Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
16/07/2020, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
test.doc
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
test.doc
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
test.doc
-
Size
80KB
-
MD5
b9c9f235d8a2ac7644e3c2c5c3a4d6d8
-
SHA1
0906b737d3aaaff0c4c941625e3487e0864742b2
-
SHA256
1cb15aebd509985de8a7792a474660cdecf8ab1cb008b86abcb3b5971b7a4480
-
SHA512
3064c598dc95ac4bc0d270e7ccb4d050f79de436fe29352e7dc364cb26275acdc09a68cacbe4f5b9c8bc0fc044b7987ab4b85abad542ab562ea82f90e6e4f768
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE 1628 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1628 WINWORD.EXE 1628 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 1628 WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\test.doc" /o ""1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Checks processor information in registry
- Enumerates system info in registry
PID:1628