Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
29s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
Lucy Greene shared _Private and Confidential from Momentum Broker Solutions Ltd_ with you..eml
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Lucy Greene shared _Private and Confidential from Momentum Broker Solutions Ltd_ with you..eml
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
email-html-2.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
email-plain-1.txt
Resource
win10v2004-20231222-en
General
-
Target
Lucy Greene shared _Private and Confidential from Momentum Broker Solutions Ltd_ with you..eml
-
Size
10KB
-
MD5
4417bf7edc1191fff7eb289f36bd0bd1
-
SHA1
02a6d95c875d543ed1d45aa6856eeee86301234d
-
SHA256
a3c9f359bdb1782fa2f9458883bd2863a00a1e738cfa64f59b94f28554f19d27
-
SHA512
794bb00480e66da483edf8df666dc4927638f395dc1915c725159167cc50a6df6ceca4639b6ef220a66aa26d848f878121f168ba9c27f576891d53e2310c7d5a
-
SSDEEP
192:7cAYLYEw76O+PCumebO2egWSkID2OxKaEmxiYL:7jYLYdGO+PxbOY/8A8YL
Malware Config
Signatures
-
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1820 OUTLOOK.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 852 chrome.exe 852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1820 OUTLOOK.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 852 wrote to memory of 1956 852 chrome.exe 29 PID 852 wrote to memory of 1956 852 chrome.exe 29 PID 852 wrote to memory of 1956 852 chrome.exe 29 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 1516 852 chrome.exe 31 PID 852 wrote to memory of 824 852 chrome.exe 32 PID 852 wrote to memory of 824 852 chrome.exe 32 PID 852 wrote to memory of 824 852 chrome.exe 32 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33 PID 852 wrote to memory of 2240 852 chrome.exe 33
Processes
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXEC:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\Lucy Greene shared _Private and Confidential from Momentum Broker Solutions Ltd_ with you..eml"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1820
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5e19758,0x7fef5e19768,0x7fef5e197782⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1192,i,10928574108395514722,8680480445890732393,131072 /prefetch:22⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1192,i,10928574108395514722,8680480445890732393,131072 /prefetch:82⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1540 --field-trial-handle=1192,i,10928574108395514722,8680480445890732393,131072 /prefetch:82⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2004 --field-trial-handle=1192,i,10928574108395514722,8680480445890732393,131072 /prefetch:12⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2308 --field-trial-handle=1192,i,10928574108395514722,8680480445890732393,131072 /prefetch:12⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1460 --field-trial-handle=1192,i,10928574108395514722,8680480445890732393,131072 /prefetch:22⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1392 --field-trial-handle=1192,i,10928574108395514722,8680480445890732393,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3460 --field-trial-handle=1192,i,10928574108395514722,8680480445890732393,131072 /prefetch:82⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3556 --field-trial-handle=1192,i,10928574108395514722,8680480445890732393,131072 /prefetch:82⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3872 --field-trial-handle=1192,i,10928574108395514722,8680480445890732393,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5e1780b60dfb5adb9afe83784229ed39f
SHA15945752454482f1d190f073f2e698bd078afc08f
SHA256d05efd887af9611263a2e822b85d9a45cd4c73c7da31e0a69bcf3b55a88dd455
SHA512b08e8e7ebf07e1c8cc24dfd093a318b1acb8646051a2a93999508e3acd8e32186e932c99498c4ab079f5fdaa6f232acdbb984b6a27d954112f3d625755d21918
-
Filesize
4KB
MD51d2b28834c2a6a124aceeb7b89648c13
SHA1566b3a43722bba1777b10d6d1a1a339f4079c088
SHA2563ad92c772dfb126ada69d2fa414987c4948382e4ad7f3a269f94e46cc2ceb353
SHA512cbd013cc217ab7970b6f614ed169b3b71b258c87bfd5e001692dad93edce1ed3277cb8718138d25ee557b61acd9b3dfc5678682624fdb3897116eadeacd6f434
-
Filesize
4KB
MD5e7e2bf54b1bf214ee8894ad3a78018c7
SHA197c978dff245031fad1171bef01118538caf4bc8
SHA2560eaf6dca34f1102ebf8d29df534ef8bf8828d57eefcf242ea247ffc9e8513e29
SHA512f8fd07ff9efa6f829636539421bbb040381a5cacd72a21facef34b9944f693bfb638e93e5b33dab3b2805f661f66b8f9fda355d0c04af83ff53de5d4cc1e063d
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
235KB
MD5014e3a8eacbcaab28cd7a6eba8ec6e6a
SHA163faae413f3cf9fef9be18366cf94c596d769218
SHA25660fe0eaffeb06ab78a27194a7e31d30a7bbb50415b43735f8aa7acc5eb9e0d18
SHA5127dce8a2753d039677248f5ec6a1618e9345db63bd333e7a9abea60c5b2522fae905cd035f44c93dc4cbbc31c946a0a7e02d335052edf2091918b579345a12234
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31