Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30/11/2022, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
7c4713eddafabe7a1cf608a4dbd647a6767f1f38c3e093efdc534ce408d2e63c.rtf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7c4713eddafabe7a1cf608a4dbd647a6767f1f38c3e093efdc534ce408d2e63c.rtf
Resource
win10v2004-20220901-en
General
-
Target
7c4713eddafabe7a1cf608a4dbd647a6767f1f38c3e093efdc534ce408d2e63c.rtf
-
Size
86KB
-
MD5
01830fe4651a03ab1d6dcb03a542adda
-
SHA1
4d274e74b6ae1269cc130b0ecec86d5578f0377c
-
SHA256
7c4713eddafabe7a1cf608a4dbd647a6767f1f38c3e093efdc534ce408d2e63c
-
SHA512
f0d54dd5f014af6b122237cd66d7fc9eeed7df51913f32f67ac277fd2a912e2eee4d797fe5423586602bbad26e5c32db30f273dec4b156c7b8e2847cd9d72308
-
SSDEEP
1536:UTDfWIALOpI4NIih6ztAgyjfZ/1whG3a0EFN:HIALOpIh/tAgyjftl4
Malware Config
Signatures
-
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 556 1996 DW20.EXE 27 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1996 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1996 WINWORD.EXE 1996 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1996 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1996 WINWORD.EXE 1996 WINWORD.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1996 wrote to memory of 864 1996 WINWORD.EXE 28 PID 1996 wrote to memory of 864 1996 WINWORD.EXE 28 PID 1996 wrote to memory of 864 1996 WINWORD.EXE 28 PID 1996 wrote to memory of 864 1996 WINWORD.EXE 28 PID 1996 wrote to memory of 556 1996 WINWORD.EXE 29 PID 1996 wrote to memory of 556 1996 WINWORD.EXE 29 PID 1996 wrote to memory of 556 1996 WINWORD.EXE 29 PID 1996 wrote to memory of 556 1996 WINWORD.EXE 29 PID 1996 wrote to memory of 556 1996 WINWORD.EXE 29 PID 1996 wrote to memory of 556 1996 WINWORD.EXE 29 PID 1996 wrote to memory of 556 1996 WINWORD.EXE 29 PID 556 wrote to memory of 892 556 DW20.EXE 30 PID 556 wrote to memory of 892 556 DW20.EXE 30 PID 556 wrote to memory of 892 556 DW20.EXE 30 PID 556 wrote to memory of 892 556 DW20.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7c4713eddafabe7a1cf608a4dbd647a6767f1f38c3e093efdc534ce408d2e63c.rtf"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:864
-
-
C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE"C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 9842⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 9843⤵PID:892
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
812B
MD5434f80e26202597981218773e5d468e8
SHA174e651fe8a0bdd80ba341d1e0b5106ed8acaac57
SHA256a06e8d97ec2b3978fbae4ca8bda0d9370d466935a2a419d648aff02446c899bf
SHA512bab6b9fbaa2fc41ac254e4d33416ba73badf22b86c2f59c884fecbacb97eef487d194a7ef579a4442a056d31f56ceaa36204dcc5d0b8e3c448d9a49f3923b4aa