Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

20/07/2023, 12:00

230720-n6c8psgh7z 6

20/04/2023, 11:47

230420-nyb1nsbf5y 1

22/03/2023, 11:13

230322-nbvjhaad5s 10

22/03/2023, 11:03

230322-m552nagd53 4

22/03/2023, 10:57

230322-m18xraac81 10

22/03/2023, 10:56

230322-m132haac8z 1

22/03/2023, 10:41

230322-mre83sac4v 10

21/03/2023, 21:11

230321-z11ycsfb4x 10

Analysis

  • max time kernel
    140s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2023, 12:00

General

  • Target

    e173ecebfd5b01766dd8184250d5f2d442507b9b097e4ced319c246b78550d85.one

  • Size

    280KB

  • MD5

    b1a10568aa1e4a47ad2aa35788edc0af

  • SHA1

    dd6ba6ae1680e4245f5ecc22ee12a18b9e16db2d

  • SHA256

    e173ecebfd5b01766dd8184250d5f2d442507b9b097e4ced319c246b78550d85

  • SHA512

    9dfd246820c9d705bd54f3118d581063ceadfdae04d0cd047dc66e19d6a5c29fee0195e7a5671854d5c9886a37a83f85d7e5aacd5d8c8df1cfa13384e3fa717e

  • SSDEEP

    3072:e57pvc2vetOepE76wtghUVkJlD1HUjCuitewu4UhKg+jbJDDO7UckjjwQV:u1veXwtVElijRLwuzKg+jb1UkUa

Score
6/10

Malware Config

Signatures

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE" "C:\Users\Admin\AppData\Local\Temp\e173ecebfd5b01766dd8184250d5f2d442507b9b097e4ced319c246b78550d85.one"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 3488
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:4988
      • C:\Windows\system32\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 3488
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:3944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1432-151-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-153-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-136-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp

    Filesize

    64KB

  • memory/1432-138-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp

    Filesize

    64KB

  • memory/1432-137-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-139-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-141-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp

    Filesize

    64KB

  • memory/1432-140-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp

    Filesize

    64KB

  • memory/1432-142-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-143-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-152-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-145-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-146-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-147-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-148-0x00007FF8A25D0000-0x00007FF8A25E0000-memory.dmp

    Filesize

    64KB

  • memory/1432-149-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-135-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-134-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp

    Filesize

    64KB

  • memory/1432-144-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-150-0x00007FF8A25D0000-0x00007FF8A25E0000-memory.dmp

    Filesize

    64KB

  • memory/1432-154-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-156-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-155-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-157-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/1432-174-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4988-164-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4988-166-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4988-167-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4988-161-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4988-175-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp

    Filesize

    64KB

  • memory/4988-176-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp

    Filesize

    64KB

  • memory/4988-177-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp

    Filesize

    64KB

  • memory/4988-178-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp

    Filesize

    64KB

  • memory/4988-179-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp

    Filesize

    2.0MB