Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 19:02

General

  • Target

    7b0674dbd3c991f34940e8da20edcda9.xlsm

  • Size

    438KB

  • MD5

    7b0674dbd3c991f34940e8da20edcda9

  • SHA1

    d21523e58a4be815063b95ac424b5d4c2be719c3

  • SHA256

    8d18d6cd77cde07f6bde057ace8a45430c545826e0d7eb849f201233681fa0c1

  • SHA512

    70cf1cc574f43fbdbf4927f5f6d5e86a257dfd147f813fc91aae99bf6b28c8f381933d81a6a047fd72fea3941167e0af41bd9ddc56c4dc9e44db0263f1a5804c

  • SSDEEP

    6144:FRS6aTbjQEmf0MJoXvIu0VoUodnnJzcC2UZiu9g9akwJt+o2tGYNt3VjnlvGvn:FR4fQr0MqXvSVoUMnJo7JegsyoyZ9tG/

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\7b0674dbd3c991f34940e8da20edcda9.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\ProgramData\getFillWithAll1980.sct
      2⤵
      • Process spawned unexpected child process
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\ProgramData\qColumn.dll,D2D1CreateFactory
        3⤵
          PID:2884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\getFillWithAll1980.sct

      Filesize

      11KB

      MD5

      9f801631f9cbff6b61ba2a6def881840

      SHA1

      91dbb009427ee8d4e7864903f750e3e2f1332e58

      SHA256

      7e387bbc6a479b3cd32de2be7ce38a6ee34751cc477a796510886708cdd4f870

      SHA512

      ec1f7adb9ab9e28f658a19d386022ca6505b95a6e53d4635a74415317a97401b59eadeee3ebd5955ec0d5cc7ed24fecacd1741f1b9c7eab148224c5777356ce2

    • memory/2500-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2500-1-0x00000000725BD000-0x00000000725C8000-memory.dmp

      Filesize

      44KB

    • memory/2500-4-0x0000000005BF0000-0x0000000005CF0000-memory.dmp

      Filesize

      1024KB

    • memory/2500-7-0x00000000725BD000-0x00000000725C8000-memory.dmp

      Filesize

      44KB

    • memory/2500-8-0x0000000005BF0000-0x0000000005CF0000-memory.dmp

      Filesize

      1024KB

    • memory/2500-11-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2500-12-0x00000000725BD000-0x00000000725C8000-memory.dmp

      Filesize

      44KB