Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
22s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08/03/2023, 01:53
Behavioral task
behavioral1
Sample
2023-03-08_1035.doc
Resource
win7-20230220-en
General
-
Target
2023-03-08_1035.doc
-
Size
517.3MB
-
MD5
bcae0aca1a3b2df9d5e85de2ed3666e9
-
SHA1
f56c3b72b7e8c55b9685e35765553fafbbb08e2b
-
SHA256
5a092b0034f937f68ad7e5679ed840039fb824df8cad8f74b890cb7f4e42f0cd
-
SHA512
4162200952e62402a6085ae5f1342a5b35d59f52a5ddf54d9eea3d318f62df9ca308cfc3e079cca484ab38af1ed17fa68fe9ad0c9541ff483aa3de20fff44afa
-
SSDEEP
6144:xPn4VZXbatu7MDogsDkHS50LdfcGcbz1f5M9KTFrMpSlMK3Ru+Q28:xP4PbNMkgg3Ru+x
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1328 1268 regsvr32.exe 25 -
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1268 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1268 WINWORD.EXE 1268 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1268 WINWORD.EXE 1268 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2023-03-08_1035.doc"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1268 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\015422.tmp"2⤵
- Process spawned unexpected child process
PID:1328 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\015422.tmp"3⤵PID:1776
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\THfxnKOtUyOumn\uyXn.dll"4⤵PID:1796
-
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212.8MB
MD597bb8d571410e5cf7fb504d09b08ff94
SHA1aa0970c70df4bec9fb8413562f0eed033b36af53
SHA256cf0b1b9249f86b30a2ee125569f2c2656c609a3c3691be2912aace3722d4f762
SHA512515ab73283a658a263283de8a4038560206d93983d2a2ab05664e9a1767e05af264ae05f047418f9614cf0668e970b6080a5b8b66e1c3aed2c7a39525032299a
-
Filesize
875KB
MD5ec0b4c8e920c852946a0d690ee2cd586
SHA1cb41f39dbe450baf40f9fbb4b1ec4e0607f1ae5a
SHA25680149f6492b1d711bd03b600f2199f7a3db402acf72f4b48afd7dfe04fe5e57b
SHA5120a60f530f26dc279f24f0a4792407f0055173a55cc6cec30ed49a3212a931cd36ebc38ad5da5cc00af53f41c8023ea3140d5c5c1c29fd1451457814e8f8f51a6
-
Filesize
20KB
MD56ad6dc8b9f6b5a835cf9fa401501074b
SHA15d5876823c86eebe92b45aae62adc990ef3c519d
SHA2560fe0a0d880ff7ff7ff8452e8572c935aa3449b52ac91967fdf90e6a01f1e009c
SHA512e84201fcf6c48b85a4085a98b9b1c2c78e991d3ef0d4308e4c36d5c8f1cadfb1c2078885b3a409fdd7ea5a4852b9f264f1b8f343eb216b062388d569f9bcabd2
-
Filesize
210.3MB
MD52495d3979b46b0c508f1dbbeb9dedcbe
SHA1d2ac76f7c5250fc45c9d6a51d2c821768caf8ec7
SHA256311c2590931f98269bc8e221d11464495bdc649e16f46842eca734fed3b14265
SHA512d3e836060c4d9eae13dd06412d2cb13a0b201326ced3ecd086fe6dfa4ef2614967a1bf231794567ff5607b301b5ea66a51c34bb9d2afef123dbe1e8945cb5011
-
Filesize
213.2MB
MD5a093e4d996f85748947f6864e7a67e89
SHA1883b8e083aeeb75c28372ff770a0236da1bbd8d2
SHA2567c056f21a5b99031e673cc07ce62f694d1bc7ccf7423810eb8ae9199c2aca5de
SHA512f2b74522540c1b2808966cdb5eed772be824f0827dbcde4bd74816aee47f6da0b2acc95f69ac78b4cc424acf2efdbd24769beaf0f77f54a80d75e7bf211aba1c