Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 10:05

General

  • Target

    7cd7980a655c82a4bdd51ed4010bf4f3.doc

  • Size

    29KB

  • MD5

    7cd7980a655c82a4bdd51ed4010bf4f3

  • SHA1

    d57e1e8010528fd101c0bee5f445ce538fa5b077

  • SHA256

    515d6d969cb2fed6d0c4cd68fefbfce8aaddaf2ac3c6c900a47f17cd940d0ffe

  • SHA512

    74fa7ad461736f9a57c13ad5152a6abb4990de8f86f3a1f14803c26d2f4971131ef7114275af67c00262cfef2d6eddbbace207b5cdcedc1e36f6c60c5803f8d8

  • SSDEEP

    192:AQw2hwUc6nlzVbMjclYKej8XqbFeOOxdqPtVLFb:Pwv6nlzVbMjcluwXqbFeJ8td

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7cd7980a655c82a4bdd51ed4010bf4f3.doc"
    1⤵
    • Deletes itself
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7cd7980a655c82a4bdd51ed4010bf4f3.doc

      Filesize

      31KB

      MD5

      182fd94176449663d96788956c76997e

      SHA1

      6b0e9391d98b2bb817ff595f5665ab0466148758

      SHA256

      e3db66c096387c79c230be4132c8fa9e7c8220c2046c3f512ef563ed1fb49a53

      SHA512

      76e855d010c698fd20006ec913ba353bb45b18fda726bb1fa81988f901505150dedc3e07da2220aabfaa262536d0b592d7678ac6ecd5441756653851f543847a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      25KB

      MD5

      18a9c614fade71e7ccef6dc5fddf76e2

      SHA1

      a27851f1abb89c75d0af3cce11eaf20b2bd70848

      SHA256

      c8c0582091dcb3671b9b56c10e9729fbbb14d224a95d585ead74833423f3abe7

      SHA512

      416cd6812bf527dee8395cc94fbb114a5ad00508f696848dac352f4ab0dafd602e92893e6755f42186c377468283998bd05a9ffc8484b60b0b7304a001a31961

    • memory/3012-0-0x000000002F6A1000-0x000000002F6A2000-memory.dmp

      Filesize

      4KB

    • memory/3012-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3012-2-0x000000007163D000-0x0000000071648000-memory.dmp

      Filesize

      44KB

    • memory/3012-11-0x000000007163D000-0x0000000071648000-memory.dmp

      Filesize

      44KB

    • memory/3012-13-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/3012-14-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/3012-15-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/3012-42-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB