Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    280s
  • max time network
    234s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    17/11/2023, 17:33

General

  • Target

    a1s-root1=email_banfield_2023_11_17_16_SMTP-att-1-4SX34B2dWkz1jvXZ-2023-11-17T16_57_46.eml

  • Size

    398KB

  • MD5

    81b78ca5ee2fbc6131cbc689c065c6cd

  • SHA1

    039dcf6873996c9cef175a2387a719a2e7e84d83

  • SHA256

    0a94a5c1b5b2be98e3da8858675b93e919d1afd00750c3f20bb085ebeeff0e7d

  • SHA512

    412f5be9b707c8d3eb698334f1dc6d442cf2d92330517dae19333d8cfc6b161219b77e21d1832f6aa4809091ca1699738a0fd47fde54951c2971f94fb34cd719

  • SSDEEP

    6144:KU8Y+LIukuZtCtLj8AQXqaPSAfphA5hATfedvqskVLEk:KU89fZslj/QaaPSAoiHVLp

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\a1s-root1=email_banfield_2023_11_17_16_SMTP-att-1-4SX34B2dWkz1jvXZ-2023-11-17T16_57_46.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://nam02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fstrava.app.link%2F30191S3p%3F%25243p%3De_et%26%2524original_url%3Dhttps%253A%252F%252Fbaidu.com%2Flink%3Furl%3DUbcHBOKK7Y4gqxVzNd-QKUOphfIsBqn4bVRPqa0MNPU-0eELDTX3X3PjZBdc7Pt5%26wd%23.Y2hpaGlyby5nYXJkaW5lckBiYW5maWVsZC5uZXQ%3D&data=05%7C01%7CChihiro.Gardiner%40banfield.com%7C376c7f607d4e4692079808dbe7676a44%7C679f63d1e1854a47a081c530ccf734f8%7C0%7C0%7C638358204247923567%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=g1wxJ1PeH158XcN1ZCaDm3v4j%2F6kX4O4%2FBb8CXVgS40%3D&reserved=0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1556 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    7917c479392fdab27ba4cf94b1fa3a12

    SHA1

    7f354e53506c5fb0f76ff96393a2c3b631cde538

    SHA256

    1441d92dfd7d04be2abb268d589249321cf41987eb8f52df0c32e0342176a1fb

    SHA512

    8151803c70cb9ccd64d793fa85c21a2059d82f43ebeebfe3a042d37ee437bda6a2e79cf14d1afb8ed173ec3564e2891f36e25053fe74b3d099d9275059ff73ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e2f2582a0f66e8be1d9f4f4007252b5

    SHA1

    a90536a5a310bfa4562c1f8822f0a398ca254db1

    SHA256

    87dcb27a615d58d889c7a3d6d10efa102c1bc4e53f157ab15fd8082fd49c70f6

    SHA512

    89ec236cb8cc5ec304182c049cc33d15181aa28e71584100385fc36ac37c60577442e17420e0a50a6fd5073be19b3f3f301c5f72ca151739893884574d455514

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc0df0745afced814c614fdc92df97ab

    SHA1

    f5c80979feb51daf61248d3811667366826a43e9

    SHA256

    327f53adbc1dae5124fb8c222755ab6ec8ca6bae9f20c30a101408e6330af400

    SHA512

    7019c7ba76a21ad8014dc0b8f81cda6bb5fa71e93d4ba29dea00ddf7a31061a208ed3771b82e0a1b716afd63d8bc7390697314363107573c3b4fdd35b84c2638

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9adefc41aee431ca2aeb65f8721db808

    SHA1

    7d915981ff0c431003b92d4d43e4ef6a280a0f2f

    SHA256

    f4169ee60677784918c3d46203418e463e97b6441e69961df43b677901e4bbd1

    SHA512

    7c7bbc56933ee22571a4323b88ff75f0dfd4b842b87377613c0b56f7075966f50df34d6555173d8e1e5ea71259d96b8cb8dbca1cf94572c6a5e67552b504e13c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39d2057057a36eb129ea4e79fb4ed8a0

    SHA1

    c137b67e055697913749f7d37a68a18f76d70eea

    SHA256

    faa720bdef3f4b5943600c162d1f9780ef2aa9a7bf842b0b01d5d76e28e516f9

    SHA512

    a37d3e825848b4167188e7f6cf3f0e84c60d9b3373522cc1b7e4d7923c6d7d9f7ee6a0cb2667e5ac3c3bc3b06df7148d7facad4f8e4bea0632423d2fcc7585d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    29e7803b9dda374f23d1807028bc9a5a

    SHA1

    791116fb515a0f0e6d871a19d7b39099dd9672c7

    SHA256

    99e5d5ef279d4251f7fc494cdca505cfbf1142b4c8a7036623e7caba22a36d63

    SHA512

    b27d52dc21adcd0dbf4a39131ae82af628e4b284a9f357db3453314ee7a5c25fa42eecd23f4b0e9240e1bb5431550e95c6506f4de23ccac17026d5ebb549973e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1f8443e3e1cd388bb93387c7a72f71f

    SHA1

    7317dd641a3eec01db53721ed6524be0516aa41c

    SHA256

    031f2f9d095fcdafb4ede1bccdf97fea64e5fcb0d7f52b3c53eaa7e074cb1294

    SHA512

    58476c916ea482d3fee5860418cdcdff66b3c8a54ca374faa0e53f9d4b49117a43d4c0a4fbffeebb9f73bb072fefb2ef674a51fde7eb765178199f032ea1881c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2e50478ef16272708bc6bbeaf00e567b

    SHA1

    157ba35aa5d17d093154a33bcf8964e3714e1ffc

    SHA256

    e84e579b657c5c583ea204c6df31c95189ff68bfd2c34032e7962576bd5c7190

    SHA512

    bb7baae1ca508585f319112b64a9a1a507f81f6a28b4b3932747fb31c74fcb9c00c4621fc8e4392ca7edd1d1da39e29a779c60db95864252ef57f1ceb37c6c8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ea03603e26e5fb24bc1c64ee88c62d66

    SHA1

    c404a0ab73c6b90668518c488a3192dba0f22473

    SHA256

    c20b22b5e23501ac3b3ef6850a9c28c8911195a988d6efde555bed38d069b927

    SHA512

    7544695269b8ffe99c6e52bea2449068f245c3305e3c2262a05abbca9e34021a0fca09f3dd6afac985b072e43681ba6c5993f224dd83bfcc57125e680ced1938

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b52115e8d34ae29230cf7796f214f88c

    SHA1

    6b9af531260886f3897415929911259bd52495a4

    SHA256

    1e7f04a932ff1469422037afc2b9d3e2be154beea2c06602f4cc2194f8275154

    SHA512

    5be6ed9e589065c37dddeda29ad7042a8447d5c90dc9586f97e1e2e210e53566b27500d6138dd645a1020a2504ac36c7e2212827117ec86271182c8302ea8d59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    165bf9496a2324373aa513a9e6e581f5

    SHA1

    aa0c90e2fc1526ed281bf2382c067a7b3978ac27

    SHA256

    45f1cf097b5a8b03694930cecf127ceb1514459c640ee9773ffe88faa2789985

    SHA512

    a16a5053cbbcee4c927a0b730477c6a482eebc57224c6d9c6b3e17d4fb939707f1c940dc096b23631acb3e9d583bbe0826280045d13c08417a9d6557f8c23295

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59d30a05474adeaf9eb74676ecd1af6d

    SHA1

    f220d5673240acb82bc43c93dd51ba090a8332b1

    SHA256

    f341e5c2ea52e779f93c2ce3a37d419df068c251a6ed8840904ee8dbcff65296

    SHA512

    1e3a85d1cfe6e5997e1d80f0b48f7af38a2eb2190f2670a52aa530126d8390af1398bb772b8993e771b38b111b4bd40ef6dd5d582b520387a938bb73bc1aac74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fafd438d1343c65800de3accd83a875d

    SHA1

    d897a21d321a0b5d452f69425cdf5df6491bbc94

    SHA256

    7aa3a10e31bccc38922a9ac5c5fd5324196b2307915f14124a99d2226c6d3680

    SHA512

    4da446ca9f34268e1283cdf4522851f4582cd6bdfb144b8db79621fc52d8e0048f7312e017b169e325ba144ced4b89dcf5d9c0901b772912fb4ba51029e3b6b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d77715635c5e5630c972e0e58ef7a650

    SHA1

    e6be20de524463f25ac4b0c599396a77c08d16d5

    SHA256

    4ea9bf319eabeabc51e45fa7561d662fbd6037bd1095e141c44b9942da1aff29

    SHA512

    ee02b703bf314a70c33a60a28f0c95da7ae4678656f54455870cd0e6318838c1e23b25480ed4a2577f5221c55cf970aeb5ad6154d210043099e7f051dfc1fb6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    703ae4bbe44864ff09c5d09264058a9f

    SHA1

    f0cd00a01375679b6fc49e73b0329e03fbeb8a6d

    SHA256

    98c4fb261f69ccb2c6f744262385dcea2ba9067165620d3b90e925264f57348b

    SHA512

    ae89f1138f8ae03e49236e9d9ab1fd3694df235a1e8d80c4ffd6735b3e9e445a5f77dd18b544b61445765beb0debdb0ffa1c532bb6a43dce3881c61efa30b9a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63a59e8f54266c4e940c72a95bbfe8a2

    SHA1

    988f4e36c04863d37cdde5e9bd5795eee0b320c3

    SHA256

    b5e7ca57078c779d61e3ccb171f98ce1f7e6c07be1f076a06b140f2a48fea93c

    SHA512

    1f0f1d4b54f2defd9b350d5b9d070f7dadd75a280177683e5cf1e9d20eac4ce9eb551d3f0f7b93a0ec77eebc18c10c380dfc425018d9d35ac7476a759fc74f71

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Temp\Cab7B98.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar7BAA.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\{283E8205-44CE-4AA7-B21B-0BCCA0B08665}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/2508-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2508-1-0x00000000737FD000-0x0000000073808000-memory.dmp

    Filesize

    44KB

  • memory/2508-124-0x00000000737FD000-0x0000000073808000-memory.dmp

    Filesize

    44KB

  • memory/2508-166-0x00000000695E1000-0x00000000695E2000-memory.dmp

    Filesize

    4KB

  • memory/2508-199-0x00000000695E1000-0x00000000695E2000-memory.dmp

    Filesize

    4KB