Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
PUV026949243199756981_202303161748.one
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PUV026949243199756981_202303161748.one
Resource
win10v2004-20230220-en
General
-
Target
PUV026949243199756981_202303161748.one
-
Size
117KB
-
MD5
2a2838479f4c027058d2cde2b832e43f
-
SHA1
123b653a8eaa39fe9c499c87006572aebc7260cd
-
SHA256
73003836c1f59ddad6a3413ab4696e8eef12c3e6990284fe363b5267a19487ea
-
SHA512
7071f39e3c57c72b6d2b0285fa00868dda072a0580c7348a03564f4a6fbb3cd9459c0a1967f3b70a124f1252f21b31a095fc23fe4a0e8b08b9bfc6f290c23490
-
SSDEEP
1536:RDBoTVdaeNtuXndCrJJmT4HVnteV4FrdMiYcx7bfCb6HPdnXF:1BoC+tCYvSMVnte8ZP1Y6J1
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1468 ONENOTE.EXE 1468 ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1468 ONENOTE.EXE 1468 ONENOTE.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1468 ONENOTE.EXE 1468 ONENOTE.EXE 1468 ONENOTE.EXE 1468 ONENOTE.EXE 1468 ONENOTE.EXE 1468 ONENOTE.EXE 1468 ONENOTE.EXE 1468 ONENOTE.EXE 1468 ONENOTE.EXE 1468 ONENOTE.EXE 1468 ONENOTE.EXE 1468 ONENOTE.EXE 1468 ONENOTE.EXE 1468 ONENOTE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE"C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE" "C:\Users\Admin\AppData\Local\Temp\PUV026949243199756981_202303161748.one"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5ae25f2104967b2708ac9dba80aac52fd
SHA17ac0150b43cbb5eeba9a0f956e1291df6790f3bf
SHA25611b3d1564b12934489281250c9a683f076fe10254bfdd7da72307e538838ec56
SHA512d4a7f95631e7eb88fdadbe66d31bf9c7459d0f80ca2c9174952aad42bff6262241b25916e6a089f778990be981a2cf220baa69ad261314247c286397553decca
-
Filesize
567B
MD5d055ce625528e448c61315eaaef5bb71
SHA1029df4c872b1c154f32e7fe94f434547c3ba6192
SHA25685bf1e672b4e86e9af0c7874681ec9620dfdc78e0335b83eef38c17d813b6705
SHA512705b6b729e967fa946469571109aa892f5cb55a01c74d40ae02140d10cbf9b65dd5e511c06ebfe494e407742f8c6f4fbbe88664b78b37abfb2f19db1f66f4247
-
Filesize
48KB
MD5b7fc313714edd7866f4c76527282c2b5
SHA1c86217b46956933fae4a30483a63b33f34b8c503
SHA256b6d25f5eb52d5c24ef6c325bd25f18e413f3e23d20413a3693749275ba4b192c
SHA512038a73b7a69dd976c964f1538f5b4f7c6c64721e4f2f1a831815598faae84cac53305c03f5cea6e66acdc110a9a5117eee191345ea004b9576c752122f8d88f7