Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    72s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2024, 17:53

General

  • Target

    The Global EPC Project Management Forum Amsterdam 27-28-29 November 2024 The venue will be Leonardo.eml

  • Size

    2.0MB

  • MD5

    8c61b46399e0a64063fef0d9ff867afc

  • SHA1

    0fd8fb8746c5b403fff82d956698ce9ac420c311

  • SHA256

    fbc46c3bb85a5be47437ee605bd24066f0065de0fa6389c6e78ba6036e7836a4

  • SHA512

    1194f7c05eba44613e44ddeac415e33f2f2894a6fb2ae427d8ac9eb586c41949f7bbd21317cd4bb3db96981cacd6856f1056f2fed540d87bebf4d43c96019d6d

  • SSDEEP

    24576:wwyJg5ri8G2TQ7joUtwqMWkZ63QG4oJvX4ev1rWUSxBxbSGKcDO2Y2xCUFMWO5FZ:fyGL2LHj4oukWUQKc60xCdWk

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\The Global EPC Project Management Forum Amsterdam 27-28-29 November 2024 The venue will be Leonardo.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\B7G4EHI4\Upcoming events 2024 (1).pdf"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2088
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    235KB

    MD5

    d367e8951838053b5ce00aa1626987b0

    SHA1

    1f4ebb3bc7eba27a2b582082a30f48edade6ea5a

    SHA256

    91a43d6eb4c819f497a439dc6092315fdfa42155ffc2083546f1d7b70b3e63b2

    SHA512

    04a52b6fab5696689b11a08584fc44baea9593e0700ce006cfb679724a8dd19868b565ed8d6d76871a09d235dfe27b09a2fdfa1dea444ddd40916a529837ed04

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    d1ddc10a51100c9c9deeffb1f68326ee

    SHA1

    acd101b5c781f6782e4254fa338e82aedb96cf51

    SHA256

    e65666854a6d562a3207f44dfa94f8fa8d8e4ea64d0fdbec2419c881a2a781bc

    SHA512

    231c24c92e463d9e7fda91fb675f9f529786f2c69818f001496f69e2f71465ca7fec4032795e56cdfed245186075c22da973ab7686e4e8fca080f181f85a773f

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    504B

    MD5

    f4f21844be5c015b78e72f5bf52b9153

    SHA1

    65a80c4a8fca8dd741d16313b19ce756b7136206

    SHA256

    3fe7410ba317fab63ef20e2fb2a5a09523453355964c029dd9f90acbfb6be11d

    SHA512

    58fbe01e182fdf705f3c50366ea7e20649c7a2b886fa0f674b274aaa122baa8458148df3ca2577198d9c5088e55c96bbad858fd66deddaa1fa6fb886ccac8615

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\B7G4EHI4\EPC.jpg

    Filesize

    273KB

    MD5

    8655559fa825c441ec81b81664f7b990

    SHA1

    29d28dbc56e3449f003e990e9308299ef48279cb

    SHA256

    69fff7fd0a7072a8e699d5b2eec95a4237284f2e1a374e3a362608af2e0cb421

    SHA512

    5449ecf4e6b75b34c794c399351c6aa065a876a8069829695eb2c7cd7b45fd27bbf3de309fcefcf78d526194dac1ec0c2ceb246554aa69ae7d08a64b993eb9aa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\B7G4EHI4\EPC.jpg:Zone.Identifier

    Filesize

    26B

    MD5

    fbccf14d504b7b2dbcb5a5bda75bd93b

    SHA1

    d59fc84cdd5217c6cf74785703655f78da6b582b

    SHA256

    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

    SHA512

    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\B7G4EHI4\Leonardo-Royal-Hotel-Amsterdam-8-v3__FillMaxWzgwMCw2MDBd (1) (2).jpg

    Filesize

    104KB

    MD5

    b7bb31fcebdefd26f06c4e0c16d5d24c

    SHA1

    4f7872e7d7895c5a45bdb102b9e21788381bb1c5

    SHA256

    49eb8a8806730faf9f793a2ade69a05783710395bd735d529fd44fbc4cf76ef5

    SHA512

    18404ef36081b3c1308f2e1edec7f3d9260b8eaea9da65b0d2cf0a7d30f1b8a1ab075dccdbc9ec9083b5852950fd7598f74826c0be859826b6ff44f870692273

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\B7G4EHI4\Upcoming events 2024 (1).pdf

    Filesize

    1.0MB

    MD5

    bd76f299952a129525c03b09d555c2a8

    SHA1

    c95add186b11465a6d28a426846a14520b8e2c1c

    SHA256

    e4ae341a338356b27fd750a56df33a8ad599a82959115c9ad4d7978b04071538

    SHA512

    2ee0c6e0c5f413ac9875535da9d261e4e14a52846acbdf5e350acef725427b2e60d050f7039963ccfc76dcfd29b9b9aa28a256899774519efdfd3b4ddb8eb2ed

  • C:\Users\Admin\AppData\Local\Temp\{0A2908D1-45D7-4211-90CD-B42D78244A19}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    c67480c43a903cbe7a3bf9b1ad58dae5

    SHA1

    430c2d4ba8d28015297fca22bf5a9c7472a7fa7e

    SHA256

    dd6940ae279e551907cea97acb191b198a2a74bd13ef7d1f80ac63c03089e07e

    SHA512

    c1281605291551c308a3f003f0306b6ffe107d3490ed94b7593121948833f40392cb2d4419050391e38acc719ba9057190a73883b9aa4ccd0c445b663e91f83f

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/1424-250-0x00000000001B0000-0x00000000001B2000-memory.dmp

    Filesize

    8KB

  • memory/1824-1-0x000000007334D000-0x0000000073358000-memory.dmp

    Filesize

    44KB

  • memory/1824-225-0x000000007334D000-0x0000000073358000-memory.dmp

    Filesize

    44KB

  • memory/1824-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1824-249-0x0000000003480000-0x0000000003482000-memory.dmp

    Filesize

    8KB