Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    126s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 06:00

General

  • Target

    6192b87a032cd70ef066afce058dc03bb4f4dd5cfbe731cb6d478b5cf3525507.doc

  • Size

    43KB

  • MD5

    73b7754d64f6601eb7e3443830c0d470

  • SHA1

    a28cc4624951e69d0da67be003559eab960d712c

  • SHA256

    6192b87a032cd70ef066afce058dc03bb4f4dd5cfbe731cb6d478b5cf3525507

  • SHA512

    f351b7d72e485655d46abbfad9d2d8a7a5c502b49f0a8960e015e323d055de0d9c12afb9987f001eaf47bb0dede228c0b4c2d00a0557a345005a7189c2d241e0

  • SSDEEP

    768:nmK7NqUO2M+6pA+BkSfKVedEx3U7xJrRU5M:mKRa2D+B0eDrq5

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6192b87a032cd70ef066afce058dc03bb4f4dd5cfbe731cb6d478b5cf3525507.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2964-132-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmp

    Filesize

    64KB

  • memory/2964-133-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmp

    Filesize

    64KB

  • memory/2964-134-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmp

    Filesize

    64KB

  • memory/2964-135-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmp

    Filesize

    64KB

  • memory/2964-136-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmp

    Filesize

    64KB

  • memory/2964-137-0x00007FFBC7A10000-0x00007FFBC7A20000-memory.dmp

    Filesize

    64KB

  • memory/2964-138-0x00007FFBC7A10000-0x00007FFBC7A20000-memory.dmp

    Filesize

    64KB

  • memory/2964-140-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmp

    Filesize

    64KB

  • memory/2964-141-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmp

    Filesize

    64KB

  • memory/2964-142-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmp

    Filesize

    64KB

  • memory/2964-143-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmp

    Filesize

    64KB