Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

10/07/2020, 07:44

200710-lw2wjj8le6 1

10/07/2020, 07:38

200710-43qx4b7xkn 1

10/07/2020, 07:37

200710-yy5hsvbtj6 1

Analysis

  • max time kernel
    149s
  • max time network
    91s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    10/07/2020, 07:38

General

  • Target

    aa2e16eb340092bab078db3f0d8848606f332a7e052888346b3c47ac37a9de77.doc

  • Size

    132KB

  • MD5

    af25d98ae8d414145376cd8f1a30cc91

  • SHA1

    3564e94e0d449ed7dd5c0013dc11b7efdbd9b13b

  • SHA256

    aa2e16eb340092bab078db3f0d8848606f332a7e052888346b3c47ac37a9de77

  • SHA512

    4e35717e9d242f81244eb4d7809945d6bc36e2655a5a2f8873a062a7be0c2c34e518ad330cf7297306f691a5c4a9215c9162c8e2eed486bb1467a698a5bb0a91

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\aa2e16eb340092bab078db3f0d8848606f332a7e052888346b3c47ac37a9de77.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Enumerates system info in registry
    • Checks processor information in registry
    PID:1612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads