Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    492s
  • max time network
    413s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20/04/2023, 13:10

General

  • Target

    samp.docx

  • Size

    12KB

  • MD5

    8641eb1d181119c7347f7bea26834cee

  • SHA1

    f4c86d6d3c7f92d470380953e1b11152366ce8b1

  • SHA256

    8842fbacaae69c7d97c7570bcfcf1985e5cb1130f23d33932f7179dfb1ff7747

  • SHA512

    11a80bbba484e7c29d9f26603d3461621c7ed17970869387a46a73c2cbf9d983319aea2d70ed6113623748cda7e7cbfd85cc761953accfe709f00be0b18a232c

  • SSDEEP

    384:TDCXYyJqQ5qf5Jv8Lh2E/tOiqo9bay0jI:TtyJqHv8Lh2E/s6bay00

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\samp.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:912
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1916
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x478
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:336
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-1563773381-2037468142-1146002597-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-1563773381-2037468142-1146002597-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
          2⤵
          • Suspicious use of SetWindowsHookEx
          PID:1208
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 512 516 524 65536 520
          2⤵
            PID:1728
          • C:\Windows\system32\SearchProtocolHost.exe
            "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
            2⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of SetWindowsHookEx
            PID:568
          • C:\Windows\system32\SearchFilterHost.exe
            "C:\Windows\system32\SearchFilterHost.exe" 0 512 516 524 65536 520
            2⤵
            • Modifies data under HKEY_USERS
            PID:1680
          • C:\Windows\system32\SearchFilterHost.exe
            "C:\Windows\system32\SearchFilterHost.exe" 0 512 516 524 65536 520
            2⤵
              PID:1428
          • C:\Windows\system32\verclsid.exe
            "C:\Windows\system32\verclsid.exe" /S /C {9E175B8B-F52A-11D8-B9A5-505054503030} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401
            1⤵
              PID:1668

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

              Filesize

              1024KB

              MD5

              db00eba02cdd2eadb056f64e63d3f6e4

              SHA1

              793ff1fb71239093af61d34f5e69ac1550842482

              SHA256

              1def3fabc184cc09761c5987a01358840cf126b30a17d3bacbd5906275c94f44

              SHA512

              b2504024342805748bcbe54b21d664560df24470b121115b6af0770ef44fc14193e4d19f0fe01f23be7451fdca85e61397c9746edcbddf2e7650e62c8f9065a4

            • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN4009.lex

              Filesize

              2B

              MD5

              f3b25701fe362ec84616a93a45ce9998

              SHA1

              d62636d8caec13f04e28442a0a6fa1afeb024bbb

              SHA256

              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

              SHA512

              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

            • memory/1560-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/1680-156-0x000007FEB4180000-0x000007FEB418A000-memory.dmp

              Filesize

              40KB

            • memory/1696-152-0x0000000001000000-0x0000000001008000-memory.dmp

              Filesize

              32KB

            • memory/1696-159-0x00000000036B0000-0x00000000036B8000-memory.dmp

              Filesize

              32KB

            • memory/1696-127-0x00000000010D0000-0x00000000010D1000-memory.dmp

              Filesize

              4KB

            • memory/1696-133-0x0000000001030000-0x0000000001038000-memory.dmp

              Filesize

              32KB

            • memory/1696-135-0x0000000000EE0000-0x0000000000EE1000-memory.dmp

              Filesize

              4KB

            • memory/1696-144-0x0000000001090000-0x0000000001098000-memory.dmp

              Filesize

              32KB

            • memory/1696-82-0x0000000001770000-0x0000000001780000-memory.dmp

              Filesize

              64KB

            • memory/1696-154-0x0000000003480000-0x0000000003481000-memory.dmp

              Filesize

              4KB

            • memory/1696-98-0x0000000001870000-0x0000000001880000-memory.dmp

              Filesize

              64KB

            • memory/1696-121-0x0000000001030000-0x0000000001038000-memory.dmp

              Filesize

              32KB

            • memory/1696-160-0x00000000036A0000-0x00000000036A1000-memory.dmp

              Filesize

              4KB

            • memory/1696-167-0x00000000036A0000-0x00000000036A8000-memory.dmp

              Filesize

              32KB

            • memory/1696-171-0x0000000003960000-0x0000000003961000-memory.dmp

              Filesize

              4KB

            • memory/1696-177-0x0000000003990000-0x0000000003998000-memory.dmp

              Filesize

              32KB

            • memory/1696-178-0x0000000001200000-0x0000000001208000-memory.dmp

              Filesize

              32KB

            • memory/1696-182-0x00000000011F0000-0x00000000011F1000-memory.dmp

              Filesize

              4KB

            • memory/1696-185-0x0000000003C20000-0x0000000003C21000-memory.dmp

              Filesize

              4KB