Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2023, 16:06

General

  • Target

    07586499.xls

  • Size

    1.7MB

  • MD5

    f939f0754dbf01ab04a9ad14e219a9b2

  • SHA1

    e3812c98288b7d8fa029aad9ba44df7872a2ca9b

  • SHA256

    c8638e2a29455a9f17ae246aca7156fe7346e95a9abe66fd8832ab3ff6a58746

  • SHA512

    d745b03012a5bd3e49819ff8edd49d8eb073f49a1072568892d23c1f307a2f35f5304c36b54dfdfc1bf05bf24c5a145824de35e2db4ca6046a8024fde4a5319e

  • SSDEEP

    49152:kuQ9zPjPyGiTupw1A+cJbm5Qs633AO05:kN52BTYZ+qbm5QBw

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1280
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\07586499.xls
      2⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\SysWOW64\svchost.exe"
        3⤵
        • Process spawned unexpected child process
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:816
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          4⤵
            PID:1440
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Users\Public\cleanmgr_rse.exe
        "C:\Users\Public\cleanmgr_rse.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:552
        • C:\Users\Public\cleanmgr_rse.exe
          "C:\Users\Public\cleanmgr_rse.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1328

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\m06xzr.zip

      Filesize

      486KB

      MD5

      1e73cacce02ae20026a81f1e56416aa3

      SHA1

      f491a7301ce11cf11a92c0245c7e03d927422286

      SHA256

      0dd0dd38cde5a14e7d6d0830db62cc7037e521fd042b0b8da0763128b2c0b3f2

      SHA512

      afe77facd8b16cc744ac2277414ffaf83436999d15eb8ac707f8098e2f8ed4cb29b430392ebe46b7fa65b20730615bc33dee9416f7141da5032a630894980a0a

    • C:\Users\Admin\AppData\Local\Temp\nsy5718.tmp\whuge.dll

      Filesize

      44KB

      MD5

      ae322cc2e6d5ef8496cb9057dee16ad1

      SHA1

      29081880652818f488394bcd3b0c3030db695e67

      SHA256

      2327a2e070e40aa90e3534d9acbcebfc5af17a26eeb05a4d80faec633a3dff43

      SHA512

      ac18e87a630659d9d98e6ed03ba377e9cf74be17908a4ef9332ba20b58fbbd10fbc662871773569da56843f18c88e278d31f819d7e062a16c8fb8f994b200707

    • C:\Users\Public\cleanmgr_rse.exe

      Filesize

      267KB

      MD5

      d08a460cac4ff3eea6484336953a0d08

      SHA1

      662dd7717e21aebe261d44b57842aea44c2c8939

      SHA256

      eef51981f7cdb215ed2578d443d27eddbed6dcaa37c568200edfc545b43ec69d

      SHA512

      c88ec4c8b5efe86fc14af8ea266986780a4a48030715ced616a1cd857667be7b0b05d4ae414495190ae3065a302b49a603d028257f923579017ab05a48a5d175

    • C:\Users\Public\cleanmgr_rse.exe

      Filesize

      267KB

      MD5

      d08a460cac4ff3eea6484336953a0d08

      SHA1

      662dd7717e21aebe261d44b57842aea44c2c8939

      SHA256

      eef51981f7cdb215ed2578d443d27eddbed6dcaa37c568200edfc545b43ec69d

      SHA512

      c88ec4c8b5efe86fc14af8ea266986780a4a48030715ced616a1cd857667be7b0b05d4ae414495190ae3065a302b49a603d028257f923579017ab05a48a5d175

    • C:\Users\Public\cleanmgr_rse.exe

      Filesize

      267KB

      MD5

      d08a460cac4ff3eea6484336953a0d08

      SHA1

      662dd7717e21aebe261d44b57842aea44c2c8939

      SHA256

      eef51981f7cdb215ed2578d443d27eddbed6dcaa37c568200edfc545b43ec69d

      SHA512

      c88ec4c8b5efe86fc14af8ea266986780a4a48030715ced616a1cd857667be7b0b05d4ae414495190ae3065a302b49a603d028257f923579017ab05a48a5d175

    • C:\Users\Public\cleanmgr_rse.exe

      Filesize

      267KB

      MD5

      d08a460cac4ff3eea6484336953a0d08

      SHA1

      662dd7717e21aebe261d44b57842aea44c2c8939

      SHA256

      eef51981f7cdb215ed2578d443d27eddbed6dcaa37c568200edfc545b43ec69d

      SHA512

      c88ec4c8b5efe86fc14af8ea266986780a4a48030715ced616a1cd857667be7b0b05d4ae414495190ae3065a302b49a603d028257f923579017ab05a48a5d175

    • \Users\Admin\AppData\Local\Temp\nsy5718.tmp\whuge.dll

      Filesize

      44KB

      MD5

      ae322cc2e6d5ef8496cb9057dee16ad1

      SHA1

      29081880652818f488394bcd3b0c3030db695e67

      SHA256

      2327a2e070e40aa90e3534d9acbcebfc5af17a26eeb05a4d80faec633a3dff43

      SHA512

      ac18e87a630659d9d98e6ed03ba377e9cf74be17908a4ef9332ba20b58fbbd10fbc662871773569da56843f18c88e278d31f819d7e062a16c8fb8f994b200707

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      927KB

      MD5

      7fd80b1cc72dc580c02ca4cfbfb2592d

      SHA1

      18da905af878b27151b359cf1a7d0a650764e8a1

      SHA256

      1e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190

      SHA512

      13f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3

    • \Users\Public\cleanmgr_rse.exe

      Filesize

      267KB

      MD5

      d08a460cac4ff3eea6484336953a0d08

      SHA1

      662dd7717e21aebe261d44b57842aea44c2c8939

      SHA256

      eef51981f7cdb215ed2578d443d27eddbed6dcaa37c568200edfc545b43ec69d

      SHA512

      c88ec4c8b5efe86fc14af8ea266986780a4a48030715ced616a1cd857667be7b0b05d4ae414495190ae3065a302b49a603d028257f923579017ab05a48a5d175

    • memory/552-78-0x0000000002B60000-0x0000000002B62000-memory.dmp

      Filesize

      8KB

    • memory/816-92-0x00000000003D0000-0x000000000045F000-memory.dmp

      Filesize

      572KB

    • memory/816-90-0x0000000000880000-0x0000000000B83000-memory.dmp

      Filesize

      3.0MB

    • memory/816-140-0x0000000061E00000-0x0000000061ED2000-memory.dmp

      Filesize

      840KB

    • memory/816-87-0x00000000006D0000-0x00000000006D8000-memory.dmp

      Filesize

      32KB

    • memory/816-88-0x00000000006D0000-0x00000000006D8000-memory.dmp

      Filesize

      32KB

    • memory/816-89-0x00000000000D0000-0x00000000000FD000-memory.dmp

      Filesize

      180KB

    • memory/1280-91-0x0000000000010000-0x0000000000020000-memory.dmp

      Filesize

      64KB

    • memory/1280-96-0x00000000065D0000-0x0000000006675000-memory.dmp

      Filesize

      660KB

    • memory/1280-138-0x00000000065D0000-0x0000000006675000-memory.dmp

      Filesize

      660KB

    • memory/1328-83-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1328-79-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1328-82-0x0000000000900000-0x0000000000C03000-memory.dmp

      Filesize

      3.0MB

    • memory/2016-84-0x00000000076F0000-0x00000000077D2000-memory.dmp

      Filesize

      904KB

    • memory/2016-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2016-94-0x00000000076F0000-0x00000000077D2000-memory.dmp

      Filesize

      904KB

    • memory/2016-153-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB