Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
137s -
platform
windows7_x64 -
resource
win7 -
submitted
07/07/2020, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
248P.rtf
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
248P.rtf
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
248P.rtf
-
Size
1.7MB
-
MD5
5ad591a0c8b8689a5337acf675d8119f
-
SHA1
8218cbe07fbb35bec9b469cdd6c4e00ccde28a77
-
SHA256
4c5c43f4932ac497c716bb5ec30a7636e5056775a4d5f3f48b9e5c1414b9f7b3
-
SHA512
91b98cd6c773a6928f91eae59962b246717c66a0d8f1c618e763ee97e2ea99e3875086466720f74b343957f4a5af84f720ca3d3fc15f659a0d05f351b85ed382
Score
7/10
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1060 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1060 WINWORD.EXE 1060 WINWORD.EXE 1060 WINWORD.EXE -
Loads dropped DLL 1 IoCs
pid Process 1312 EQNEDT32.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 1312 EQNEDT32.EXE
Processes
-
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\248P.rtf"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1060
-
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Loads dropped DLL
- Launches Equation Editor
PID:1312