Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
107s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2022, 13:59
Behavioral task
behavioral1
Sample
baddoc.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
baddoc.doc
Resource
win10v2004-20220901-en
General
-
Target
baddoc.doc
-
Size
1.5MB
-
MD5
0c4540f659d3942a28f158bce7be1143
-
SHA1
d1cc0f861f162dfbf9df1493fe861d02b80483f6
-
SHA256
37e259d6564071807b7b4266ed1dd8bf2059f3e7f438b8487dd0149e5e0487ec
-
SHA512
9b611fe0d00cc08bfa72cb7723af64f29b58e4db68d32ca07effa8e90fb7c8fd46a3a48b8b00d1e1dba09b4514bfb3c447ea59da5b4ac90797728cffa03313b0
-
SSDEEP
24576:WcuQXAlhOOZQ3XkaL17MlNuoQPc2V5TBDR4AtPe1LFGZ2KaO+79Gh8B:z53ClNADSDB7A8B
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1056 3972 cmd.exe 81 -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0002000000022dcd-149.dat acprotect behavioral2/files/0x0002000000022dcd-150.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2656 yandex.exe -
Loads dropped DLL 1 IoCs
pid Process 2656 yandex.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YandexDisk = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\yandex.exe" yandex.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3972 WINWORD.EXE 3972 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2656 yandex.exe 2656 yandex.exe 2656 yandex.exe 2656 yandex.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE 3972 WINWORD.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3972 wrote to memory of 1056 3972 WINWORD.EXE 82 PID 3972 wrote to memory of 1056 3972 WINWORD.EXE 82 PID 3972 wrote to memory of 4936 3972 WINWORD.EXE 85 PID 3972 wrote to memory of 4936 3972 WINWORD.EXE 85 PID 1056 wrote to memory of 2656 1056 cmd.exe 84 PID 1056 wrote to memory of 2656 1056 cmd.exe 84 PID 1056 wrote to memory of 2656 1056 cmd.exe 84
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\baddoc.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\yandex.exe2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\yandex.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\yandex.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Microsoft Word Documents.docx" /o ""2⤵PID:4936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
690KB
MD5dfaa28a53310a43031e406ff927a6866
SHA1c694e99f8690114c77a6099856d61a3cd4cd814d
SHA2564a5e9ab0e65e08ceb2adb2d150abb620684e98d79483b6c9f786c56c95fea573
SHA5129a3a958481264b8c3730c018828a498fd1ed8b594df71dff4ad946938ad82d8ebde741e4080d15555c1933bed414500d935491e866c8d445947e1b37877f2f9b
-
Filesize
690KB
MD5dfaa28a53310a43031e406ff927a6866
SHA1c694e99f8690114c77a6099856d61a3cd4cd814d
SHA2564a5e9ab0e65e08ceb2adb2d150abb620684e98d79483b6c9f786c56c95fea573
SHA5129a3a958481264b8c3730c018828a498fd1ed8b594df71dff4ad946938ad82d8ebde741e4080d15555c1933bed414500d935491e866c8d445947e1b37877f2f9b
-
Filesize
361KB
MD589928e2b55c9ee0c021fcb2f1acf3ac0
SHA196810e911124a1ffaf717bc1c06d8dea07d69bf6
SHA2569c0291f1a68009dde56a66d6856eeff15ecbc5bd89460399238b59408d972e0c
SHA512ca334377cb5e8edaea91c30216fc71c0d393f096f42be97d828d217e4d6bdd6fe7bc61542571226518dbf218f1478136863dc0509d8de5986ee7fd355313ae83