Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 10:51 UTC

General

  • Target

    $PLUGINSDIR/AnimalShopping_license.rtf

  • Size

    102KB

  • MD5

    b9f0a9106d9c55d17ec154ae8c736688

  • SHA1

    529b0a0821e8acb5ab0d95d8fa10b24110264422

  • SHA256

    3e76b19f84b09bdf29a841978d19290ccaa6aeea46676eb89e9a02f977704332

  • SHA512

    5dec17fdf3e9685b370707f9b65848414ad3db09fd30a56096b25af5872ff7276d03d2a854f0573ce98963627795b1aee1ee9fe738cc3a2320d9c572cba863c8

  • SSDEEP

    3072:rCnlb8SacXMYUGL/IpJZ9zzNA5Kv1kCn6:O+g/IpJDzzNA5Kv1kC6

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\AnimalShopping_license.rtf"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1908

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      3ba02622147722c6d4dd7a7eb6da6433

      SHA1

      f495c98ec36381c0cd4011503d6d905d69f52296

      SHA256

      86e237fc310fbe7f4b73bc921bf605e9c02200b11a2fe63cf50f32fbd4e06a6d

      SHA512

      8b7b8bacc9f755dcd518b76b43bd9a520984e7706b3b5c2b4e8b6266337649367440d243acd8c18229f88214398457c8739521857691068f76556337f55eb34c

    • memory/2236-0-0x000000002F2E1000-0x000000002F2E2000-memory.dmp

      Filesize

      4KB

    • memory/2236-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2236-2-0x00000000713CD000-0x00000000713D8000-memory.dmp

      Filesize

      44KB

    • memory/2236-6-0x00000000713CD000-0x00000000713D8000-memory.dmp

      Filesize

      44KB

    • memory/2236-27-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.