Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    491s
  • max time network
    495s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2022, 13:08 UTC

General

  • Target

    sept_orderlist.rtf

  • Size

    12KB

  • MD5

    c57544bbe3a0de2e2ee7aaa6052c6b70

  • SHA1

    aa10cf5ef9aa7fad16765af1b20413f38dae6a7a

  • SHA256

    1eac4b6a8d54ad0b0deb85eab520d4893e2c0a36879a04334b718299774eb5e2

  • SHA512

    0dcd0e37a7a92310f9ec33de5931d1843b95c373f729accace9b75792d350235628abbd67f022e52d0248451eea709c223f7b2094a99bfcc1a440ff5b6b6086f

  • SSDEEP

    192:XTppDiy6rYypivuzznBWVEsEH+b15Ry7x/X62pbv0ry:XTWyqYykvuBqvs+TsF/Dtv0m

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\sept_orderlist.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2168

Network

    No results found
  • 209.197.3.8:80
    322 B
    7
  • 2.18.109.224:443
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2168-132-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

    Filesize

    64KB

  • memory/2168-133-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

    Filesize

    64KB

  • memory/2168-134-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

    Filesize

    64KB

  • memory/2168-135-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

    Filesize

    64KB

  • memory/2168-136-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

    Filesize

    64KB

  • memory/2168-137-0x00007FFA93F80000-0x00007FFA93F90000-memory.dmp

    Filesize

    64KB

  • memory/2168-138-0x00007FFA93F80000-0x00007FFA93F90000-memory.dmp

    Filesize

    64KB

  • memory/2168-140-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

    Filesize

    64KB

  • memory/2168-141-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

    Filesize

    64KB

  • memory/2168-142-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

    Filesize

    64KB

  • memory/2168-143-0x00007FFA96690000-0x00007FFA966A0000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.