Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

16/05/2024, 11:19 UTC

240516-nevzfaad73 1

16/05/2024, 10:12 UTC

240516-l8hj4aff2v 6

Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 11:19 UTC

General

  • Target

    Enquiry List.xls

  • Size

    245KB

  • MD5

    6c6308cfc88f76a7204f6138904bd1b0

  • SHA1

    e60465358aac52aeadf5051b5d83c0557f15b081

  • SHA256

    093511e7607bc5b0eecd6b3d345cebef5be94687529b62c80c8cb50b93581623

  • SHA512

    77ee18b0d9a8b06e1a9a42e2e36dc7b0c241ef2bcec36c6c12cc3ef5be40d90c49a67df1412d5c3d7d64fd32256fa218e485ed5e9ab080c1fba1838ddd5152ea

  • SSDEEP

    6144:We4UcLe0JOqPQZR8MDdATCR3tScAtwvE6EsBmMqUPI8IU:cUP/qPQZR8MxAm/Sbtws67BNp1I

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Enquiry List.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2024

Network

  • flag-us
    DNS
    ud.ht
    EXCEL.EXE
    Remote address:
    8.8.8.8:53
    Request
    ud.ht
    IN A
    Response
    ud.ht
    IN A
    172.210.102.146
  • flag-us
    GET
    http://ud.ht/PFTX
    EXCEL.EXE
    Remote address:
    172.210.102.146:80
    Request
    GET /PFTX HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
    Host: ud.ht
    Connection: Keep-Alive
    Response
    HTTP/1.1 301 Moved Permanently
    location: https://ud.ht/PFTX
    date: Thu, 16 May 2024 11:19:15 GMT
    content-length: 0
  • 172.210.102.146:80
    http://ud.ht/PFTX
    http
    EXCEL.EXE
    584 B
    292 B
    6
    4

    HTTP Request

    GET http://ud.ht/PFTX

    HTTP Response

    301
  • 172.210.102.146:443
    ud.ht
    tls
    EXCEL.EXE
    386 B
    219 B
    5
    5
  • 172.210.102.146:443
    ud.ht
    tls
    EXCEL.EXE
    348 B
    219 B
    5
    5
  • 172.210.102.146:443
    ud.ht
    tls
    EXCEL.EXE
    196 B
    132 B
    3
    3
  • 172.210.102.146:443
    ud.ht
    EXCEL.EXE
    190 B
    132 B
    4
    3
  • 8.8.8.8:53
    ud.ht
    dns
    EXCEL.EXE
    51 B
    67 B
    1
    1

    DNS Request

    ud.ht

    DNS Response

    172.210.102.146

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2024-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2024-1-0x000000007243D000-0x0000000072448000-memory.dmp

    Filesize

    44KB

  • memory/2024-3-0x000000007243D000-0x0000000072448000-memory.dmp

    Filesize

    44KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.