Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 02:41

General

  • Target

    0c0006630c11468f060e5f33c396282e.doc

  • Size

    35KB

  • MD5

    0c0006630c11468f060e5f33c396282e

  • SHA1

    bf6f16e2f93946add7ad9ade73207da7b26aeca7

  • SHA256

    1f57f7f5aa340c65781dfad949e77fd345e0bd5a32d634c66df12f48aa0b2f26

  • SHA512

    69ab71636c3a5b82c7bb60c9d0df78c02f9cb5b8789db5d0ec45a32032b86eaacdac2685a67ec80479fae87015e310f8e4f09849570905e2457950754123a092

  • SSDEEP

    384:q1111ewH1l1Mgf2HfpnCfagKD9BtlJlz0lIMjNto+:c1l1MxpOar9Bt6o

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0c0006630c11468f060e5f33c396282e.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1428

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Tmp.bas

      Filesize

      1KB

      MD5

      4cd89998f59bf77f60f9cdeceec8e1b6

      SHA1

      cef1399342f63431467d1dee66871ceb422db788

      SHA256

      961d51c2c36728539a6ee21bd6c173c775f99581b4fb28d358c3631e70c86149

      SHA512

      51fbaf59fa14ae8c6597d63d917266b79cf5c51590bdd7fc58f3daf9926314b2389b54ebb3566481d91dfa37e24205a97efbcfc5ad88d07942901683abeb443a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F1AB9C22.wmf

      Filesize

      880B

      MD5

      0522d8dcdc9860ea7f4b9966c5d466b9

      SHA1

      7dd16a4d0159a3c2bc81fdb7893a0ebdf925bdc1

      SHA256

      80742dade91f8c7521277ea827aa93e8a13d100997a24f9afb4e3568224cb8d0

      SHA512

      0ab2c5abbf5823d36d452440d1f0d8dd1e0f297855dbb8536de9eccad29e62c2585f81fd2f3f6e804221421f011482b10f402645ae0784dd550269452c5c6c08

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      25KB

      MD5

      665da89979435c8b9d63a86f302ad069

      SHA1

      f1768707842cf965ee76893ac9515a178c8e9073

      SHA256

      93c79171e5907710281d4102c0e366ed4fea9faecb69344774d2e23c86fcd9d8

      SHA512

      cf4c265a8879bed4fb3e799309ca48c4e56b81e3d06a2bd226ee4a3fc963b1c4471cee7bf37a16cbd767f0462f74291ac2667840f7084cac4dfd46adbdd202c2

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      26KB

      MD5

      f4724e4ceeeb3397d2f7551095b15de8

      SHA1

      2d7226ccd4ee7be908ad3b4d74791eee7a43151d

      SHA256

      25db95c50600608d53ed4aa1c6cc2ac104734258b828a101c865a03ef37c3db2

      SHA512

      2a79ed9b048c2f2c0644a285b20d2494898f5fac6ec0cdcaf73ba8a7b9241fb86e5f464a2aeb9c0b4ee991898f097335aa62c21965493463313ae3c74f61b815

    • memory/1756-33-0x0000000006240000-0x0000000006340000-memory.dmp

      Filesize

      1024KB

    • memory/1756-14-0x0000000006240000-0x0000000006340000-memory.dmp

      Filesize

      1024KB

    • memory/1756-0-0x000000002F8F1000-0x000000002F8F2000-memory.dmp

      Filesize

      4KB

    • memory/1756-11-0x0000000006240000-0x0000000006340000-memory.dmp

      Filesize

      1024KB

    • memory/1756-48-0x0000000070EFD000-0x0000000070F08000-memory.dmp

      Filesize

      44KB

    • memory/1756-49-0x0000000006240000-0x0000000006340000-memory.dmp

      Filesize

      1024KB

    • memory/1756-2-0x0000000070EFD000-0x0000000070F08000-memory.dmp

      Filesize

      44KB

    • memory/1756-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1756-88-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB