Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 11:36

General

  • Target

    6761be150bd86a29ecd0cd8f73608b83e16f20a020399bfd67e585295e72673e.docx

  • Size

    126KB

  • MD5

    15c62d22495ca5aa4bb996b2cb5feb7f

  • SHA1

    5af4aff0a799ddb0588739f4438e9d65353d6198

  • SHA256

    6761be150bd86a29ecd0cd8f73608b83e16f20a020399bfd67e585295e72673e

  • SHA512

    538a6ea35d4b8a72b67f1ca8d97dbb9e89375afd9acb61ea4e707c6bfea043e3f1e1de0e7f2771fd307b226bbe0889348dbb41ee9fde22a3596657bb1e273615

  • SSDEEP

    3072:N0prxxVc1xRSRCmNBo1Na8nWaQVmxARh8Dh0MP4Rp5ZGMt15VvVMUlu2W6:NcrxzyRSJNwaaQU2y/4R3z158suI

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6761be150bd86a29ecd0cd8f73608b83e16f20a020399bfd67e585295e72673e.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:828

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{8DF39DC3-CED7-4604-8925-3AFF8D8FD9B8}.FSD

      Filesize

      128KB

      MD5

      095c5c8f60f252b00f4cfbea6f94bda8

      SHA1

      41c9f48a9ddcbcc80302a513d8d92e991a1b5e72

      SHA256

      957fdf195a24fab51e1ee0f3f9393d4edf7b318fd36fd384dc0e17dfe7907eae

      SHA512

      2021073776edc5afa46865b0d8c711e6fec2f670757ef5ce79b9c6f69d5681da691e6801e204691c2a11436c208a02239d18f5739c192404f3e5150a42d93c23

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      ff475320ded53eb32d1d2263d79f4c0b

      SHA1

      0e1ae87380691e17614b2446bd406e2f221695af

      SHA256

      0547fabe443e529ce004d53dd14d2a1e0b892fa46f9901cc56b34e9ea67f89e4

      SHA512

      062e32dfe8ada7b344d72f4a249933ad7915a2008b7f167cd2d1a2d7f8a03bf897ddfc432351b8b15f1c91eb9ae866de2d7685fbde39aac36b6738e7f329c8ac

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{47809748-FC11-434F-8DB9-B322D65D10AA}.FSD

      Filesize

      128KB

      MD5

      bcdcbdff5e7c247472b14bcecc063331

      SHA1

      8e82caf561bc061127d2d2b4754d233a9961a376

      SHA256

      da597d7a9f1399677ad3d40d6d043d83548c36edbe0bc808e562f1bae1f92889

      SHA512

      6cee7b89c76e1900945cf7cea1cd55aa1f5dc87d9e6812d71385203bff33ed250279b64b7467846987d179cce4f3b7a5e62a2ac0b5c58fbfd162fe3a1648e4c5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SZ2A9SGY\FtvFqESQjkxjw94H6SiA2++haYGKrl02AAAAAGvwSeTQ4+HT5CFl0GmxnkkAiyiz1y1KsUF3FuwC1UeoSHquxbUBVvNOKFofaL9l6Sw++DkU[1].htm

      Filesize

      114B

      MD5

      e89f75f918dbdcee28604d4e09dd71d7

      SHA1

      f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

      SHA256

      6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

      SHA512

      8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

    • C:\Users\Admin\AppData\Local\Temp\{75C80217-8988-4E0B-9D51-0C0E225870BA}

      Filesize

      128KB

      MD5

      1b5d97cf25473233b843998be6201a1f

      SHA1

      e04efe0d764174371e4230db675b4d11b1e014ec

      SHA256

      ca5125ad880646864c3d23c8284676cccd02d2b5630fcbc4fa12988ae6a615a0

      SHA512

      0aa05d1fa5ef79343f381734e0997783ff699c2e3b703b561dc6c27b8b4bcd74920b458a3d482a2d2516e9ad001a7a14600a6ceef1249ae71ee47ae0d9d190ab

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      0fa4a256797a9819ddaee27512b6041a

      SHA1

      830a2a1cde5554603b9f3e47b1da63d32f93b553

      SHA256

      92e4a6f8b5be368868d299338da89df9577fc172daa564142c37e697f544546d

      SHA512

      acfe76eee4ebc73d5dc7ac36740d3a1f59fc609efa03ddba8ef1e6a299f688c81b5f3292191ae54ae5063d6feff875b51fd64d04866c545217ae61cd730cea53

    • memory/1736-0-0x000000002FF11000-0x000000002FF12000-memory.dmp

      Filesize

      4KB

    • memory/1736-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1736-2-0x000000007130D000-0x0000000071318000-memory.dmp

      Filesize

      44KB

    • memory/1736-92-0x000000007130D000-0x0000000071318000-memory.dmp

      Filesize

      44KB

    • memory/1736-114-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1736-115-0x000000007130D000-0x0000000071318000-memory.dmp

      Filesize

      44KB