Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 18:18 UTC

General

  • Target

    967059c927f066a79905cf5a2f99562ca72409238322098e8ac93c905e75a1af.rtf

  • Size

    4KB

  • MD5

    2d6060a66195cf2a68d79606b5eae8f8

  • SHA1

    426a17bf4ec7f5eb61ca038032fdea22ec401379

  • SHA256

    967059c927f066a79905cf5a2f99562ca72409238322098e8ac93c905e75a1af

  • SHA512

    55f0c46bd8fa99604238b06e5bd8737574d69f12b6e52adc3b253805952616f3e7da0a7aa179c1a8bd1d3b07fcab1a49ddd4bbd057c34ca8fb957c78b8269754

  • SSDEEP

    96:QLl3HYpkWq2Ngv+yp5UglURVkFvHADrseco7VLo6EEGrvJAt5PbANI:iloisN6p59loSFCsA7VREEGrRQ5PbAu

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\967059c927f066a79905cf5a2f99562ca72409238322098e8ac93c905e75a1af.rtf"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2304
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Launches Equation Editor
      PID:2884

    Network

    • flag-us
      DNS
      hartac.co.za
      EQNEDT32.EXE
      Remote address:
      8.8.8.8:53
      Request
      hartac.co.za
      IN A
      Response
      hartac.co.za
      IN A
      154.0.162.16
    • flag-za
      GET
      http://hartac.co.za/wp-content/plugins/dac83144a70c491c9bb53bbf00eb4cc1/xt/mmd/cf4ubbOUYe0jqmac.exe
      EQNEDT32.EXE
      Remote address:
      154.0.162.16:80
      Request
      GET /wp-content/plugins/dac83144a70c491c9bb53bbf00eb4cc1/xt/mmd/cf4ubbOUYe0jqmac.exe HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
      Host: hartac.co.za
      Connection: Keep-Alive
      Response
      HTTP/1.1 301 Moved Permanently
      Date: Wed, 20 Nov 2024 18:18:15 GMT
      Server: Apache
      Location: https://hartac.co.za/wp-content/plugins/dac83144a70c491c9bb53bbf00eb4cc1/xt/mmd/cf4ubbOUYe0jqmac.exe
      Content-Length: 308
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: text/html; charset=iso-8859-1
    • 154.0.162.16:80
      http://hartac.co.za/wp-content/plugins/dac83144a70c491c9bb53bbf00eb4cc1/xt/mmd/cf4ubbOUYe0jqmac.exe
      http
      EQNEDT32.EXE
      620 B
      761 B
      5
      3

      HTTP Request

      GET http://hartac.co.za/wp-content/plugins/dac83144a70c491c9bb53bbf00eb4cc1/xt/mmd/cf4ubbOUYe0jqmac.exe

      HTTP Response

      301
    • 154.0.162.16:443
      hartac.co.za
      tls
      EQNEDT32.EXE
      393 B
      219 B
      5
      5
    • 154.0.162.16:443
      hartac.co.za
      tls
      EQNEDT32.EXE
      355 B
      219 B
      5
      5
    • 154.0.162.16:443
      hartac.co.za
      tls
      EQNEDT32.EXE
      288 B
      219 B
      5
      5
    • 154.0.162.16:443
      hartac.co.za
      EQNEDT32.EXE
      190 B
      92 B
      4
      2
    • 8.8.8.8:53
      hartac.co.za
      dns
      EQNEDT32.EXE
      58 B
      74 B
      1
      1

      DNS Request

      hartac.co.za

      DNS Response

      154.0.162.16

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2472-0-0x000000002F1F1000-0x000000002F1F2000-memory.dmp

      Filesize

      4KB

    • memory/2472-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2472-2-0x0000000070EFD000-0x0000000070F08000-memory.dmp

      Filesize

      44KB

    • memory/2472-6-0x0000000070EFD000-0x0000000070F08000-memory.dmp

      Filesize

      44KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.