Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2023, 07:56 UTC

General

  • Target

    Executive Summary CACFP Feb 2023.docx

  • Size

    1020KB

  • MD5

    09fe82fdd0ca6b228edc25f11fc27922

  • SHA1

    92cfca5499a99e7b7e889faf42f2750e3b042b0b

  • SHA256

    0e065794d724d5f0a88a37fa314013f2dec45b536df27071b31a38550c20f922

  • SHA512

    4566050db63db746c62ea4615eb16684b5de2e20636176767a827a1a46886cf7cb1739283ec6749da86623ca6afa5ae1b5dd044aa7dbd9c0263a46da2cf23d74

  • SSDEEP

    12288:5KAauUMyqoH7E0p1RE70zxntT/ylTyaaSMn2fSJU/5XZTJIqfIbIKhU/2:Dyqy7HyUt7yQaaPXyJTJPfYIqUu

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Executive Summary CACFP Feb 2023.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:268

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      30e6e012d4a6398431aa1ad678c78da0

      SHA1

      1bda62109c68ad108a85c0f6d0a5a82540dfba99

      SHA256

      904d0cfd5ab17e375c7bc29f3e9bf1f48f49e0221b55c7edb871d3f39432bed5

      SHA512

      fdd70687a0e906c66e9aeeb5b92e3615e33d6917c89639a10207b11b4006aeb043290488ca4f9c8f9e21cb232515b0269e367d93a895613d75bab0607f2f8d4d

    • memory/1204-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1204-88-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.