Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2023, 12:36

General

  • Target

    Specifications/Coverall fabric for sea shore work area.xls

  • Size

    126KB

  • MD5

    7f75a12e8a7e17791cd6f025c252a95e

  • SHA1

    35a884a775451ebb9dbde56b949d62b6a6580da2

  • SHA256

    6b13a6db6b10368dc7056d51fb11ebcd5c9daf3d348e115434dcd7938a42bf26

  • SHA512

    c955bea1d34621bfe539f17a43a1db33142fb869a2f8ce7643eb7e2625ee9c993dc3e4dcad4e5fbae4d9a38c94d7e9f982093abf938864a1f2ddfaa289ea7807

  • SSDEEP

    3072:nIpTVkIpT9uIpTVKCZ+RwPONXoRjDhIcp0fDlaGGx+cL/WEgng2h7:IpTV/pT9xpTVbZ+RwPONXoRjDhIcp0fT

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Specifications\Coverall fabric for sea shore work area.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1152

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{B190D87B-1C00-4030-BAA2-A4F19BA146D2}.FSD

      Filesize

      128KB

      MD5

      518660380a61938ad74dc0f2e44b51de

      SHA1

      a7a2e6e431fb5c9a135818d75485a21823f6adf8

      SHA256

      18872b423a43c5db098bdc8fad02091a075917f65b5fa8cc38033f292e180781

      SHA512

      71a74b1c5897503ff994f13aa94219e0141bf37c4baf41b6dc5728bff9256e83759c0cf58b7606d068cf1fedd68136c11d956a75742cd48af203dd4dc02129af

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      c6db2d43ec068982f023c4b01a151de0

      SHA1

      50d152a7a1c08605d6a75d73e1d6de8bf951fa0b

      SHA256

      8e362d850825597fea54a130d7fce21098ff82dc61e2c347951c0faf7ad05be0

      SHA512

      2a30f3ed50d0740cb198890b7676c2510bcd5327984fe4b0e857bad384af6294e0b2cda0fff2afd530b3fd8d278d8becf53f8a1308e962a09d5caf2c9e559f0c

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{D0324CE1-83D8-4225-9302-A481E9F0C999}.FSD

      Filesize

      128KB

      MD5

      51062080ad36bc43326481a564057584

      SHA1

      8809f3ddc3ade70e59a2b2f022c8cd989653eae2

      SHA256

      bd7a9bb3fad2ac25af397481650963dc0e40cd30f581a1f61b5722986116e9dc

      SHA512

      4fccbc53d065860e8f03607e92071608e871384e93fdb816a4cd1ec03ffdd5c83d8ffbdee214f11f8c9c94560054e17fc4f5a9162a765e9976b791dad1cb5b2f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NO1NR40C\s_dc_donot[1].htm

      Filesize

      253B

      MD5

      2d9f5a97c8f7b19a4d7ae669f21594c4

      SHA1

      1828dafdb80925d2b3923020f4194ccbf4a177de

      SHA256

      1d33b771331da970c4eee40076db878ea6a929f2097f4cf6ab18cb5882bcce16

      SHA512

      3a733e8219159648edf91b3585d328979a7b55883eb412ce5df1d572bc054454b295ebcbdeaec268753a70cd8f65e1bbd68f4832b8aa068dd6c9bc33f146a025

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3E47C74E.emf

      Filesize

      11KB

      MD5

      247df3295cb4fcac02ef2b372e4b93c3

      SHA1

      dc6ad28629daacfa92c269dc8cd5ff8a3bda164f

      SHA256

      0e4ba38f4e41fffff1b9dc4b4a474c8923d568edc4971d3cbe84366f096acdd4

      SHA512

      6f110cef75a886070b2a3841d53b8d9d64f9e429fbaae7a34c751e2d461b6174739045e52bbc2767a1820e1c0500185e433d31c46115691f51bf274998ee0179

    • C:\Users\Admin\AppData\Local\Temp\Cab87AA.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar87FB.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Local\Temp\{6CB21DC0-9093-43CF-8E8F-A2E5BBA1404B}

      Filesize

      128KB

      MD5

      aeaa5b9579376ad74ecbd20ed81d813c

      SHA1

      1378da24a6f5f2684acbf8d9ce5f623187eaaff7

      SHA256

      56b978914c97cc55f8bc5cad5f04513b668fcf29d5ec135f411d56c4182b4896

      SHA512

      0b382ada72bde7cb7be88d54eaae77a6bc1050cae5eb373eb0807b00c3dac55a702ae033f62e5426d7b187965de76a560ab7a4fc5ab2c4924ba817674786a2e3

    • memory/1872-2-0x000000007215D000-0x0000000072168000-memory.dmp

      Filesize

      44KB

    • memory/1872-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1872-1-0x000000007215D000-0x0000000072168000-memory.dmp

      Filesize

      44KB

    • memory/1872-170-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1872-173-0x000000007215D000-0x0000000072168000-memory.dmp

      Filesize

      44KB