Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2023, 06:59

General

  • Target

    phish_alert_sp2_2.0.0.0 (5).eml

  • Size

    18KB

  • MD5

    68c3e4c1f029a6c8b4821a485b257b74

  • SHA1

    b381a721457ab002b2b441c2088ec7321d13e36d

  • SHA256

    1f49cbe45a58ec27e848b1918cccb7fa704191cea0bf0419e02d9c7a7f80cf02

  • SHA512

    d2a211f249b5fc2edb25b02732e2276c4d65cf32953bbbe73b846ae6e708cd2704b570c531de0e831b3ccb35c594515c5fa6aac20bc62bd8544d0028d4dead25

  • SSDEEP

    384:Kx9CeF/h8wz42HPm3/ZroFlVvs9Yb7U7Nf0tJN:4/Wwz42HP6ron8Y87503N

Score
10/10

Malware Config

Signatures

  • Brute Ratel C4

    A customized command and control framework for red teaming and adversary simulation.

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\phish_alert_sp2_2.0.0.0 (5).eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    a688143c11f80c739e042b9229145949

    SHA1

    c6cf45d0aaeb5228a41c499e4bca53a2becb83ed

    SHA256

    d090d9175bdb806738cbec88137be14c47b2a8a5ed4f4cd3d2b9a6ecf915c392

    SHA512

    e01217f770efec312ce36093ec8eda5fdbc5e0f4e738a9abf6740b26e855f9f42845f4a323d026795427b562f43caeb63a69d3b3be7782bb33cffbad70cfdfa5

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    235KB

    MD5

    93c5771dcc2dfa1fcafbbfd087c55a78

    SHA1

    93a7e24fee59d36484c694ef8b6b40ed2cd838e3

    SHA256

    db3bd10352555e0d24b1f1af3297419408d09f35864863ccba88f04c457201ef

    SHA512

    d1089f84f65d00d003417378302c4b13876210c71c14480fa08e50de02abee3d534fb2089cc160ce3c9642269115be117380fe7120b0597d4976909a5ed35892

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    18021ebfc4c5b8504918f7e094d1c9b5

    SHA1

    8ca0c3b3f07a4aaa78c23b203a5962663f02dab4

    SHA256

    e63a2c3b852f56d5946a42c6be5ad1d0eb0e99cac3e52cdddefe00437ab2e60e

    SHA512

    a1a6a599d0bd7108ed4832f4aa2a60b493a43e178e67aefb16ad45a3b39dd43ecf068cd9c101038064a31d3c0c6aa1660094fd7e6177b20fde9215e335763e32

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Temp\{07B1D871-ECB9-4EC6-880A-19C9DB3F4F05}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\NormalEmail.dotm

    Filesize

    19KB

    MD5

    2fae09a44b3cc9e25aa710b7eb34a3ad

    SHA1

    45b723a3ee7d8b5dbd1502b6686b55d89135d789

    SHA256

    538c7a97d97ee4873ee11074b2533b428ca9d8bcb16041a1ae4f478e35e4bf96

    SHA512

    2546804359c7ab4b59762a5a7e16de0bf1ecb5557bb3f492033f48234eca213188c8073b0c85a972eb7b01a0006c67c5170bf8694ea9c1091b32e64089114ef8

  • memory/2160-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2160-1-0x000000007338D000-0x0000000073398000-memory.dmp

    Filesize

    44KB

  • memory/2160-162-0x0000000069421000-0x0000000069422000-memory.dmp

    Filesize

    4KB

  • memory/2160-193-0x000000007338D000-0x0000000073398000-memory.dmp

    Filesize

    44KB

  • memory/2160-200-0x000000000DB60000-0x000000000DFB2000-memory.dmp

    Filesize

    4.3MB

  • memory/2160-217-0x000000007338D000-0x0000000073398000-memory.dmp

    Filesize

    44KB