Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
Bureau de liaison.docx
Resource
win7-20230703-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Bureau de liaison.docx
Resource
win10v2004-20230703-en
5 signatures
150 seconds
General
-
Target
Bureau de liaison.docx
-
Size
404KB
-
MD5
ac270ab72a710765662ff538026a0217
-
SHA1
7cde45edadec6dc5cbb0810fe894a6000259cdfd
-
SHA256
1cf64afc23112cc9f2c108ca43257a39e7517996bab41fac42f19eb3cc82ea35
-
SHA512
b064159568420d3ce531ca9bc4403d53a375113f369f3fca8184d1e0ae1662b661f4ce547fd21bc891bff11f956b7637aaed776d7717d3de060573fc26554be9
-
SSDEEP
6144:N3wciRslFGHbZbtooD3DWXXgya18XNMJNGCKOZkJMeK:9viKkZtbD3qXXgyaaiXGCPZkJrK
Score
7/10
Malware Config
Signatures
-
Abuses OpenXML format to download file from external location 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Office\Common\Offline\Files\https://transfertconsult.sharepoint.com/sites/Intranet/Gabarits/TES_WORD_Note stratégique.dotx WINWORD.EXE Key opened \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Office\14.0\Common WINWORD.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2388 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2388 WINWORD.EXE 2388 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2388 WINWORD.EXE 2388 WINWORD.EXE 2388 WINWORD.EXE 2388 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Bureau de liaison.docx"1⤵
- Abuses OpenXML format to download file from external location
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2388