Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
09/07/2020, 10:17
Static task
static1
Behavioral task
behavioral1
Sample
37ac7f956381da1d531fa7fd074fe3b723d25800d32a2d9234fab38a55f8894d.doc
Resource
win7
Behavioral task
behavioral2
Sample
37ac7f956381da1d531fa7fd074fe3b723d25800d32a2d9234fab38a55f8894d.doc
Resource
win10v200430
General
-
Target
37ac7f956381da1d531fa7fd074fe3b723d25800d32a2d9234fab38a55f8894d.doc
-
Size
147KB
-
MD5
a20080ebe47ebf852ae1aeab66f8b662
-
SHA1
8fd44fabab8b70f7cffb34165a58ac6cf19fda82
-
SHA256
37ac7f956381da1d531fa7fd074fe3b723d25800d32a2d9234fab38a55f8894d
-
SHA512
542725f37c96808b7d85dfc1bc21159e59cddd18fbd5e789df5eda8a9eda1b50410926104f9579203919875e9790878f1d5f09296e05ca5410a3f078126e9bce
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 860 WINWORD.EXE 860 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3572 860 regsvr32.exe 67 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 860 wrote to memory of 3572 860 WINWORD.EXE 72 PID 860 wrote to memory of 3572 860 WINWORD.EXE 72 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\37ac7f956381da1d531fa7fd074fe3b723d25800d32a2d9234fab38a55f8894d.doc" /o ""1⤵
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
PID:860 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" EA.tmp2⤵
- Process spawned unexpected child process
PID:3572
-