecd7bcb876163f5ea66

        SHA512

        a1f633a81871cd972cb7f3d90cad12a536798e2239e8c5488409c8c2ab503187563e9a7779f48f665487536ba1cfbf0daa6bd52055ac87d7cb52bfd56588f430

      • C:\Users\Admin\AppData\Local\Temp\093607.zip

        Filesize

        853KB

        MD5

        fb9e96b0881ea74a860c2d22e9f80272

        SHA1

        c807383bc031f7e7ef247c3d6bda284a6163ba8d

        SHA256

        61e4713129e7466ba4986cbbc1cfe05464439f5a6c3a67590d3be59cc46b29cc

        SHA512

        ed7045dcc833f8318f4741061f4a7c2570cfe5ad93645670d508b9c428ffb838cb54de979690e2feb15d06ed3166c06730a52edfdf4831309513b6f8295b34d0

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        33bc8409e9d781072fc5eef476d9851c

        SHA1

        630ea6df6680551499c3412f7006966dbec025b3

        SHA256

        f54b47e5923520fec7758c8640385b2f28ce26f71bd229671ecae8d85fef5d3e

        SHA512

        0cc963be5612a91dd694d4c26e3e29e06ba6442ee8b4a0289e3c0f70dbf690dbfb175300c4c5b05e49de5ee299f31a7dac29592724280c42ad1d73845c0aedfb

      • \Users\Admin\AppData\Local\Temp\093603.tmp

        Filesize

        517.7MB

        MD5

        9b1e551cd585f8166cd937f2a0980f81

        SHA1

        15fd840efab66b5b385992882a57aa06eb84cb1d

        SHA256

        cfad0dcd5988f2f30d91b4c51bf68ff571ec988393934ecd7bcb876163f5ea66

        SHA512

        a1f633a81871cd972cb7f3d90cad12a536798e2239e8c5488409c8c2ab503187563e9a7779f48f665487536ba1cfbf0daa6bd52055ac87d7cb52bfd56588f430

      • \Users\Admin\AppData\Local\Temp\093603.tmp

        Filesize

        517.7MB

        MD5

        9b1e551cd585f8166cd937f2a0980f81

        SHA1

        15fd840efab66b5b385992882a57aa06eb84cb1d

        SHA256

        cfad0dcd5988f2f30d91b4c51bf68ff571ec988393934ecd7bcb876163f5ea66

        SHA512

        a1f633a81871cd972cb7f3d90cad12a536798e2239e8c5488409c8c2ab503187563e9a7779f48f665487536ba1cfbf0daa6bd52055ac87d7cb52bfd56588f430

      • memory/1368-80-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-67-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-59-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-60-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-61-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-62-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-63-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-64-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-65-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-84-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-82-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-69-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-70-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-71-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-72-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-73-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-74-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-76-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-77-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-78-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-79-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-57-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-58-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-81-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-66-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-87-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-86-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-88-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-89-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-91-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-90-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-92-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-94-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-96-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-95-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-97-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-93-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-85-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-83-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-75-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-68-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-98-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-99-0x0000000000620000-0x0000000000720000-memory.dmp

        Filesize

        1024KB

      • memory/1368-1077-0x00000000063E0000-0x00000000063E1000-memory.dmp

        Filesize

        4KB

      • memory/1368-1265-0x00000000063E0000-0x00000000063E1000-memory.dmp

        Filesize

        4KB

      • memory/1368-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1392-1272-0x0000000000140000-0x0000000000141000-memory.dmp

        Filesize

        4KB

      • memory/1628-1264-0x0000000000120000-0x0000000000121000-memory.dmp

        Filesize

        4KB