Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2023, 07:17

General

  • Target

    1.docx

  • Size

    26KB

  • MD5

    9320b5d34d4559f196deab4c3158c9c5

  • SHA1

    a66c7ac60592292c59496dc94cbccc8a5d930ee6

  • SHA256

    2f938d0b62b516c050eb00ab1d4673a1951818a0125da6e7e1e451c7f963b2d3

  • SHA512

    c81f11aa762b9431c421a9893247ee4574c594ba541d5701af851182f99a83b12ca5ec9ced72ada67c2033364ec19a22527a21ab640b9bfbeb380cfadcc05abc

  • SSDEEP

    384:hWWgKNfPfxnpkqAaX69uVkgnbe/Sy2z5A2N7tMnkCaN2RhMAQQ78vrxe6a31BmkP:hWWRf3kqjXUZibhpyaN27MAQQ7aeFr

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4356-133-0x00007FFC26EF0000-0x00007FFC26F00000-memory.dmp

    Filesize

    64KB

  • memory/4356-134-0x00007FFC26EF0000-0x00007FFC26F00000-memory.dmp

    Filesize

    64KB

  • memory/4356-135-0x00007FFC26EF0000-0x00007FFC26F00000-memory.dmp

    Filesize

    64KB

  • memory/4356-136-0x00007FFC26EF0000-0x00007FFC26F00000-memory.dmp

    Filesize

    64KB

  • memory/4356-137-0x00007FFC26EF0000-0x00007FFC26F00000-memory.dmp

    Filesize

    64KB

  • memory/4356-138-0x00007FFC247D0000-0x00007FFC247E0000-memory.dmp

    Filesize

    64KB

  • memory/4356-139-0x00007FFC247D0000-0x00007FFC247E0000-memory.dmp

    Filesize

    64KB

  • memory/4356-143-0x000002B068150000-0x000002B0681B6000-memory.dmp

    Filesize

    408KB

  • memory/4356-144-0x000002B04FE70000-0x000002B04FE78000-memory.dmp

    Filesize

    32KB

  • memory/4356-145-0x000002B050030000-0x000002B050048000-memory.dmp

    Filesize

    96KB

  • memory/4356-146-0x000002B0680C0000-0x000002B0680F6000-memory.dmp

    Filesize

    216KB

  • memory/4356-147-0x000002B068100000-0x000002B068134000-memory.dmp

    Filesize

    208KB

  • memory/4356-148-0x000002B068140000-0x000002B068150000-memory.dmp

    Filesize

    64KB

  • memory/4356-149-0x000002B068140000-0x000002B068150000-memory.dmp

    Filesize

    64KB

  • memory/4356-150-0x000002B041080000-0x000002B041081000-memory.dmp

    Filesize

    4KB

  • memory/4356-157-0x000002B068140000-0x000002B068150000-memory.dmp

    Filesize

    64KB

  • memory/4356-158-0x000002B068140000-0x000002B068150000-memory.dmp

    Filesize

    64KB

  • memory/4356-159-0x000002B041080000-0x000002B041081000-memory.dmp

    Filesize

    4KB

  • memory/4356-182-0x00007FFC26EF0000-0x00007FFC26F00000-memory.dmp

    Filesize

    64KB

  • memory/4356-183-0x00007FFC26EF0000-0x00007FFC26F00000-memory.dmp

    Filesize

    64KB

  • memory/4356-184-0x00007FFC26EF0000-0x00007FFC26F00000-memory.dmp

    Filesize

    64KB

  • memory/4356-185-0x00007FFC26EF0000-0x00007FFC26F00000-memory.dmp

    Filesize

    64KB