Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    114s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2022, 03:04 UTC

General

  • Target

    d9e010208052f83ed111ca2619a89a9cee3af63dd96dcb317c2534bd5c5b304a.docx

  • Size

    68KB

  • MD5

    b34a1c8af20f5f22588bce05b583273f

  • SHA1

    df73957c1aebf2af3215c58fe71c6e2e598bdaea

  • SHA256

    d9e010208052f83ed111ca2619a89a9cee3af63dd96dcb317c2534bd5c5b304a

  • SHA512

    4169934b356f8c890f9d38224c90956ac36c6c353d15e147d3030b993270d454844a9f0d8b3fa8e9912ec08920c27946545b05a8347bcedbbb495bf5872ab3fe

  • SSDEEP

    1536:PFrmmDJDYqKAc7ngMh8Ztgotu58oMMcNEeQO:PFrmmDJGAc8C8ZGeoMMcuY

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d9e010208052f83ed111ca2619a89a9cee3af63dd96dcb317c2534bd5c5b304a.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1152

Network

    No results found
  • 13.69.239.72:443
    322 B
    7
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1152-132-0x00007FF9E3F10000-0x00007FF9E3F20000-memory.dmp

    Filesize

    64KB

  • memory/1152-133-0x00007FF9E3F10000-0x00007FF9E3F20000-memory.dmp

    Filesize

    64KB

  • memory/1152-134-0x00007FF9E3F10000-0x00007FF9E3F20000-memory.dmp

    Filesize

    64KB

  • memory/1152-135-0x00007FF9E3F10000-0x00007FF9E3F20000-memory.dmp

    Filesize

    64KB

  • memory/1152-136-0x00007FF9E3F10000-0x00007FF9E3F20000-memory.dmp

    Filesize

    64KB

  • memory/1152-137-0x00007FF9E17C0000-0x00007FF9E17D0000-memory.dmp

    Filesize

    64KB

  • memory/1152-138-0x00007FF9E17C0000-0x00007FF9E17D0000-memory.dmp

    Filesize

    64KB

  • memory/1152-140-0x00007FF9E3F10000-0x00007FF9E3F20000-memory.dmp

    Filesize

    64KB

  • memory/1152-141-0x00007FF9E3F10000-0x00007FF9E3F20000-memory.dmp

    Filesize

    64KB

  • memory/1152-142-0x00007FF9E3F10000-0x00007FF9E3F20000-memory.dmp

    Filesize

    64KB

  • memory/1152-143-0x00007FF9E3F10000-0x00007FF9E3F20000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.