Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 18:21 UTC

General

  • Target

    9bed8f0aac7ac7f58b0a50eda8d7fbf3d7fb281a4f78b11f79222bc9894a9ef7.doc

  • Size

    27KB

  • MD5

    c39e8b59f34c1546001fcef68cd6802c

  • SHA1

    92b10f0a1c505a6ee54e26019a56af6e1b65575b

  • SHA256

    9bed8f0aac7ac7f58b0a50eda8d7fbf3d7fb281a4f78b11f79222bc9894a9ef7

  • SHA512

    6192be9feb3337083a5022c2ac682fb17aa3569ba3d488e91ea91c912bc88e5fa47a1be12e9793e3b1479c80605d6b86ec9328b6c7b28c88a2c6854bba6fd431

  • SSDEEP

    192:sl6agKoUuPUfoe+mP1fTZTtx2Xwadn7u9aXl:sl6agLUQeT9bowaEUX

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9bed8f0aac7ac7f58b0a50eda8d7fbf3d7fb281a4f78b11f79222bc9894a9ef7.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:984

Network

    No results found
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 104.80.225.205:443
    322 B
    7
  • 40.79.150.121:443
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 93.184.220.29:80
    322 B
    7
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/984-132-0x00007FFEADD50000-0x00007FFEADD60000-memory.dmp

    Filesize

    64KB

  • memory/984-133-0x00007FFEADD50000-0x00007FFEADD60000-memory.dmp

    Filesize

    64KB

  • memory/984-134-0x00007FFEADD50000-0x00007FFEADD60000-memory.dmp

    Filesize

    64KB

  • memory/984-135-0x00007FFEADD50000-0x00007FFEADD60000-memory.dmp

    Filesize

    64KB

  • memory/984-136-0x00007FFEADD50000-0x00007FFEADD60000-memory.dmp

    Filesize

    64KB

  • memory/984-137-0x00007FFEAB800000-0x00007FFEAB810000-memory.dmp

    Filesize

    64KB

  • memory/984-138-0x00007FFEAB800000-0x00007FFEAB810000-memory.dmp

    Filesize

    64KB

  • memory/984-140-0x00007FFEADD50000-0x00007FFEADD60000-memory.dmp

    Filesize

    64KB

  • memory/984-142-0x00007FFEADD50000-0x00007FFEADD60000-memory.dmp

    Filesize

    64KB

  • memory/984-141-0x00007FFEADD50000-0x00007FFEADD60000-memory.dmp

    Filesize

    64KB

  • memory/984-143-0x00007FFEADD50000-0x00007FFEADD60000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.