Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2024, 20:09

General

  • Target

    phish_alert_sp2_2.0.0.0(7).eml

  • Size

    10KB

  • MD5

    e37f07595a6946763c99af1c887aada9

  • SHA1

    12550cb1afe5ea6cef3752204f87967b5b8ada3c

  • SHA256

    d1b2dc09960d1dc11900d1d30f437a0e2453ac2704524bf7880efc9b37c68170

  • SHA512

    82b429a7ab659dfc20978df2fb6c47bdc440084dfdbed2712530b72f66d9a728587447592285f02c34bdbdd425d708bebfcfceaa62c847eb31b1ecd69669ec0c

  • SSDEEP

    192:W/kCrI4WdhIsW2qaPXWgiE8amEkVnNw6bAbQEE+msj9QN6:RysdLmgibLVne6bAbQ/+pM6

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\phish_alert_sp2_2.0.0.0(7).eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    248KB

    MD5

    922d92422380ce2e26ac68bf89ccf98c

    SHA1

    bc704a866158406501860aa2737bb0831eb1f11b

    SHA256

    a72980c139773b6584f3fdadd62c306b015fc11b32678475c4620bb52a156060

    SHA512

    4721d4460863004d638be1ad3f96addc4d1d9e20a2adf3cb99a96cd6cbdc599016b81d4e00e8e6a62e62b9cb585b29cc816d0ab382642c13b1b7d590bf2a0040

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    248KB

    MD5

    2b976417a70b63f1b7e6868dbbb94899

    SHA1

    f7fdcc67bc53bec73eccd30cae36d23e7f8794cf

    SHA256

    66886867e0e8b081011c1a6f69ca278b1894673584dc2b73c5e6a710a43e9f92

    SHA512

    7435b01abced1ee5429509fb770924a97dc2dab44ff172da8e1f21747ca973c72591186c6b9a6c6f8c99706c5c884129316fa10178ab303232bf1bfd343218ac

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    235KB

    MD5

    a0d9d6fd2445ea9a743fe376776cd156

    SHA1

    a3a21a2d73df65c11db0edde6b8ce8251c75620e

    SHA256

    5402a68cd43624485fe7c373a172b7fc9bac6d7f8ffad0277fc5ca562f27ab64

    SHA512

    57a43ea09ac3a0bc1a4a058aa371783b9c059eb5b0a07d4664dca1b716e75cf1780e58395de00b2363f6fbb3adac795e442ac33cdb696b924050922b78700062

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    7a36afd63df9e93c19dbf5aeb2e9ddab

    SHA1

    d97ade260cc9df7415939f3b51f2c497a8dfe798

    SHA256

    e7e5821d15b6fd2cf9f49b9522c29fc2c22a6d30449fd43e7695298ac849ca43

    SHA512

    116f0536cb7bf6cf331af86d13a2ea72a264d20a65eb48437bad0ef1cd0c4749a269f406c878cc92d79432f25d5b141a51d7c2ba845a5e60251cefa8639c5a60

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Temp\{338D1AEE-E3A8-4FC4-AD9A-C49C0544A4C5}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/2288-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2288-1-0x00000000738ED000-0x00000000738F8000-memory.dmp

    Filesize

    44KB

  • memory/2288-162-0x0000000069871000-0x0000000069872000-memory.dmp

    Filesize

    4KB

  • memory/2288-194-0x00000000738ED000-0x00000000738F8000-memory.dmp

    Filesize

    44KB