Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 08:45 UTC

General

  • Target

    26fc7a7b6961db8a65069fb0fea5917aacc90a0c55df18742684556f0420eb31.doc

  • Size

    39KB

  • MD5

    c785391d6358b90130ac80605fc6486a

  • SHA1

    2fce6e9635a363a53b15198606c031e9b27fb5a7

  • SHA256

    26fc7a7b6961db8a65069fb0fea5917aacc90a0c55df18742684556f0420eb31

  • SHA512

    2825e8a532cf7e33efe9b90d0251c835b2b5a922e1f82dbc28b90736b1fef92d078ee8a39265dd51323ecf9a4f230985ab98182eac877104ac3a1e8da4fbeb82

  • SSDEEP

    192:+YAM8uZQ7+52Ll5id3RZbOo+xSkT7pX0jrZ9htenNa4ja:A5LGrs7pX0jrtt+Na

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\26fc7a7b6961db8a65069fb0fea5917aacc90a0c55df18742684556f0420eb31.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1592

Network

    No results found
  • 93.184.221.240:80
    260 B
    5
  • 93.184.221.240:80
    260 B
    5
  • 93.184.220.29:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 104.80.225.205:443
    322 B
    7
  • 13.69.239.73:443
    322 B
    7
  • 93.184.220.29:80
    WINWORD.EXE
    260 B
    5
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1592-132-0x00007FF873990000-0x00007FF8739A0000-memory.dmp

    Filesize

    64KB

  • memory/1592-134-0x00007FF873990000-0x00007FF8739A0000-memory.dmp

    Filesize

    64KB

  • memory/1592-133-0x00007FF873990000-0x00007FF8739A0000-memory.dmp

    Filesize

    64KB

  • memory/1592-135-0x00007FF873990000-0x00007FF8739A0000-memory.dmp

    Filesize

    64KB

  • memory/1592-136-0x00007FF873990000-0x00007FF8739A0000-memory.dmp

    Filesize

    64KB

  • memory/1592-137-0x00007FF871810000-0x00007FF871820000-memory.dmp

    Filesize

    64KB

  • memory/1592-138-0x00007FF871810000-0x00007FF871820000-memory.dmp

    Filesize

    64KB

  • memory/1592-140-0x00007FF873990000-0x00007FF8739A0000-memory.dmp

    Filesize

    64KB

  • memory/1592-143-0x00007FF873990000-0x00007FF8739A0000-memory.dmp

    Filesize

    64KB

  • memory/1592-142-0x00007FF873990000-0x00007FF8739A0000-memory.dmp

    Filesize

    64KB

  • memory/1592-141-0x00007FF873990000-0x00007FF8739A0000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.