Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2023, 06:28

General

  • Target

    2246XSupplierXPurchaseXOrder.xls

  • Size

    825KB

  • MD5

    4057fa394d721ff19f725206f27b1b20

  • SHA1

    8efbbd62cb6470d3a036d96f6e4c1dde00111b55

  • SHA256

    dc045f955788a869d725560948fd929d179efe571bcaf0afa43dfb50565270e8

  • SHA512

    7baafde95513cac87ede9d97e774c3d123b2032a89c6931cc6e83eb3192464be1b99254fdfab782b6a567da7c7dcb07426e2692215ad7cc361a8429f279df56a

  • SSDEEP

    24576:HWQmmav30x5Zyiw6VW6NWh8KaZEHiYOzdRRfV:2QmmQ30du6VjetaCCYa5f

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2246XSupplierXPurchaseXOrder.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7adb32daf15fd2ef7c11807b3c99e22e

    SHA1

    1f253567e1fe3373be63ffd24ea85b64400bfa72

    SHA256

    870f2190160c0938dd079fb9728b048c403e07a4d7628eb1d325a7577d8ec08a

    SHA512

    5a4252c4f6c569f6b708c2df254921772e963658b06fc7b66703dcb33049ca1306f2639f7a27d18c5349c289496990619662c1c9b048601afa92aa324da91ad4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    40fd6ba16cca54cfd3bf7be69b5d62d2

    SHA1

    4a18fabdbc9507f0bb167cdb67980f2f629bac0c

    SHA256

    9fa7a6ffce1e8bd9a7f181269672da4fb3aaa25f94c6ea470c338f872402b715

    SHA512

    17c9acb7b40ee476723388de59821a36e7448300611763417c2c8a8e54b704c4bd254f0b1ed87c028506fe95d7cfd405bf87f69331c881aa5d57a5b597b5e268

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c9a8eaba4ef7d802d9c4360990c560c

    SHA1

    6f0ef2d9a1f467450adbb71e8d278b3cc661ee42

    SHA256

    b9cd11680d46820451f8c912ea8c7357513c20be41c199dab1a79ffbf9c4d7bc

    SHA512

    dfc15831eda62c96b8a6a47191aaf97b9d9c13d664abfdc9157d182300634acc4270e5de315955477415853e6675b6237f5a153b4b732554180f4c961de1a877

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\H4LALFX5\mub[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\H4LALFX5\mub[1].xml

    Filesize

    5KB

    MD5

    0aa9918e3405fc6921283182701cd821

    SHA1

    3a0f4549ac643888fd3763d3fc9f4d19b727fbea

    SHA256

    a80fb5297539cad6c4c8e68562358f40ab5ee25e117e2bee2c408a3787700c5f

    SHA512

    afe3b3a31fe8ce29be54e091f596a36a84de676b6508963d45f3694ee9ef01033ede07730818442b949a185c163155a7a7e3812068274bd127cbed22f7eba9e6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NO1NR40C\f[1].txt

    Filesize

    176KB

    MD5

    2fbf143f3e42ffdc4a6c1915aee8e7e1

    SHA1

    9e009d3ac1400f44a965ff36c162b764470208ca

    SHA256

    a8611f17f8e3b76a0fe3d1ae7ee43b70acf17287386daea9fea0f95e51d1c7e1

    SHA512

    b55540c82320577dbf99dc14368d38d6479639e234178c15766977d64e39d32e607edbe8b322a1e68b4a9dbeb78126fd5febc7e9c677cc740f434863cb2b6c4e

  • C:\Users\Admin\AppData\Local\Temp\Cab3D03.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar3DF0.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/3044-244-0x0000000009B00000-0x0000000009B20000-memory.dmp

    Filesize

    128KB

  • memory/3044-246-0x0000000009B00000-0x0000000009B20000-memory.dmp

    Filesize

    128KB

  • memory/3044-247-0x0000000009B00000-0x0000000009B20000-memory.dmp

    Filesize

    128KB

  • memory/3044-249-0x0000000009B00000-0x0000000009B20000-memory.dmp

    Filesize

    128KB

  • memory/3044-251-0x0000000009B00000-0x0000000009B20000-memory.dmp

    Filesize

    128KB

  • memory/3044-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/3044-245-0x0000000071DCD000-0x0000000071DD8000-memory.dmp

    Filesize

    44KB

  • memory/3044-605-0x0000000009B00000-0x0000000009B20000-memory.dmp

    Filesize

    128KB

  • memory/3044-1-0x0000000071DCD000-0x0000000071DD8000-memory.dmp

    Filesize

    44KB