Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/04/2023, 07:17

General

  • Target

    1.docx

  • Size

    26KB

  • MD5

    9320b5d34d4559f196deab4c3158c9c5

  • SHA1

    a66c7ac60592292c59496dc94cbccc8a5d930ee6

  • SHA256

    2f938d0b62b516c050eb00ab1d4673a1951818a0125da6e7e1e451c7f963b2d3

  • SHA512

    c81f11aa762b9431c421a9893247ee4574c594ba541d5701af851182f99a83b12ca5ec9ced72ada67c2033364ec19a22527a21ab640b9bfbeb380cfadcc05abc

  • SSDEEP

    384:hWWgKNfPfxnpkqAaX69uVkgnbe/Sy2z5A2N7tMnkCaN2RhMAQQ78vrxe6a31BmkP:hWWRf3kqjXUZibhpyaN27MAQQ7aeFr

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3748-121-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp

    Filesize

    64KB

  • memory/3748-122-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp

    Filesize

    64KB

  • memory/3748-123-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp

    Filesize

    64KB

  • memory/3748-124-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp

    Filesize

    64KB

  • memory/3748-127-0x00007FFCFEF60000-0x00007FFCFEF70000-memory.dmp

    Filesize

    64KB

  • memory/3748-128-0x00007FFCFEF60000-0x00007FFCFEF70000-memory.dmp

    Filesize

    64KB

  • memory/3748-286-0x00000265EB8B0000-0x00000265EB916000-memory.dmp

    Filesize

    408KB

  • memory/3748-287-0x00000265EB5E0000-0x00000265EB5E8000-memory.dmp

    Filesize

    32KB

  • memory/3748-288-0x00000265EB690000-0x00000265EB6A8000-memory.dmp

    Filesize

    96KB

  • memory/3748-289-0x00000265EB810000-0x00000265EB846000-memory.dmp

    Filesize

    216KB

  • memory/3748-290-0x00000265EB850000-0x00000265EB884000-memory.dmp

    Filesize

    208KB

  • memory/3748-300-0x00000265EB5D0000-0x00000265EB5E0000-memory.dmp

    Filesize

    64KB

  • memory/3748-301-0x00000265EB5D0000-0x00000265EB5E0000-memory.dmp

    Filesize

    64KB

  • memory/3748-302-0x00000265EB5D0000-0x00000265EB5E0000-memory.dmp

    Filesize

    64KB

  • memory/3748-317-0x00000265DD9C0000-0x00000265DD9C1000-memory.dmp

    Filesize

    4KB

  • memory/3748-335-0x00000265EB5D0000-0x00000265EB5E0000-memory.dmp

    Filesize

    64KB

  • memory/3748-337-0x00000265EB5D0000-0x00000265EB5E0000-memory.dmp

    Filesize

    64KB

  • memory/3748-336-0x00000265EB5D0000-0x00000265EB5E0000-memory.dmp

    Filesize

    64KB

  • memory/3748-434-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp

    Filesize

    64KB

  • memory/3748-435-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp

    Filesize

    64KB

  • memory/3748-436-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp

    Filesize

    64KB

  • memory/3748-437-0x00007FFD01F10000-0x00007FFD01F20000-memory.dmp

    Filesize

    64KB