Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
wyko_electromechanical_services_ltd.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
wyko_electromechanical_services_ltd.scr
Resource
win10v2004-20240802-en
General
-
Target
wyko_electromechanical_services_ltd.scr
-
Size
68KB
-
MD5
21f17bc44bfb3beab2792aebc74fdd06
-
SHA1
4000707e1ed33dc9059f915f2662364b0d3ac7e7
-
SHA256
e1772da63f62cc0c9c35bb6a5c9b5221e1e84341549e115ed6a9b28f5a70d7de
-
SHA512
25ccd59eb3e5ef692813a54edb64e88718b5c07c37ef382740b2b4f75277729f34c7defd7cc091b0fc5184e9cc2bf655d6d94442c9976a86451a6662adad1788
-
SSDEEP
768:aAygo5ebZ7ok3FZ9ypL0vzJDsOq2YAp7CP:w19k7QwrJgOqHt
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyko_electromechanical_services_ltd.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1652 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1652 WINWORD.EXE 1652 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1652 2292 wyko_electromechanical_services_ltd.scr 28 PID 2292 wrote to memory of 1652 2292 wyko_electromechanical_services_ltd.scr 28 PID 2292 wrote to memory of 1652 2292 wyko_electromechanical_services_ltd.scr 28 PID 2292 wrote to memory of 1652 2292 wyko_electromechanical_services_ltd.scr 28 PID 1652 wrote to memory of 2624 1652 WINWORD.EXE 32 PID 1652 wrote to memory of 2624 1652 WINWORD.EXE 32 PID 1652 wrote to memory of 2624 1652 WINWORD.EXE 32 PID 1652 wrote to memory of 2624 1652 WINWORD.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\wyko_electromechanical_services_ltd.scr"C:\Users\Admin\AppData\Local\Temp\wyko_electromechanical_services_ltd.scr" /S1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\wyko_electromechanical_services_ltd.rtf"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59fce3b0133ad2796442f5a0e18b681a5
SHA15972e80cc00e89be846692540921c5dfeac5d017
SHA2568ae683fa2b323bd63bee7040b41f1213b74ea05526972d52c210b8b2110ccead
SHA51204ffe802cbb0383df1825985e11025f1cc53de8d68ca38525ac5fdcd266f6f4bb1858f78a1317c3857f891527fc18a95e48991d6f6e1fe36cdca2d7aebfdb40b