Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 13:54

General

  • Target

    UploadFiles/indentAttFile/2011010414440714.doc

  • Size

    47KB

  • MD5

    c18f100be94aa07d359b8d39e15163a8

  • SHA1

    9593c43d2d3903e7ddd0732f0d190b9ec42064e4

  • SHA256

    f44b4c493043b543ec9e78d042cba5a11668f9ed2846f4de7b605aa2aadaf919

  • SHA512

    66b0fd10f479aa68586261843f990b54f4273f33c6dea6a47650cdbd26541985730ef45fec1c19d647077607ff3a8448de2967a3a0b7616dde3db1aa9f5fd803

  • SSDEEP

    384:BttmmmTDmnLJmFXmmmmmc4c8sAlQUEnmGN9Ig+EBv2VAlSbSVcJ2uZYLGVJCnadk:BvmmmTDmnLJmFXmmmmmcIRRU2ul+JCa

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\UploadFiles\indentAttFile\2011010414440714.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      4f9465c95c21d9adbd9162e58961ccf2

      SHA1

      296249274bf89d08206190d5ce0502e191503707

      SHA256

      62f7c45c4951914a8f158353ca930a78d3a9a6b2c71f5ffc64f7e39f7e4b79d5

      SHA512

      50ccc2d25a2077385182de90582a33353d40712efcc609cff76d3f2c5fb82265f50291b00c6452d8505aeb7870ff74ff7e87efdef3d3621c250195647fc6a6c6

    • memory/2956-0-0x000000002F921000-0x000000002F922000-memory.dmp

      Filesize

      4KB

    • memory/2956-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2956-2-0x0000000070DDD000-0x0000000070DE8000-memory.dmp

      Filesize

      44KB

    • memory/2956-11-0x0000000070DDD000-0x0000000070DE8000-memory.dmp

      Filesize

      44KB

    • memory/2956-26-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB