Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 07:05

General

  • Target

    2caf623a3473d8bc40514bb9608df936.exe

  • Size

    306KB

  • MD5

    2caf623a3473d8bc40514bb9608df936

  • SHA1

    1a8f69b217f5a64b96e3f64db1d133407b4dd39f

  • SHA256

    ffac3ab646de0d62b7e769c4b5f2eae38c673f2c028895a7da744ddda0611078

  • SHA512

    c0882b18b65f7b069cbce58ffa4f97af56fd885c3b8b910f6459243273fba9923573a878edc6e4b40fb0a10d9c391617517df3040ca5a5df781b71c86bf50889

  • SSDEEP

    6144:8vRMaZOTDio+vL/h2jzlMlI39izNPQt8IRVCACcab5O0+L81mxOH5S:+MIOTMTh2NMlI39ixPQ/RVNab5O0pmxr

Score
8/10

Malware Config

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe
    "C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121016_tmp\2caf623a3473d8bc40514bb9608df936.exe
      "C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121016_tmp\2caf623a3473d8bc40514bb9608df936.exe" cmd/CallFromZipBase /C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe /65536 /108928 /220645 /313675 /C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121016_tmp\ /0 /8992 /0 /
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2632
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2600

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121016_tmp\XLtoEXEtmp\5 Star Personal Budget Workbook.xlsm

      Filesize

      107KB

      MD5

      e9d8de5a0c20ca5390a3837c579211e1

      SHA1

      7cbc609b5c458dabd61e2ad250b2c5a119a00f99

      SHA256

      7365ce8c5b62bdd158cca7a0a8bf84e36a55d01af26483422f55f48ccd45a52f

      SHA512

      8453c86bb48271796253ce9f2997ad040b10dfbcb10ab1856a4d0d22b6edb9cee5602ba41c534488350437f555cd47d1e728980aa57a091239b29ad1c83bac39

    • C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121016_tmp\zlib123.DLL

      Filesize

      64KB

      MD5

      bdba82ee05db0ef9079cadeeb875e35d

      SHA1

      7237bf1e26f889e5bdce51db8fecd662cd5ce6c4

      SHA256

      b52517c42bb3d16d895615837a056b9d2fee387e287bb82cb4fc351539873e46

      SHA512

      77990d01e616f202596c5c898fda2de845c86fbc80a78d7ea8d5b37f236b5cd8b4805a0ca2ba5ceb135fa0b4b1dc513dc9604d57b6e1a95aa923b0c986218992

    • \Users\Admin\AppData\Local\Temp\XLtoEXE240102121016_tmp\2caf623a3473d8bc40514bb9608df936.exe

      Filesize

      312KB

      MD5

      0503017284ff2b935a4ee3d7ba8d53eb

      SHA1

      260f5195077dee4fd243d6e08b8b42c9fa4ffe31

      SHA256

      df6f06bbdc39a94d9cfdbbb12d4638c1a9d2d1d51d724039dfdcb2299b8c1000

      SHA512

      a0ad76a6a517f3dbbe72f715a3f4b831536348785cb4b33644f2daf1088b26612971764f5da01f47cd714f032d991bc33e2e36239225349f1a5dbb14333da948

    • \Users\Admin\AppData\Local\Temp\XLtoEXE240102121016_tmp\zlib123.dll

      Filesize

      42KB

      MD5

      386d220e100885bf26f38a572394539f

      SHA1

      f9ed81b7b112373c4b24a10f0cfcaf0ed8b7305d

      SHA256

      97d5b11e9ced48b5fe9cb0e0920cc0ae5ca2314c623e347dfd85c6d568c00f03

      SHA512

      2b53d6fdd28361cc8281d2c390f434daf0489de3de1f7c35e985a9799e1ef9af9c86d037717597492f75b05cf0ca1eb8bb217363cf71f4edd6ca4f36df6f0288

    • \Users\Admin\AppData\Local\Temp\XLtoEXE240102121016_tmp\zlib123.dll

      Filesize

      72KB

      MD5

      4efaa53c545f4ffb1ee0ed1709c15ea7

      SHA1

      076b2d31e24fe8cfb56f9c292fd6ca1402be79b2

      SHA256

      21582b3a68e8753322a1b1c7e550ae7fd305de4935de68fbde9f87570f484d00

      SHA512

      7fa8c0954729ea14fdceb788393c3de6e139fc4c480b84183863f62afacec2d6bbc0993b601a4a74c87bc89338b627dc37a18be309d090bae880ea10ab9d7314

    • memory/2632-31-0x0000000000320000-0x0000000000322000-memory.dmp

      Filesize

      8KB

    • memory/2804-29-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2804-30-0x00000000723AD000-0x00000000723B8000-memory.dmp

      Filesize

      44KB

    • memory/2804-32-0x0000000002FC0000-0x0000000002FC2000-memory.dmp

      Filesize

      8KB

    • memory/2804-41-0x00000000723AD000-0x00000000723B8000-memory.dmp

      Filesize

      44KB