Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 14:20

General

  • Target

    d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe

  • Size

    461KB

  • MD5

    b03192389159b15f5552c82a29c747fe

  • SHA1

    a9d64e615171b05a402422056ddfcd250febae93

  • SHA256

    d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b

  • SHA512

    acc12fd9cd4b4ddf3dcab060be01f6369ef8f8b77af6757e065c22df43a3d8796e8c46b485e9c68f37816c6f439ddf23e9fc9e1f647438e80f589418da7b5a40

  • SSDEEP

    12288:bxmIJQvPkitVCR3pPuIyDxs/db32AVUKo:NmoO8itVsZPuxlkj28UKo

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe
    "C:\Users\Admin\AppData\Local\Temp\d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Roaming\apple.exe
      "C:\Users\Admin\AppData\Roaming\apple.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Users\Admin\Wmi Player\siteadv.exe
        "C:\Users\Admin\Wmi Player\siteadv.exe" stat cc.tmp
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Users\Admin\Wmi Player\siteadv.exe
          "C:\Users\Admin\Wmi Player\siteadv.exe" install_del cc.tmp C:\Users\Admin\AppData\Roaming\apple.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          PID:2524
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\0417.doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\0417.doc

      Filesize

      64KB

      MD5

      a75c81a18e3965b5942e7b1669db16ca

      SHA1

      aad3241fd23372523528a99f4c18127a3ebbea59

      SHA256

      3e57ca992c235b68027cb62740d8e86a3294ac0ebcff4a2683b29bdaec016646

      SHA512

      3b8e11170ea7379ce8130dbd6d3a220cf4aa810308dc24f0c1b2fc1399200a7e8d8e258d0d2f5025e269c131dc2d6ac5dc28beedce839b9815574ed248c3a335

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      1c4be013aead0750eba52a4382ed6bca

      SHA1

      a89d8a7c6555c72810a3c78893d4ac373b8bd2a9

      SHA256

      e86ec7e783d2345ea554da9f1db76ea85986e77ae8bbb58e0e9855bad32a1477

      SHA512

      2e73e5c1d7558898bcc9980aefafb0337fe13581c77bc0e3947f871ed3859b4894af1b2dd25d14109cb88807b74c035f8206d6832ab9021fc4ec04eb0a8d16b6

    • C:\Users\Admin\Wmi Player\SiteAdv.dll

      Filesize

      70KB

      MD5

      343a9cc37cc9843cf862dd946c7eb714

      SHA1

      d5ce13a66e8407baec0f447c7fb41d493fd8d73a

      SHA256

      50f035100948f72b6f03ccc02f9c6073c9060d6e9c53c563a3fdb1d0c454916e

      SHA512

      5210640adf6ebfeb724e7700dcc4bb7e251541b59a2c2b1dd80e5a683e209a90f4af92de438dacec6b54c12c0c5922af3c5e12e8ab9c0f467ff13d9005a7ca81

    • \Users\Admin\AppData\Roaming\apple.exe

      Filesize

      290KB

      MD5

      b1f907379148c1e09009cda3cbd3877b

      SHA1

      e29b263a89217412f45d6c7a0235b19af030755a

      SHA256

      c3415bddc506839614cbb7186bfc6643713806de4f5b1c15445e96a644b44bea

      SHA512

      ced809231a420a63210edd3cb13a2b0696435bc043c1a61bfb8b025f242e562cdfd843a65ecdea97aaea2b86d4d5a384f9233787e6509bc88341c5cfed1bd5be

    • \Users\Admin\Wmi Player\cc.tmp

      Filesize

      85KB

      MD5

      27ea69e0233f32d521c7bb1330690731

      SHA1

      ec928047d511286c4db2580045d02ced34b639ea

      SHA256

      69863ba336156f4e559364b63a39f16e08ac3a6e3a0fa4ce11486ea16827f772

      SHA512

      fa6936f6b66add038c007ec530e7703e426d8c2bff32faf0dc0688512fdbc7331f423edc89f90ffeb059d25baef977b69fcdc8b43e89af4f467dbb077e062e6c

    • \Users\Admin\Wmi Player\siteadv.exe

      Filesize

      34KB

      MD5

      0584b8020e41db48e267d26c641339c3

      SHA1

      de8b5b36e3638dc757cc3e7e7345b52f3e14b72e

      SHA256

      eb3b4e82ddfdb118d700a853587c9589c93879f62f576e104a62bdaa5a338d7b

      SHA512

      3a81b260a37b3bdfc0fffa08ab98cf6ebff3123a76c6f637d83471187e357d0af2e8d9eefe6ea32af9274dde732a7795312dded500a92c6bf3bedaf408abab07

    • memory/2456-37-0x000000002F311000-0x000000002F312000-memory.dmp

      Filesize

      4KB

    • memory/2456-41-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2456-42-0x0000000070A8D000-0x0000000070A98000-memory.dmp

      Filesize

      44KB

    • memory/2456-66-0x0000000070A8D000-0x0000000070A98000-memory.dmp

      Filesize

      44KB

    • memory/2456-86-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB