Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
b11b51ff96dc7a5f1cf9985087a6ad4f66980a2b2a9b1945acd43e39434c8dec.one
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b11b51ff96dc7a5f1cf9985087a6ad4f66980a2b2a9b1945acd43e39434c8dec.one
Resource
win10v2004-20230220-en
General
-
Target
b11b51ff96dc7a5f1cf9985087a6ad4f66980a2b2a9b1945acd43e39434c8dec.one
-
Size
203KB
-
MD5
058978e5a0620ea2acec6da70c93683f
-
SHA1
7f3bb69b17787470e01d4081104ac5ad012a0cde
-
SHA256
b11b51ff96dc7a5f1cf9985087a6ad4f66980a2b2a9b1945acd43e39434c8dec
-
SHA512
9f541872159512804adcc601391de4f05f2abc067a465f21fd8d9bb8eeba41f8e85f31a1d0e32600b23760f9dadd8530908e9b775c9ee8aee71119335b4bf69a
-
SSDEEP
3072:NqVr2RTVYk0bjRtZLlnm6Gdk8vZQfjO8KifQ6vfegRI8mlgJJ4u6A0FzfghYTffD:cARiltZITy8ufjLQsBUlgeMYDhZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3152 ONENOTE.EXE 3152 ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3152 ONENOTE.EXE 3152 ONENOTE.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3152 ONENOTE.EXE 3152 ONENOTE.EXE 3152 ONENOTE.EXE 3152 ONENOTE.EXE 3152 ONENOTE.EXE 3152 ONENOTE.EXE 3152 ONENOTE.EXE 3152 ONENOTE.EXE 3152 ONENOTE.EXE 3152 ONENOTE.EXE 3152 ONENOTE.EXE 3152 ONENOTE.EXE 3152 ONENOTE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE"C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE" "C:\Users\Admin\AppData\Local\Temp\b11b51ff96dc7a5f1cf9985087a6ad4f66980a2b2a9b1945acd43e39434c8dec.one"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD539030c475ba311552e78174ba337615b
SHA1f2e37ac347c896feea522c5f3704542ca8f0f02e
SHA2566cdcf077660b980478c33bdc9870262f3e3e83daeef0729d36a65f18ed58423c
SHA512d66586a111f61166cceef805944f9f9d57ecf8e75d722703d81340b248cb5ed51798b83f4f93853a15464910981d8bf4194f62aca12afa27a929113ebc3538ef
-
Filesize
182KB
MD5df4da1ecd4c50871a1c4315f571e4402
SHA11dbbe9b3784cf5ecdd08b27132a7e31588954865
SHA2569800bef9d4936ee96d4872fb686121dd7209f8b529e9bdc833c4fe54bb68f5c8
SHA5125f9e47f865c48cb1f2070d5d393a5d3494074bfe2347e07c988d06c8244dd420181c210a8ebdd54f768a64a5906d0c9e3be271d44f6e5bd32991bc2cacf85d3e
-
Filesize
5KB
MD5ddb6da5a6385b9a062409e605c66f682
SHA11bd7c007c7c513e569334190bd90ddd31757b4d6
SHA256745d625feef00994fd9516198cb31383c33ab7f6e7e115c1415516d7c822d257
SHA51261b362aad4a6951ac5872c4708ff2c0a5995a3debca7c7a4a31122cce54c0ea43e2321054ff85474dafd1b7b3e9e872cdc12dd33aad2c284355f069fe0a8c049