Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    84s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2023, 14:42

General

  • Target

    phish_alert_sp2_2.0.0.0.eml

  • Size

    62KB

  • MD5

    ca12b4ee5a88cf0574ab77f390ed3ebc

  • SHA1

    7c29a2a0e3b405b0c56b0d5e4c28be3de60cdfc6

  • SHA256

    540b5d25bb26647eafab138b037f2c0e6d31f013b599001083e83debef2f7948

  • SHA512

    8922955edeac2ef879af732a5d96cab41190a219e168700b642508ee7beeb93a6da54eaba27438335b5d037fc13e1bc7b2612b689ff9fc010cd9d3dc3d09d9d0

  • SSDEEP

    768:oiMgvF30bTibmzWhFTreKY4W/hFVvk6fJSc/pUd:LqbTibmzWhFoh/hFVvk6fJSGqd

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\phish_alert_sp2_2.0.0.0.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2F58.email.stripe.com%2FCL0%2Fhttps%3A%252F%252Fapp.link.com%2F1%2F0100018aaf4c2fd3-ed6e3dc2-6f3b-446e-9df0-a72ca3da6cbf-000000%2FyAk0Fz7E_oQzzCw70bpJU9ZaGiAX9fAw14SugFMnRvw%3D319&data=05%7C01%7Ccamiruiz%40apap.com.do%7C92785a5823be4688c3ed08dbb95588a7%7C6dde70a330814931ad2e41fc22f4c202%7C0%7C1%7C638307549357056603%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000%7C%7C%7C&sdata=vNOr1R3Gd6B5mvTElk0jHVO4jEkjrAtGH5b8fd3NHi4%3D&reserved=0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:296
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:296 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    5afa9cfd787fc4d02c90d1a07c2ef859

    SHA1

    c9627186d587f5689f3f78c42ef03d6650cca9d6

    SHA256

    28642b052438f9429a83b83aa943832d32de83d0993330cf70be15b0a6f1deca

    SHA512

    ee3d19f6096857d2dfded4fdb132b134731cdeb32a0cdb6455f7954d9d24598c227dd37cd37d4165e51af6a4195c8882781257c0bc9afe5e8e8ccffd0f713937

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1c2135402cdf01383c32a567ed4a10b5

    SHA1

    33c65923f4385a2c146b21eae67a8734526fd5da

    SHA256

    24975b5e14673fb8960b63971535da9a8ccfad6990ce423ab3ffb7c00b26c6b0

    SHA512

    4c9ce3845b541e9ab1630924caddad848102fa006b71cdd71f4afb5fe115f6d00efc143a9084d571edd84fa60867b842fb281489a55e01e11ee0f7931d116ead

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    61728c067558a49c0f74312604f888ee

    SHA1

    bd535e47c7b1f2ad3a7626200fdad56d91fbe960

    SHA256

    37cb49cc7cba2596251a26947aec2a05a2e6f4d17a1edc0eea1b8495ff1f6cc4

    SHA512

    ef4134854dec1c3f199fd3e1083d3826af76c2ddd264ab16d75428421c4d29325bc0ed666efba410148a6de040a5c0bd50b1b8ef56449c37f8c2b175c15b4e51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef4f269c9574e935d44e61c7f2278ae6

    SHA1

    11b8cd46c8672d6958af609a4c3a16074f226e08

    SHA256

    c592870ba3f5eaf13c5642658cdfc30cd6acbff5cf255428a833c814a07dc5bd

    SHA512

    14323aeaf50e42c287e38345f8273b690a2f3432b96a65d522024acab1f4854a80a90da4d9722c69f02cd2c4c070fba497536a1a5785c46a270fd4650433a672

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f64d4a5636321e053dd3e6913a9dfb25

    SHA1

    156563294d2b6520d0b5844b45f4797b6162269e

    SHA256

    d92475fa5ce24d3b46f896e60135b03d2c1da288c90eb7f859af1baeb0875732

    SHA512

    77a17bae3fd67e706c7d3c4cc3d351d90947716d4eeeb65172a5164429c2ef0e2bb966b725ae07cbf0b29cf9e1886b4dec26e7c9d46961ed720b807095e8a078

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    36e84ffaa1d3fc493ce4d9f39def8675

    SHA1

    b0e78c38d9aff6239aae0ab2cc875369ffcad16d

    SHA256

    c1c33a8bc991d95e3ce5675876d7b994af963e7ca7b410cf78886a33d6afef34

    SHA512

    8f40e3dfdd1b7bbd8e06299763b7af4f88aa8e27f664a49ac397498e9e2effe5a5dfb3cd66c35aa9a7bef05e96041a1f8b2b7465d44650be6cc780db6a6f5e62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    166c56ac0654eddc750441eb42bbe535

    SHA1

    35244b2693f2aba2d10fb3bdd2a65041b3619089

    SHA256

    302aa9afc13a408dcd7001251ac52eb2737a8e005f3f3f7abc0941aa3ba75b4a

    SHA512

    2461895bac8851345ff97177e2f17feed75b853a4429a0a54f5741c38980896b1adafa067671ec45d188f209446ecb062e4572897096c6910d5effe6aa5cceb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01903e161b361bccde8fde98ec2bc14e

    SHA1

    c91a3241b1dbbc2ce4246d387d7a3676f0d243b4

    SHA256

    bc5ed33966e07d3442aebebe37d8a1b34d36ad76be9e3f8b5a475715f861086d

    SHA512

    9dfe12b40a7516ec29a37beea4c5289a373657b767260d335c769a6348296e2e74adfbbbaf1453ee41a1d65d33a02612827e5bd9405f8ced2a013499402e4f15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc2a64b9e652c7a153b3784422066c8c

    SHA1

    2d957dfe44c86ee91509d64ae8b69cd2915726b6

    SHA256

    ecdb0503006bedce61ed571b831b382483409eed39a64f65626811fd682d554b

    SHA512

    86222fa822b67f0352b0dce26d81a1411e908b835fd39c9b29ac8c9e33c23ecee95f271a97a3af452a2ff4e0d8ac6b086facc6f573d56fe91453afbe95f5329e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc2a64b9e652c7a153b3784422066c8c

    SHA1

    2d957dfe44c86ee91509d64ae8b69cd2915726b6

    SHA256

    ecdb0503006bedce61ed571b831b382483409eed39a64f65626811fd682d554b

    SHA512

    86222fa822b67f0352b0dce26d81a1411e908b835fd39c9b29ac8c9e33c23ecee95f271a97a3af452a2ff4e0d8ac6b086facc6f573d56fe91453afbe95f5329e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8bf1fdd118bb1e09025bb98f44dff0d3

    SHA1

    5f1a935c3bf1e75231400702375cb4c8d8ac69bc

    SHA256

    fe85f682378b0983ba0640b1cecf8ab12d5124e3198e78ca53d42a507c01398e

    SHA512

    6e0b62dc32e2d3321cf6999ac1cf35c0b7d577a5e3682a76be4f0b5e8acc3dbc8fed3cac87d281c7079cd8dc3ad01465f11fc3cda95d7c7025c96c3811748ed1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f45da40cd795bfbc29fb161a33837371

    SHA1

    1429f722f5898b22cc8a4f1afd6522ff00f1cda0

    SHA256

    1e2da23e4b224bf1f59b45ee9181c2c6ce212d923f2973c6499db21f0c925979

    SHA512

    5f6a2c9d3f27eba888bf9197ebfed2496bae6ae38942024448a8ca8dafd30dd22a8592140b9f75447ca47fa60eb2a29204df78a453ab5f3f75abd0597a6f18fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    60e1588281080c8a2e153da38af7e5de

    SHA1

    7dcfdf851cae6eb88459c54b3712f458ccf42ae5

    SHA256

    3e93de5ec2cdc6782645a3a6dade230cfb3715efe3c4c4c5308c5b561cff428d

    SHA512

    f08e37f845f6eca57d4dbdba05c62b1a3bbe664d3690c2022adc3234f4353e6a0330f2a15b1a30811d2d60fa342d2b592f71f5125f0a0ebd5ed91bb7ce96b12a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    12818af1525e7e940cb3b19eef5b59e3

    SHA1

    383bb8311cad09c658f8f16e6f1537a5557cfb1c

    SHA256

    773d4b0472d3c9b63b467069e899c5fd95934b2c2acbba3bc3acc87519726716

    SHA512

    56e9bcfb58d8e325119b427c5d30903b1e5ec48cb58bb2fcc59a345f2f107db71f57df7e1e005da821110d40673f671a99eafdd5c55d74f2832318704f4e37df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5dc4c90ebee76f2c806029882fdb5fd

    SHA1

    fa44c199862c8b048d3538bcc20e5898734e4dd6

    SHA256

    2aba72808a63fba3449a01ff6d7df011fa43dbaad3dc5e6cd2f97762fd136a3b

    SHA512

    5a601369edabded2d0182075dfad81a3b0a38025c6fa67f20b30ac705b66f6e12ce605e31e8d7bdff3379376b1ab27f0342a99ad283f04cce711c16813ddcf9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aeefd0a554bf21384cb36ee0c9bba914

    SHA1

    a8a3638f7458c3101dc630408da63795af61888f

    SHA256

    54afb0b3f1ae7b20b1487a64b32615c88805c4c0e4807235bff129645175a706

    SHA512

    c169dd30bf66cf0a8eb44d78babecf3657749d8381621f7249c7b878177a0260bc0a1382f262064054b8741fa75f2c21505d554b808785f309f5783d0012fd27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24eb4b99b10ea66cfaea997b7bc35e7e

    SHA1

    aaffbb9358584c2f4f55c860af476abb23b1774f

    SHA256

    0c92878456becca5c3b1ac595ef859e3e67b974d307789cc3af2a44acefca621

    SHA512

    876ef3d03baddbaecb9dc134d9236464b00b7a7f1e8398fa6635b47c1bd69b0268a78a751bd8a190b20acfaa2be23a5b7d0818476475bad2c5769f2088f3e99b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    41c0ff5bcb3a1271fce26e8fa9508407

    SHA1

    60863ff2a3a10f7ea4c33fb9f3396c33a811b86d

    SHA256

    d5770bef96ae275858eda8bcae5a7f064203ae24f39fef740a47bcc95af7f857

    SHA512

    375c32687a2396f95b05ae244518558fb8b83622ff8ec91f650ced73bcb6e5bf5d7cccf475e31aff60bab7af281dac22a5507dc9471944aa148eb9917c6e931e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c7379445f2a6bf56f65f828f6fb8f4b4

    SHA1

    591b187e09ca4666e16a6789ad268ada95e171d7

    SHA256

    85e5b3fa3ca1bff5441265675d93263dda1fe89e18c67b50ae41ac0f2f8a0494

    SHA512

    b79801db25adee57493667d0d1e4612293efa4aec0bae02207d7bd88b88e6db0160adbcbe67531009862007b16de21de32630f16fa8bdb3c726bf6e1aeee9494

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    06c6343eb60970735b80c56a44757352

    SHA1

    d8723b0e49ce261eb1c3e5d882eeccd121fc14ee

    SHA256

    c245644c3e11273e39aea1ead629c66da104fa22f9a87af12d6d65af0db3c9d5

    SHA512

    b700bb2404f57ffa023df6ddc8e7bc23dc08f38c9e37401e27acba9ba192cbd2f9af1a5cc0772e95a9cf28b3fb4e95fdb0adc7439c7c06b072976bc6bcd6f775

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\2OXVSL99\m.stripe[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bucspth\imagestore.dat

    Filesize

    632B

    MD5

    8455194dca22cda1c672a405dd9648a4

    SHA1

    952b2bb86d39506f0fbd5c4be98620d3a6f60067

    SHA256

    41e8ba2f65485ba59058ecca0058ebc6c64fed127e2bdb9e814eda109ee277e9

    SHA512

    55084d10d9d15cd908f442bc2c4d155be9ff7001dfab5bb97e5191496d8fab68bdbaf39ff004b5b8f8f2178f0c29d71c9f2fae0cec152dc95b32e6387998a1fc

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\27V93E5X\favicon.0f084789[1].png

    Filesize

    450B

    MD5

    aabe01d0332977b8be26edebffdd6dfc

    SHA1

    999437b32b87e1e3b8978649516aa54beeea3243

    SHA256

    19ecfc1f59578aba4a11dabfae13c4c036de2725d669c758173bf156ac6723e5

    SHA512

    5e5817a134b53eee5856eaf890380fc3aa20c39e1c694f4bd03ffe17c96963bf04dbda8a2babda878ca269ef55543b6ca5772542636012680bd71d4dc04da2e0

  • C:\Users\Admin\AppData\Local\Temp\Cab86E.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar86F.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\{4CAD5A12-C272-4D6B-957A-E355726AC963}.html

    Filesize

    6KB

    MD5

    5b5206600e560d2be6d1f050626d0fd5

    SHA1

    e0e8502e560ee54e68a2c5e993b519af96497626

    SHA256

    9198aa01be860b8ed33cf4439f9167557e26dc95fbb9d7f9a171a49698e1d2e1

    SHA512

    7d1e18e827b978e824546d5bb0202247eb42c9766b71fbeb51ac54186e0109ae451c5ca95290ce056ae2e82766b2c5e71794d86190a51738aad343340ee22b23

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/1964-1-0x00000000731BD000-0x00000000731C8000-memory.dmp

    Filesize

    44KB

  • memory/1964-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1964-124-0x00000000731BD000-0x00000000731C8000-memory.dmp

    Filesize

    44KB

  • memory/1964-163-0x0000000069011000-0x0000000069012000-memory.dmp

    Filesize

    4KB