Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    78s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 15:15

General

  • Target

    phish_alert_sp2_2.0.0.0.eml

  • Size

    1.0MB

  • MD5

    68fb168fc6ceae3f87ca4a50947b01a5

  • SHA1

    2bb19d01d0244f212c569deaeab150ab600d1790

  • SHA256

    2bf062b39c513e3fe5d5abc47956794310cb88381060ec379f6b940cc45e0a3c

  • SHA512

    68a8a733d1a5fee5f655d9c80d8d9d823d16c4c57adbd02a0f95aa8511ec68ff66e5996a721db5ef0a5e88078d431067be8df780161cfa133d49ec1fea5f6fed

  • SSDEEP

    24576:MhO7CgzRuMMbrGVO4dBgIWVEnECUva6wy63DjESzZUA2+uyk3Y5CKQeA92mw7aZ6:MA9z42b

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\phish_alert_sp2_2.0.0.0.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\H9GLD0F6\Propuesta de servicios Leon Antonio.pdf"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1148
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\H9GLD0F6\TARJETAS_LEON_15.pdf"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    76aaa338582850f144998f41f59fbb33

    SHA1

    11c2276c993e0e52b1bce1c79eeebaddbe268b18

    SHA256

    118c1524334d5d05d8c1d4d95f65da4090bece9ec613bc3c0e017141263cc9ac

    SHA512

    bfc5d15e720385340b191cbfc296388f4f3cc2b6fce9bfef6a1c3ee2c5deaef6ccb9b3cc5c21817fbeb5eed320dc1e07921a3c3ee637bc5bb5f1cb4098794d31

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    9eec7b5d6dc68a0f986f3afdcf5328eb

    SHA1

    99ea36902470e755dc559e45314f7ee96bbc1899

    SHA256

    a0e4d6a16bb11401a8c7fafde318d30e6f07137643a15353ef7c480961692a55

    SHA512

    1a57b6ada490ac1eb2ae92de1ab5fed09caf540516669e11b97bc425e6b869fa635bdd187bdeed113719788a2e747a11139ad0370cb01b4aab858ca74ae7a310

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\H9GLD0F6\Propuesta de servicios Leon Antonio.pdf

    Filesize

    246KB

    MD5

    525439c9c945da36b8f1d32dbf1be752

    SHA1

    74b2de07e9424e83769266002cdb1c7787f77153

    SHA256

    bc012f3d13615adb387e8a99f0942cf85318c87227e15df529098661731f3326

    SHA512

    8792732e86a75ae22bbccbfe210f2be63f1cbf46071ec6750e4fbd70321c68cd2b0e408898840b81128251c58a8891cbd66a21c3d40428cdad7e9ba3855da7d3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\H9GLD0F6\TARJETAS_LEON_15.pdf

    Filesize

    513KB

    MD5

    4bacccccbaefc4d42dc909729299fcab

    SHA1

    6f1c0969d4e06eade585b860669951218eb87536

    SHA256

    cf3352d292cb8fd1fa8bcf1d47516c9895fdfe7a29dca5349a08511599bfc5c7

    SHA512

    6c939304deb7e96401b4ba982ada81b46a7dc3fbce696a9ce87f18f7ab884d7a8bf489c2cd8cf95ac28a00bf313ded06925f434a58339a8b350f569974e3103c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\H9GLD0F6\TARJETAS_LEON_15.pdf:Zone.Identifier

    Filesize

    26B

    MD5

    fbccf14d504b7b2dbcb5a5bda75bd93b

    SHA1

    d59fc84cdd5217c6cf74785703655f78da6b582b

    SHA256

    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

    SHA512

    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

  • C:\Users\Admin\AppData\Local\Temp\{F8303E48-0C37-4001-BE28-B7CDDF778C45}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\AdobeSysFnt09.lst

    Filesize

    135KB

    MD5

    a3e82779d757fb4faf9cc73237c18b8a

    SHA1

    ea034b8be607b5244f71e3611aea533aba490177

    SHA256

    d4c9d7a37ef7b1dfa3411ff02127df69b6aab8f3e08abd8dacdaae5fb9fe0d9a

    SHA512

    b256f6f0e2566d86188ee56c9cf0e5ad28231a92cbea8368a178347ac75fa653f964340db541bddd7c7de7f66b918f2c51a4e8243b504b475c9ac09dd760c44f

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e3c1ed5e6dc40c581549c848df5692f0

    SHA1

    ff09b6fcc779f7e73c5f50f78f82bf1e00ad550c

    SHA256

    1be4c3fb8315440ea52224a9106c493c16c12964142b8643ef567008de0d5a66

    SHA512

    39dc053f2c90d6f6c57dd119fe9a37baccc290f21c2ba5db1473e3b0a9146d2d76d6fac4ffe3e1f8fa9f1151a08a48c2f28256c4d3434eaea92bc41a3604ed90

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    6dbe8a8c78dc498ea334c49ebf25eb58

    SHA1

    df60758fae05cd7855a75f82fc85308f4d12a691

    SHA256

    76e99b55a54833163040f2a0ce136f1e108fe27d9ccbf116144dbfe7ef53ee52

    SHA512

    c94fc137174b6950ca03eb8d371cae9d2327f24471a61dddde84ad9a343ec3180dd21c11a6bdd89c881b68520055d08766f19fbbbbfa896f2c9af7c5ccaa79bc

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    c440b9da2f93cd26db5a4580a2236de0

    SHA1

    3a9ccd1d27017cb2f9ce580220bac8813f828cd4

    SHA256

    bcdfa279d2c0c068b965ee5b18bd66bae4d8eec10bb118cca1325cf54aff51a1

    SHA512

    f0ee17b3c32fe028cedace87fd5cf28b3a1de7fdc92694fe4fb2c6a712db45c80192756d3f6a686950d4922988ff4604b7eac2070c00e3c8cd93a9a128ac91f8

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\UserCache.bin

    Filesize

    70KB

    MD5

    afd83545385a7baffe095f9007770002

    SHA1

    68f2ac12371b078614ec49dcbd67509500112267

    SHA256

    5e314bd4581ffb2ba3c9883a585a0c6a112f02c0fc6433613a065f7d465ce0a5

    SHA512

    756d5a4560c1baa5833d30dc02739b4b5184c6a1317b91c314240ba703f715936ffd2c34e84f0be6848d720cce5adc69ea712b2176ac01ecdc1b32e578475f14

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/1704-210-0x000000007363D000-0x0000000073648000-memory.dmp

    Filesize

    44KB

  • memory/1704-1-0x000000007363D000-0x0000000073648000-memory.dmp

    Filesize

    44KB

  • memory/1704-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1704-164-0x0000000068AE1000-0x0000000068AE2000-memory.dmp

    Filesize

    4KB