Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2023, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
Предложение.docx
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Предложение.docx
Resource
win10v2004-20221111-en
General
-
Target
Предложение.docx
-
Size
18KB
-
MD5
57a23e05b72ea00da175108aa8085944
-
SHA1
9ed76cacaf65819c6b71b12e95b7dd57ca14c945
-
SHA256
2f46d8f3194a5f5ecfb7147e55791a469bcf265671e86180f853576bdea98194
-
SHA512
56f91548e0aae724d7ce82555d130446395d0f015c04939e347331dccffb134ac9a026351247cc537645f55a31aae6d4a88e7f1fb8419dac418dedd648f227d8
-
SSDEEP
384:TDCXYyU1AI3LobzRQII/eJ7cUeyRA3KRJbb0yodosGLDinU:TtyUaI3LIQeJ4U7JtowAU
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4956 5108 msedge.exe 79 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\1f4ab0f0-b1b4-4a91-9c2d-a78f2d56ac1c.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230110113835.pma setup.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5108 WINWORD.EXE 5108 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4956 msedge.exe 4956 msedge.exe 512 identity_helper.exe 512 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5108 wrote to memory of 4956 5108 WINWORD.EXE 92 PID 5108 wrote to memory of 4956 5108 WINWORD.EXE 92 PID 4956 wrote to memory of 4740 4956 msedge.exe 94 PID 4956 wrote to memory of 4740 4956 msedge.exe 94 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 1300 4956 msedge.exe 95 PID 4956 wrote to memory of 4856 4956 msedge.exe 96 PID 4956 wrote to memory of 4856 4956 msedge.exe 96 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97 PID 4956 wrote to memory of 4996 4956 msedge.exe 97
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Предложение.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go.microsoft.com/fwlink/?LinkId=6149812⤵
- Process spawned unexpected child process
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc681c46f8,0x7ffc681c4708,0x7ffc681c47183⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:23⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:83⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:13⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:13⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4904 /prefetch:83⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:13⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:13⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:13⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5456 /prefetch:83⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3624 /prefetch:83⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:4500 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x280,0x284,0x288,0x25c,0x28c,0x7ff77b525460,0x7ff77b525470,0x7ff77b5254804⤵PID:4300
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3624 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:13⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3211529689879377140,3138168338636840218,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:13⤵PID:772
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize471B
MD53796e48d3eda17b77a6b505fd5f71e15
SHA112dcc7f17c3eab5bdc1aa5271652495f4d31d862
SHA256dabad35943a9732c321aea6ca02cd38b644a06e64ab12a478a543c4171465e33
SHA51274c401bd5524c22fb9cedd931c17a3856da76a5c79e5e879ba0f097b1bf4295c98cad20e7b746fb8524ba4ccc35ebaeb12f67cefd0efe1ea66c629fdf3f7e6bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize446B
MD5ebe6bb78705af4fc6b61572c7194bed2
SHA17114fab32bcba2d44f626a61b9950dba8e65cbd6
SHA2561954e85743ae6610358864b3ed707dd20b5da446599ba82a9d446c1e53fce86c
SHA512a66973cd06b871994d59c07fa498edd8e8dfd7d28c3b3da083d85f1fad368380c6ff7cf7a80347b20a974aff41a4f63b23687e8b7d3c5f28c68d99005d66f673