Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
RE_ _EXTERNAL_ My Voter Page app for iphones.msg
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RE_ _EXTERNAL_ My Voter Page app for iphones.msg
Resource
win10v2004-20231215-en
General
-
Target
RE_ _EXTERNAL_ My Voter Page app for iphones.msg
-
Size
103KB
-
MD5
177267e4c85c1e6a0f4585c87861c67a
-
SHA1
7ff2919e24e6d565b18fcf71a747afebb41fc086
-
SHA256
0c0d115053f3341fb7bd9a4b4ec94851d78650c75f267f52c1679705af1706d1
-
SHA512
1c7a30b17df0f96425b45f89e52c993c879ecf01e6475422993a2151cea3def55ed161521f9e6b4b05509da7a3514b2da6964476ace92dd0bd3cd2995da06616
-
SSDEEP
1536:+iTIxR6TQpWcWtWtjWNfMPVWXWOcxlp3/lQPqx3C23:+iTILyMclt
Malware Config
Signatures
-
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2732 OUTLOOK.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\RE_ _EXTERNAL_ My Voter Page app for iphones.msg"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD53cabb7f9e31b4dbb1e9c60b646641cc9
SHA17126925ffe3ffa75f4cd1a4be1a43f132db99f93
SHA2565902ca33625c12220680847112322907fae0f72b72c36f12cca68a98e5f61039
SHA5120e2106d4d05531edfb4d114ec72e78f236ea3f1411bd6bd3e2d4f096e9974912a19e4fb9a901afcb40b76fa14d4539b2be58032653e704a1e455e411c631d94a
-
Filesize
240KB
MD559176076166e888b1d4255b4064d1db7
SHA136a0833301c2eb214020e25aa9d89ba951241396
SHA256b53f844b55528fa51c3d355d76974ef59b0e8fa82b549a77bd4632324fb7eb12
SHA512c4196b3c47c9e41bc3726859ed3b4c52d100b3487b4666457506885b4ab12b70fb7cc58ea0d2f3c11fed2a5019fd6bba50f9a8b74067f3ace4fe58477b5e63f9
-
Filesize
240KB
MD5491dba48af69153e54439a20dae559c1
SHA14c8fa5521213e7b2513a7504a43794b33d9023bc
SHA256b5e1875fe2c28dc8e62f386cdc7c0fa0d4927bb9f4d6a9dec6d3abb8576d47f0
SHA51207c9089769a5761153e72fc635197c3c0ed37287a1448b84ba28f6f81e689c187840c27e40ba48ef4bb406875406698c236d1d9a3efd5b998c3fdc22dba4d88e
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31