Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    840s
  • max time network
    842s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 20:37 UTC

General

  • Target

    05-2022-0438.docx

  • Size

    10KB

  • MD5

    52945af1def85b171870b31fa4782e52

  • SHA1

    06727ffda60359236a8029e0b3e8a0fd11c23313

  • SHA256

    4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784

  • SHA512

    58849f65d1ef86eacb905569919975d88094e075f6cd23efc4b481ad17af2c475a9834178f3ffcb4cd3ac984d21ed8dc1919141133c19fd647ca48a8d3e2b183

  • SSDEEP

    192:AEhM7fIUU09264wptGheab8h7Z/c+8poF1d3jvvtl59rGxjPQDasYBcG7h+:AqWfIz092hwLGAabkcfa7pr1lzyxjPQ9

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\05-2022-0438.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:696

    Network

    • flag-us
      DNS
      www.xmlformats.com
      WINWORD.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.xmlformats.com
      IN A
      Response
      www.xmlformats.com
      IN A
      185.107.56.58
    • flag-nl
      OPTIONS
      https://www.xmlformats.com/office/word/2022/wordprocessingDrawing/
      WINWORD.EXE
      Remote address:
      185.107.56.58:443
      Request
      OPTIONS /office/word/2022/wordprocessingDrawing/ HTTP/1.1
      User-Agent: Microsoft Office Protocol Discovery
      Host: www.xmlformats.com
      Content-Length: 0
      Connection: Keep-Alive
      Response
      HTTP/1.1 302 Found
      cache-control: max-age=0, private, must-revalidate
      connection: close
      content-length: 11
      date: Sat, 11 May 2024 00:06:31 GMT
      location: http://survey-smiles.com
      server: Cowboy
      set-cookie: sid=52c1b4f8-0f2a-11ef-8828-3438099f656f; path=/; domain=.xmlformats.com; expires=Thu, 29 May 2092 03:20:39 GMT; max-age=2147483647; secure; HttpOnly
    • flag-nl
      OPTIONS
      https://www.xmlformats.com/office/word/2022/wordprocessingDrawing/
      WINWORD.EXE
      Remote address:
      185.107.56.58:443
      Request
      OPTIONS /office/word/2022/wordprocessingDrawing/ HTTP/1.1
      User-Agent: Microsoft Office Protocol Discovery
      Host: www.xmlformats.com
      Content-Length: 0
      Connection: Keep-Alive
      Cookie: sid=52c1b4f8-0f2a-11ef-8828-3438099f656f
      Response
      HTTP/1.1 302 Found
      cache-control: max-age=0, private, must-revalidate
      connection: close
      content-length: 11
      date: Sat, 11 May 2024 00:08:11 GMT
      location: http://survey-smiles.com
      server: Cowboy
    • 185.107.56.58:443
      https://www.xmlformats.com/office/word/2022/wordprocessingDrawing/
      tls, http
      WINWORD.EXE
      1.0kB
      4.1kB
      10
      10

      HTTP Request

      OPTIONS https://www.xmlformats.com/office/word/2022/wordprocessingDrawing/

      HTTP Response

      302
    • 185.107.56.58:443
      www.xmlformats.com
      tls
      WINWORD.EXE
      352 B
      211 B
      5
      5
    • 185.107.56.58:443
      www.xmlformats.com
      tls
      WINWORD.EXE
      288 B
      211 B
      5
      5
    • 185.107.56.58:443
      www.xmlformats.com
      tls
      WINWORD.EXE
      288 B
      211 B
      5
      5
    • 185.107.56.58:443
      www.xmlformats.com
      tls
      WINWORD.EXE
      352 B
      211 B
      5
      5
    • 185.107.56.58:443
      https://www.xmlformats.com/office/word/2022/wordprocessingDrawing/
      tls, http
      WINWORD.EXE
      1.0kB
      3.9kB
      8
      11

      HTTP Request

      OPTIONS https://www.xmlformats.com/office/word/2022/wordprocessingDrawing/

      HTTP Response

      302
    • 185.107.56.58:443
      www.xmlformats.com
      tls
      WINWORD.EXE
      352 B
      171 B
      5
      4
    • 185.107.56.58:443
      www.xmlformats.com
      tls
      WINWORD.EXE
      288 B
      171 B
      5
      4
    • 185.107.56.58:443
      www.xmlformats.com
      tls
      WINWORD.EXE
      288 B
      171 B
      5
      4
    • 185.107.56.58:443
      www.xmlformats.com
      tls
      WINWORD.EXE
      352 B
      171 B
      5
      4
    • 8.8.8.8:53
      www.xmlformats.com
      dns
      WINWORD.EXE
      64 B
      80 B
      1
      1

      DNS Request

      www.xmlformats.com

      DNS Response

      185.107.56.58

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{3FC84201-A268-49FE-AF1B-18BD7931180E}.FSD

      Filesize

      128KB

      MD5

      0206ed1a4620090fddcb91d0d1a1b8f8

      SHA1

      0e260d981668998adc194169d2aa77c851b5a359

      SHA256

      ab68846078f87a87d52da2d9746958134ee8f92c19d33f1196605799c90234ff

      SHA512

      687533e7e1f595ee1d4534e3120ca9a04e6a4c2a1f048cb428ebc972d024ab4e407bedf8b646bf2a99a45ad98654cba98fbbd1b84e2649a15b817ede4e8b420f

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      431c4a7339d4ebd9d06498ad1a7dfbf9

      SHA1

      902b1370dbf488aa7a3c09b33adb18093952fa3f

      SHA256

      2beebc95ee58258c8b19d3ebeb070df6d8cb4b8a1789b08e5afada8dc0f34d0e

      SHA512

      348d3c1138e0314ccacf8cabf24f56939eba865147202843f450a100afa3b516c96de8878b7d5e5945411e6d0e63e19d2c89512b6f1ac1ed5a6dd171c2d3ec8d

    • C:\Users\Admin\AppData\Local\Temp\{A03AD62A-36C9-435D-B9E8-646D1720E25F}

      Filesize

      128KB

      MD5

      e0c138ef948b83c8762f9998cbc71a9e

      SHA1

      65c929d1a2123c56640814f306b144a6061cd2ce

      SHA256

      3edf1dcd86fcc04624cbb15e3d37165f8afad78ea143e3c6e813b6191db60ff1

      SHA512

      42c963bd49fefd295508840b18d099ccb9e5f10dbd5cff3d3b1e2634f526aa7e399b2abab3f3dc33468980821daf4c408ea9cddd57957d73739de41f929586ab

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      c6aa9f882184c515225aa6c7bc3ed856

      SHA1

      6d398aa4319018c9bcbb6b6b9386ca4a6bed6fc9

      SHA256

      9a060bf5b9adee78736d388276f0be54263d676c883947a3538da329cdbe70f1

      SHA512

      2a5b24cb4aadaa954f4eb833531b847dc4836924d1c65d7e484166d1ac2271a1f8323ce5d3c83b42647e421a8c5650b51bbafab8492e85fd66e337e033b5c78b

    • memory/2244-0-0x000000002FD61000-0x000000002FD62000-memory.dmp

      Filesize

      4KB

    • memory/2244-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2244-2-0x0000000070C9D000-0x0000000070CA8000-memory.dmp

      Filesize

      44KB

    • memory/2244-78-0x0000000070C9D000-0x0000000070CA8000-memory.dmp

      Filesize

      44KB

    • memory/2244-107-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2244-108-0x0000000070C9D000-0x0000000070CA8000-memory.dmp

      Filesize

      44KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.