Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
185s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
41f7ff79ac878f5b22abbf08bb4c71ddf016a24c21d1a11e9f12ba4617ad8f01.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
41f7ff79ac878f5b22abbf08bb4c71ddf016a24c21d1a11e9f12ba4617ad8f01.doc
Resource
win10v2004-20220812-en
General
-
Target
41f7ff79ac878f5b22abbf08bb4c71ddf016a24c21d1a11e9f12ba4617ad8f01.doc
-
Size
24KB
-
MD5
2dec39f2c4ffdc979b9c908621eaabda
-
SHA1
b0fe2054d5cb675a8279d1727f20e799d5a10bae
-
SHA256
41f7ff79ac878f5b22abbf08bb4c71ddf016a24c21d1a11e9f12ba4617ad8f01
-
SHA512
227cf45fff406153ac2e95a42edb5f8d90debd67a4a6d0950584647b3cdc41dddea54fb7619939e81f127139f75735f31eec327a941af6e6ffac77be8d9c62ac
-
SSDEEP
192:7fpjSSEkkQdVik9i9FQejNFnRbyGc6rdRBwAEwfG4X/6kjGiRnMh:LNQkayGcSxwAjLX/6kiCM
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4000 WINWORD.EXE 4000 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\41f7ff79ac878f5b22abbf08bb4c71ddf016a24c21d1a11e9f12ba4617ad8f01.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4000