Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    82s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    03/11/2023, 01:55

General

  • Target

    Luis Munoz shared Guzman Munoz Engineering Surveying Inc..pdf with you.msg

  • Size

    83KB

  • MD5

    fb1dc7821999376f07e04fe0289c029f

  • SHA1

    9240584f8261ca6c60336062ca5d5fa79ce63e96

  • SHA256

    94cd2efe6222e0be0044f978af08ddb4d804e8724f8c0cf731067747c45b6b68

  • SHA512

    9b5ad9340519d906e66d88129fa7b63eda0f00a6b985815c9b741a02fe4c4e88f72f5c3bfdd0d7959d199b0c6c02dfab5f886fac3cde9f1f39872d1a94ce30c9

  • SSDEEP

    768:IU5j7UftpjEdnl54qIYQVe3H+GSbpQ+6yO8PhErpHgIw59oWsKFWsKHMeaZtpjtY:7V7U1NKzJ/cKa8rY8WNWWNt/Eh+jtDi

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\Luis Munoz shared Guzman Munoz Engineering Surveying Inc..pdf with you.msg"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    235KB

    MD5

    3e746d1c4094339bd06511d8981fada3

    SHA1

    12cb6950bd384ed78a106968212a7a8220b2baa9

    SHA256

    ed6846cf85b9097017625a8ec28272afd98f49529dafa926b6cb99dda97ce391

    SHA512

    a24e972e741731756927b31aca0d90292a5e6680bb10f7cbba26c99f39e3ff7dd026c22b9b534fa7916d5774c128b5db1395597297cda1dcaf0e11fba4624629

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • memory/2212-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2212-1-0x000000007314D000-0x0000000073158000-memory.dmp

    Filesize

    44KB

  • memory/2212-124-0x000000007314D000-0x0000000073158000-memory.dmp

    Filesize

    44KB