Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 21:50
Static task
static1
Behavioral task
behavioral1
Sample
7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.exe
Resource
win10v2004-20240226-en
General
-
Target
7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.exe
-
Size
539KB
-
MD5
90a4539fba1c800fa5e06a002859503b
-
SHA1
c67a295f48f0cbdb420129143b87984a3eec8166
-
SHA256
7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760
-
SHA512
2a73410ffd6d72feaa2a9de96dbe33a891ffe64bacfeeb9b0f3de440caec20ab61f56db51dbb7b7d2cf86bbdc83e8f78a2e6b68b4586425841d2edbd3b7cad6a
-
SSDEEP
12288:NYIW0p98Oh8P7h8W9IbvopaISmuFqx+nH9TT:ZW298E8uWCbYaISHFq2dTT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2188 C40.tmp -
Loads dropped DLL 1 IoCs
pid Process 2176 7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2364 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2188 C40.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2188 2176 7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.exe 28 PID 2176 wrote to memory of 2188 2176 7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.exe 28 PID 2176 wrote to memory of 2188 2176 7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.exe 28 PID 2176 wrote to memory of 2188 2176 7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.exe 28 PID 2188 wrote to memory of 2364 2188 C40.tmp 29 PID 2188 wrote to memory of 2364 2188 C40.tmp 29 PID 2188 wrote to memory of 2364 2188 C40.tmp 29 PID 2188 wrote to memory of 2364 2188 C40.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.exe"C:\Users\Admin\AppData\Local\Temp\7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp" --pingC:\Users\Admin\AppData\Local\Temp\7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.exe E81A86C858103D9D39A955AE99E5D6E1279E651A9EB15256E00DEF1626B627D4F7A9376C1CBB71965DBAB5FB722A1D3ED002244630A75BE22A24DCA5C04BECA52⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2364
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7bb06d38f839ca962b48b59675e43cc0dba71c6d73e153337bae25402bf93760.docx
Filesize21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
539KB
MD519c614e42b8a5acadc9fbf36f888ac71
SHA1e7d4e9295c59fbcf70666c44e7836d7eb395e494
SHA256deaabf580fd6aee2f29414e52d3941ebc94667a981884294b08f4fde1ab5f281
SHA5120ee0d9c9fb0399b3a3d826b30694199c1b4efecf84341d93f2f19c792523720eac9a2079a9b7df67bdcffe7c0878136abfae8da863336e3b7a6df19232bb1f79