Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2022, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
3da3b0415d4a7058ca71a0019d8dfaf321737bc434ae84abfc9da38da6c50729.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3da3b0415d4a7058ca71a0019d8dfaf321737bc434ae84abfc9da38da6c50729.doc
Resource
win10v2004-20220812-en
General
-
Target
3da3b0415d4a7058ca71a0019d8dfaf321737bc434ae84abfc9da38da6c50729.doc
-
Size
62KB
-
MD5
14b4ca9a9dafd0d31926700c175f4a71
-
SHA1
82e4189cf592399f6c9b38b7572d7f8d2721faf2
-
SHA256
3da3b0415d4a7058ca71a0019d8dfaf321737bc434ae84abfc9da38da6c50729
-
SHA512
2011252ee2914a2f146ba2d56f2aeb5a689430394585d884f601f3f0333e8360b8ca83524182512de6ef60469de94ef012a8023b71a13148b167a443c3250388
-
SSDEEP
384:hW0uNppVyPs7FFyGcSquRkxb2sx5gUboos0SXpF4ojoaPbogWwioIjjQK4JJ4kON:hW0FPs7F+uqbdx5gBUVf
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1056 WINWORD.EXE 1056 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE 1056 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3da3b0415d4a7058ca71a0019d8dfaf321737bc434ae84abfc9da38da6c50729.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1056