Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2024, 19:52

General

  • Target

    e5cd6145ccc4dd24a1f8f7fde8933ebf7afeaafc52b8ab2c19a4c752ec281efa.docx

  • Size

    16KB

  • MD5

    8d5a9a8978f345f34597fdda3b77aa15

  • SHA1

    61fa9cf1e7f058018106ebf7db7a1af70c53ef1b

  • SHA256

    e5cd6145ccc4dd24a1f8f7fde8933ebf7afeaafc52b8ab2c19a4c752ec281efa

  • SHA512

    2546b42680a703474a3ee7dee29872446d1ac715834f9170bafc0c4a1273c66444e7423ba739128764c5049c35b000b06963a5f9a3701d55d6becbacb8831a76

  • SSDEEP

    384:byXlm4wWns8PL8wi4OEwH8TIbE91r2fRNJY6viBnVs+f:bclAA5P3DOqnYJrTvQnVse

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e5cd6145ccc4dd24a1f8f7fde8933ebf7afeaafc52b8ab2c19a4c752ec281efa.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1944

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{50AE43BE-0317-46C1-9C04-67655F1AA209}.FSD

      Filesize

      128KB

      MD5

      b28afc9f118702765aa58b9db8c0ef0c

      SHA1

      5cbfb2724abfcf6989e4d2c7dd87f6adadec52d5

      SHA256

      b2e794bfb6b8c2e1712a4af6013e4880a32d8fb880b5824d79d3257a24a02a5e

      SHA512

      bf98b5f40cdc214c56930d0e738d408088aee8c1c662ddac7cdcf5b6c5501dcb530c6849cba673b7170c4d5a78ea2c6d12accba3f296405691bd70356d7272b0

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      351790626e55cbedcfbe8f72ae89ecab

      SHA1

      dad7e7c59420fed90e4f4d6fe58a011c6af0e2c9

      SHA256

      be97aa4d3d0823fd3281926083aa2406eec17354146d1e558d1aa96d58f98962

      SHA512

      2af02cf7f029f1e1fd90e672501c8b1d52b443e4ec24132359ce11283c680dddc09ce67d8b2a168d03fd44a020165d50c3ec7f5ceecec9a0e0dca98dca9bc43b

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      6135885975dcf921cb569f400ac442fb

      SHA1

      57c2cb458b3d2123c74b1511de921bae80e7dc43

      SHA256

      8cfcaeff62fedbf42a7108d9be387a90bb00381de92cdc7bb9d839ab3cb84cc5

      SHA512

      6b8f624a8c6a26604726693e2efeb260d7115c2eea151ff79854bbe39f55accd92061d7547d77d75ff303163b95a0815d4a5963344d55931969008b7564064b0

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{E96469FF-B744-42CE-91AD-4F58C534AE3C}.FSD

      Filesize

      128KB

      MD5

      97440a3bf719213607c9e483b2baeb11

      SHA1

      d1dbb658a71f8248aaf89409155e24bc433472d4

      SHA256

      26113b1dc6d9e745b04d0e50d2652456ed999730e16deb0bf8eec6dfc6e562dd

      SHA512

      a7ed6e22d1face774001b2795d981a815da593cf8b79bbd5a65e9399aabdc45ad37107649652da894e703e14e7c6d4fe31836b99535500b8bde62d8531181121

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\white[1].htm

      Filesize

      4KB

      MD5

      5b5a853bdd02e58943341924c105592d

      SHA1

      4f1f9c9aa83e59ee332c2a699dea0ca496ccaf24

      SHA256

      99f2700d92b1774e6e0a22ed482011edc1243ea3271795af026810b0116ddeae

      SHA512

      461d9dc47af5b1942e33fead9ef33eed9d53115a8a6ba827427c8859b30b2efed2c4703d645ea84ced4fdb35f25a6d7736825788b032e1ab8b41e4f49c30c499

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5EAA9B66.wmf

      Filesize

      642B

      MD5

      4f03b86e4d6631c26ff5fffc7332be1d

      SHA1

      14952a78ea51df67d5b5b6c6b4de3d96ba7935bd

      SHA256

      83f4ea26254d69825486bffd1d400217aac7245c5c48fe5acc3ccdea173c4851

      SHA512

      4bed29b66444d826e89589b55dd786758ff68fcd2daf8296703d4443edb991fffce563e20db22bfb34fdb488638bbb43252392b6c105d12e721329adc2774632

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\60ABDC12.wmf

      Filesize

      508B

      MD5

      2f05c468520033ddf0008bc86dc9bcc7

      SHA1

      50920953b24269f3bc4f5d582a604fb6c6ab93f7

      SHA256

      cd3e8cb411cdc5e8e42a0f4aef68d9b69c1a7d8bc7fd85da8c5b9a3187649216

      SHA512

      d2a4a45fb472f045eff663e6ccf4862d4bf81353e242ff1715fbe091cd9a165aa4f1c214b5363c43127b8ffc7ea111df7aa3bb5746746a7e46b1366cf5d6d18e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E4C63115.wmf

      Filesize

      508B

      MD5

      42e82637c3d74791a58310af8ff11c2b

      SHA1

      8469aff57199c30c12b40eb2019e1bc7c175415d

      SHA256

      3dcb0342a8cf73dd5f5c41533c2d95726c421b1892f2bb653f828f91d432c264

      SHA512

      99e0fc074e5482f97d147ce1970a1b16e3e8de5fc96175fa2b53c5cb3ff17644388e034f039a94ca3c87a00eef6aa4791e81a86ae47805b75d8735c422757f9e

    • C:\Users\Admin\AppData\Local\Temp\{248D149A-0A38-4B66-AD1D-19EB64A0095D}

      Filesize

      128KB

      MD5

      1b878cb85bd27604d5a0b80e3d508ce6

      SHA1

      0495922778e4d9913b0bbb2964b1e79af9ba05f2

      SHA256

      c70d719036c7a72933eda930db57848747f0690b2efe0d47a18cda7c32ce2c52

      SHA512

      e0a67b30e5b5fcce93110aa620a15098977255b8bb72bf636eacb544cefa4f513bd838fd2ed362da43c648faeea5d3d4b7efb7ab429888f45d6a4edadb5197aa

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      ab02aecbbb04aabe324858727b979e96

      SHA1

      73080851f3a09aacad92fdd8df4344ddcd0ed6d9

      SHA256

      6d8dc75a0cd125c8e70af6ba585e5da420d4a4646d68e76f591c2da312efec3a

      SHA512

      bd820565ba6581b8d0eb3b7c06a220fb0d59e290e27cb0f3af6ba01626904c17b7415cc051ebce6be7e215d3e6d06d57111fb57564b4d5b5b34271cec07ac053

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2360-20-0x00000000711DD000-0x00000000711E8000-memory.dmp

      Filesize

      44KB

    • memory/2360-2-0x00000000711DD000-0x00000000711E8000-memory.dmp

      Filesize

      44KB

    • memory/2360-116-0x0000000007800000-0x0000000007900000-memory.dmp

      Filesize

      1024KB

    • memory/2360-0-0x000000002FD01000-0x000000002FD02000-memory.dmp

      Filesize

      4KB

    • memory/2360-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2360-171-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2360-180-0x00000000711DD000-0x00000000711E8000-memory.dmp

      Filesize

      44KB