Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 17:17
Behavioral task
behavioral1
Sample
d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe
Resource
win10v2004-20220812-en
General
-
Target
d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe
-
Size
81KB
-
MD5
db677cc452379b31ab4242eb67e3c5d3
-
SHA1
43d4d9cc6839c4a29024e016fa0cdbb2e560ce13
-
SHA256
d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497
-
SHA512
8e1770f848a834ebdb334500d4944c157db69d40805e1477530e1be92f451021f3133b9c1d53aa01fb1c0e37a932ced4542e7ff3d6019a219ead1fa1299dd630
-
SSDEEP
1536:6mi+xxdgF45E4h2Hnq8OFnouy8CBZVDYTwtaRdoYVJ42e:6mi+/dgy5Ef8doutaZZYCajVJ4
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3932 osk.exe 3164 WINWORD.EXE 4088 WINWORD.EXE -
resource yara_rule behavioral2/memory/3188-134-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral2/files/0x0006000000022de5-137.dat upx behavioral2/files/0x0006000000022de5-138.dat upx behavioral2/memory/3188-139-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral2/memory/3932-143-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral2/files/0x0007000000022de6-145.dat upx behavioral2/memory/3932-146-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral2/files/0x0007000000022de6-147.dat upx behavioral2/memory/3164-150-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral2/files/0x0006000000022de7-151.dat upx behavioral2/memory/3164-162-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral2/files/0x0007000000022de6-160.dat upx behavioral2/memory/4088-164-0x0000000011000000-0x000000001102F000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WINWORD.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation osk.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AUTOWORD = "C:\\Windows\\system32\\WINWORD.EXE" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ctfmoon.exe = "C:\\Windows\\system32\\Com\\ctfmoon.exe" WINWORD.EXE -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: WINWORD.EXE File opened (read-only) \??\K: WINWORD.EXE File opened (read-only) \??\O: WINWORD.EXE File opened (read-only) \??\R: WINWORD.EXE File opened (read-only) \??\V: WINWORD.EXE File opened (read-only) \??\B: WINWORD.EXE File opened (read-only) \??\E: WINWORD.EXE File opened (read-only) \??\F: WINWORD.EXE File opened (read-only) \??\Y: WINWORD.EXE File opened (read-only) \??\Z: WINWORD.EXE File opened (read-only) \??\U: WINWORD.EXE File opened (read-only) \??\W: WINWORD.EXE File opened (read-only) \??\X: WINWORD.EXE File opened (read-only) \??\P: WINWORD.EXE File opened (read-only) \??\T: WINWORD.EXE File opened (read-only) \??\J: WINWORD.EXE File opened (read-only) \??\L: WINWORD.EXE File opened (read-only) \??\M: WINWORD.EXE File opened (read-only) \??\Q: WINWORD.EXE File opened (read-only) \??\S: WINWORD.EXE File opened (read-only) \??\H: WINWORD.EXE File opened (read-only) \??\I: WINWORD.EXE File opened (read-only) \??\N: WINWORD.EXE -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Com\ctfmoon.exe osk.exe File opened for modification C:\Windows\SysWOW64\WINWORD.exe WINWORD.EXE File opened for modification C:\Windows\SysWOW64\Com\ctfmoon.exe WINWORD.EXE File opened for modification C:\Windows\SysWOW64\ConvertToExport.enc WINWORD.EXE File opened for modification C:\Windows\SysWOW64\Recently.enc WINWORD.EXE File opened for modification C:\Windows\SysWOW64\These.enc WINWORD.EXE File opened for modification C:\Windows\SysWOW64\WINWORD.EXE osk.exe File opened for modification C:\Windows\SysWOW64\WINWORD.EXE WINWORD.EXE File opened for modification C:\Windows\SysWOW64\Are.enc WINWORD.EXE File opened for modification C:\Windows\SysWOW64\Files.enc WINWORD.EXE File opened for modification C:\Windows\SysWOW64\Opened.enc WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1960 WINWORD.EXE 1960 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3932 osk.exe 3932 osk.exe 3932 osk.exe 3932 osk.exe 3164 WINWORD.EXE 3164 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3188 d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe 3932 osk.exe 3164 WINWORD.EXE 1960 WINWORD.EXE 1960 WINWORD.EXE 4088 WINWORD.EXE 1960 WINWORD.EXE 1960 WINWORD.EXE 1960 WINWORD.EXE 1960 WINWORD.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3188 wrote to memory of 1960 3188 d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe 79 PID 3188 wrote to memory of 1960 3188 d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe 79 PID 3188 wrote to memory of 3932 3188 d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe 80 PID 3188 wrote to memory of 3932 3188 d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe 80 PID 3188 wrote to memory of 3932 3188 d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe 80 PID 3932 wrote to memory of 3164 3932 osk.exe 81 PID 3932 wrote to memory of 3164 3932 osk.exe 81 PID 3932 wrote to memory of 3164 3932 osk.exe 81 PID 3164 wrote to memory of 4088 3164 WINWORD.EXE 83 PID 3164 wrote to memory of 4088 3164 WINWORD.EXE 83 PID 3164 wrote to memory of 4088 3164 WINWORD.EXE 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe"C:\Users\Admin\AppData\Local\Temp\d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\Temp\_$Cf\d670df86f585fadc670d23efe592cf48dce1a3870f63743cb8430fd9cdc45497 .doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
C:\Windows\Temp\_$Cf\osk.exe"C:\Windows\Temp\_$Cf\osk.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\WINWORD.EXE"C:\Windows\system32\WINWORD.EXE"3⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\WINWORD.EXE"C:\Windows\system32\WINWORD.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4088
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5862a96836fe55f230039047fc1897b6f
SHA156a56c039d90714cefe7d2e7bb02e13c2b04764c
SHA2560044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21
SHA512d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574
-
Filesize
74KB
MD5862a96836fe55f230039047fc1897b6f
SHA156a56c039d90714cefe7d2e7bb02e13c2b04764c
SHA2560044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21
SHA512d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574
-
Filesize
74KB
MD5862a96836fe55f230039047fc1897b6f
SHA156a56c039d90714cefe7d2e7bb02e13c2b04764c
SHA2560044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21
SHA512d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574
-
Filesize
74KB
MD5862a96836fe55f230039047fc1897b6f
SHA156a56c039d90714cefe7d2e7bb02e13c2b04764c
SHA2560044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21
SHA512d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574
-
Filesize
24KB
MD5077d942e2b948d8e7c60303969b5d1f5
SHA15ab2797a829ddd70646f1cbd84c983839f4a76cd
SHA256ba90e1651eeceeb4b5848694dda44fe936526b3b30f8344f24b798f25be7f6ca
SHA51249772fccbe3ecf06d625baf91ce68f49d7e21316086d8c6cec2c330e5a75d40cf0da5ed755d470f899f56ac37a0fd40a3a0f4968a84297d972a3025c30a25ba9
-
Filesize
74KB
MD5862a96836fe55f230039047fc1897b6f
SHA156a56c039d90714cefe7d2e7bb02e13c2b04764c
SHA2560044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21
SHA512d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574
-
Filesize
74KB
MD5862a96836fe55f230039047fc1897b6f
SHA156a56c039d90714cefe7d2e7bb02e13c2b04764c
SHA2560044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21
SHA512d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574