Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
6eb4721e57203198ff9c943c3749b06da245830ef90522c91eab0bb4cc4d9cfe.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6eb4721e57203198ff9c943c3749b06da245830ef90522c91eab0bb4cc4d9cfe.doc
Resource
win10v2004-20220812-en
General
-
Target
6eb4721e57203198ff9c943c3749b06da245830ef90522c91eab0bb4cc4d9cfe.doc
-
Size
120KB
-
MD5
9d6fcb38b473cf2fe5ce8a1bc86e1d2b
-
SHA1
a1801710eed66917b08de33b5766f1e259bca2de
-
SHA256
6eb4721e57203198ff9c943c3749b06da245830ef90522c91eab0bb4cc4d9cfe
-
SHA512
73909e021dc7c3b5f3f011c72ec03d91709eed72526334c5ed80d84cff03120164c451cea7c07f749ff073c1ea71d449072dc32e62813327fdee2272ab5ac90c
-
SSDEEP
1536:yhBBdwA///////wvvvvvvvvjZ/H0toLcd5:sBdt///////KU
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4808 WINWORD.EXE 4808 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4808 WINWORD.EXE 4808 WINWORD.EXE 4808 WINWORD.EXE 4808 WINWORD.EXE 4808 WINWORD.EXE 4808 WINWORD.EXE 4808 WINWORD.EXE 4808 WINWORD.EXE 4808 WINWORD.EXE 4808 WINWORD.EXE 4808 WINWORD.EXE 4808 WINWORD.EXE 4808 WINWORD.EXE 4808 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6eb4721e57203198ff9c943c3749b06da245830ef90522c91eab0bb4cc4d9cfe.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4808