Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 18:40 UTC

General

  • Target

    $PLUGINSDIR/frg_license.rtf

  • Size

    57KB

  • MD5

    7be0f88cc380caaf3efc805e14eb3c9b

  • SHA1

    28cfb260e938a81bd4eada0099e397ec83f2e619

  • SHA256

    5101a990a7d78e415958a8e803fae4b4a1de3601d9fb37dbb55f85e0644a85a3

  • SHA512

    a307c461dbb171f88972e2220a07f307a1f006f00a0369a935fb33c9af4d4cef62cc2e05ec9a9d84376778556ed201d10884319fbf9b35581bce71cbbf771c4c

  • SSDEEP

    768:GH6OyQAoYRJQQA5Vq7MYQQA5VqKMPQQA5Vq7MPQQA5VqUMPQQA5VqT81O3idRfOE:SpsxIUhd

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\frg_license.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      fcdaea378b436aca70f3f7e7eab1f26c

      SHA1

      95e8afb9063dc75f59b2821c9d6a06dca06f2cf7

      SHA256

      7c559835a9eb5fac83aafb061a762210cef1024f13c46b464764c0c8d6b42e08

      SHA512

      a16f04d0a7b2da8fd1340e34dc652d3ad5f8c7aa93a3a987833b2c576d4b0fd23a4fcd6620c5d1ecdd88873b56b947b71bb9f930bd5b8e8583697daa235cc028

    • memory/2804-0-0x000000002FDA1000-0x000000002FDA2000-memory.dmp

      Filesize

      4KB

    • memory/2804-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2804-2-0x0000000070E5D000-0x0000000070E68000-memory.dmp

      Filesize

      44KB

    • memory/2804-11-0x0000000070E5D000-0x0000000070E68000-memory.dmp

      Filesize

      44KB

    • memory/2804-29-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2804-30-0x0000000070E5D000-0x0000000070E68000-memory.dmp

      Filesize

      44KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.