Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
106s -
max time network
77s -
platform
windows7_x64 -
resource
win7 -
submitted
11/07/2020, 07:17
Static task
static1
Behavioral task
behavioral1
Sample
docs-07.20.doc
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
docs-07.20.doc
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
docs-07.20.doc
-
Size
147KB
-
MD5
7dd79ba56b7ec464e9b515d900f3f569
-
SHA1
6c2bf5092ce30405ee4b7a349d9fe533045c6b4a
-
SHA256
ca822b28a868bb52c0e59bf09093cf38dedb0a09c82718d3979980f13c02d1b9
-
SHA512
b0974074f16bd77a59d4d36faa671998eb245d43e4ac966a4eeea53840b03385cdba5ec5780829fcd85d4360743c4429e1d55d2aeae3cbb52786ea8ff9afe494
Score
10/10
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1068 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE 1068 WINWORD.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1100 1068 regsvr32.exe 23 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1068 wrote to memory of 1100 1068 WINWORD.EXE 26 PID 1068 wrote to memory of 1100 1068 WINWORD.EXE 26 PID 1068 wrote to memory of 1100 1068 WINWORD.EXE 26 PID 1068 wrote to memory of 1100 1068 WINWORD.EXE 26 PID 1068 wrote to memory of 1100 1068 WINWORD.EXE 26 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1100 regsvr32.exe -
Office loads VBA resources, possible macro or embedded object present
Processes
-
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\docs-07.20.doc"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" kG.tmp2⤵
- Process spawned unexpected child process
- Suspicious behavior: GetForegroundWindowSpam
PID:1100
-