Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
30/09/2023, 07:51
230930-jpwaqsbc35 1029/09/2023, 22:10
230929-13rm5sgc42 1029/09/2023, 21:44
230929-1lmymagb76 10Analysis
-
max time kernel
1800s -
max time network
1760s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2023, 22:10
Behavioral task
behavioral1
Sample
Nicht bestätigt 788413.doc
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Nicht bestätigt 788413.doc
Resource
win10v2004-20230915-en
General
-
Target
Nicht bestätigt 788413.doc
-
Size
2.1MB
-
MD5
d7519b822434fb89fb3643bc2f450e23
-
SHA1
4fcf10a8fe9db80c3eaf172636a602f95b64b0fc
-
SHA256
732cfacaafe15f55c177d929eeb4b129dc5a44ce04c8d6d83da236d74c50979f
-
SHA512
d8b2e5eb888f3ca464e56aebcd6e4eab2b678739663aba90745e6d244a36a7e4e622afaa11f5a0a6effd5991cf26e37e4775837ff97c415ad5feee2969640e95
-
SSDEEP
12288:t+xefqnAWcv37wHxULygl0kPf5h2BSoPy+OnwGcOuU4N5:oAqnAHTwHK+g00Cy+OnSOz4r
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2560 552 cmd.exe 29 -
Executes dropped EXE 1 IoCs
pid Process 4180 chats.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3660 schtasks.exe 2504 schtasks.exe 3928 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 552 WINWORD.EXE 552 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 552 WINWORD.EXE 552 WINWORD.EXE 552 WINWORD.EXE 552 WINWORD.EXE 552 WINWORD.EXE 552 WINWORD.EXE 552 WINWORD.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 552 wrote to memory of 2560 552 WINWORD.EXE 86 PID 552 wrote to memory of 2560 552 WINWORD.EXE 86 PID 2560 wrote to memory of 3660 2560 cmd.exe 88 PID 2560 wrote to memory of 3660 2560 cmd.exe 88 PID 2560 wrote to memory of 2504 2560 cmd.exe 90 PID 2560 wrote to memory of 2504 2560 cmd.exe 90 PID 2560 wrote to memory of 3928 2560 cmd.exe 91 PID 2560 wrote to memory of 3928 2560 cmd.exe 91 PID 3752 wrote to memory of 996 3752 cmd.exe 117 PID 3752 wrote to memory of 996 3752 cmd.exe 117 PID 3668 wrote to memory of 3420 3668 cmd.exe 122 PID 3668 wrote to memory of 3420 3668 cmd.exe 122 PID 904 wrote to memory of 4456 904 cmd.exe 135 PID 904 wrote to memory of 4456 904 cmd.exe 135 PID 2852 wrote to memory of 2652 2852 cmd.exe 138 PID 2852 wrote to memory of 2652 2852 cmd.exe 138 PID 1988 wrote to memory of 2376 1988 cmd.exe 143 PID 1988 wrote to memory of 2376 1988 cmd.exe 143 PID 2180 wrote to memory of 5092 2180 cmd.exe 153 PID 2180 wrote to memory of 5092 2180 cmd.exe 153 PID 1828 wrote to memory of 1468 1828 cmd.exe 156 PID 1828 wrote to memory of 1468 1828 cmd.exe 156 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Nicht bestätigt 788413.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\rtwitoghbklj.bat2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 4 /f /tn rtret /tr "C:\Users\Public\fghsd.bat"3⤵
- Creates scheduled task(s)
PID:3660
-
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 6 /f /tn sgsg /tr "C:\Users\Public\Pictures\oned.bat"3⤵
- Creates scheduled task(s)
PID:2504
-
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 8 /f /tn jhkff /tr "C:\Users\Public\chats\chats.exe"3⤵
- Creates scheduled task(s)
PID:3928
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Public\fghsd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\system32\cscript.execscript //nologo "C:\Users\Admin\AppData\Local\Temp\_.vbs"2⤵PID:996
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Public\Pictures\oned.bat"1⤵PID:1468
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Public\fghsd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\system32\cscript.execscript //nologo "C:\Users\Admin\AppData\Local\Temp\_.vbs"2⤵PID:3420
-
-
C:\Users\Public\chats\chats.exeC:\Users\Public\chats\chats.exe1⤵
- Executes dropped EXE
PID:4180
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Public\fghsd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\system32\cscript.execscript //nologo "C:\Users\Admin\AppData\Local\Temp\_.vbs"2⤵PID:4456
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Public\Pictures\oned.bat"1⤵PID:2832
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Public\fghsd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\system32\cscript.execscript //nologo "C:\Users\Admin\AppData\Local\Temp\_.vbs"2⤵PID:2652
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Public\Pictures\oned.bat"1⤵PID:3668
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Public\fghsd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\cscript.execscript //nologo "C:\Users\Admin\AppData\Local\Temp\_.vbs"2⤵PID:2376
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Public\fghsd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\system32\cscript.execscript //nologo "C:\Users\Admin\AppData\Local\Temp\_.vbs"2⤵PID:5092
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Public\Pictures\oned.bat"1⤵PID:4908
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Public\fghsd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\system32\cscript.execscript //nologo "C:\Users\Admin\AppData\Local\Temp\_.vbs"2⤵PID:1468
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Public\Pictures\oned.bat"1⤵PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86B
MD580e1fe9562b1bd391b0feeff6f8bf202
SHA16ce0a5c8eb75f4877bb91dac87d0815f31b68480
SHA2560110b6c2b7270239627aaa62aa8371112572d6525a464dee81e82658999c025e
SHA51236ff805f8ed1e88404ddd2b280eae8ab3b083b28a1fe4fb9e6819685524e44a95bbd63fa63faf033c04e8fa0a38e457942a221e531f61d310698eed9de230f4b
-
Filesize
106B
MD5e90fbcbdcfb5b152a9f7c0f1d40c7ac9
SHA145139cc37c1105d6a51056158450710004537b31
SHA256b0f34b31d6e45ed11b53f380dbd4f796e0cc0acc4d287a4d74f3824efefe64b7
SHA5126819ac1cd92ea3b7da5ffbf0d12af2d2de422d0d814ff16e719352a843227d0f85ccb33be51ab15130dbbdf3e7ffc7f9b7a980a51e245cc2eeabeba287e52b80
-
Filesize
114B
MD5f27532f6e01f840923cf8fe8ba84fadf
SHA15a7976062ad84da5d41769accee4db3025608c14
SHA256130f575e56e3757ff793c00ed0e957a7c231a9bdbd5403829abe563010247a42
SHA5127364b62417fab5d692046bcc8a73210ef85a85fa167336530e9afc7e05f48d29b8e90252228b9396ab2bdd8e92c7450c5edfd14a0d52a4e2b87b92677533eb73
-
Filesize
164B
MD5bab5c47e282215782bf03eff8f041c9d
SHA187375c1cd28060aac17139fc81f560de5951ee3e
SHA256bbe8e6327fe86977d5a028fa1faa768513a2af1a2234dc498513e1cc548eede8
SHA512265b35869e1e8b51d0081e3e008ba9cbb764750dbfb0cfe12947f6840cab19c585e4153e06ca50750ee6a204f368998eb15661a49d8b14dd3e91d9e543997312
-
Filesize
207B
MD52875eb4740de383e185f2e3e76a957d9
SHA1c6f9be0064269d2a358df4dd6650bc26d898383b
SHA256c7bcd02fa0590b6ce206af2834f99fc5652aa64450b3e7911844b5e01d193c3e
SHA5126ada5ac32248c5d1274c3fd464a4ab2272499b2a58f88aef264474a1b9ef7b6e7229b46864f5e0f12214e5170e2055317cd34882526ac601e6f2104cd499a7d7
-
Filesize
250B
MD5fea0e2b124f69f6dfc63bfefa5b47c56
SHA1e5f45d6cbd81b70df7d0216c2e9827aa2cbe4e38
SHA2562762c7f6dbfef046066a2893efd2976da30fc503775bca43684405043de566f0
SHA5127c397b702fec6e32bcc570a7df1709cb1ee312d53596c415d352d0037f4802586e922d33d71b0b5ecadf291edcbad2af0778b1ce07b3ad1e73c694cc5ac8aaf2
-
Filesize
269B
MD54723ec4f36a275722efa3204b762e10d
SHA127308ecb7ceff6cb3283ed481b0f649efda73d72
SHA256cc82e370367946111cc1c34efcdd561ef776f0383f37f3b0ac437f07e91376bf
SHA512069e54478cb72db1ec6cda1ac62eef33ca75ed299fdd1bec7af86f7e7725436395f5a0be461f3c6335c0926374e6123ef05cb0d3f72a019dba03f9f61ae22177
-
Filesize
293B
MD55c204cd90cd0fc8e06ae478a6060f8e8
SHA16c8d3f828b5457ab20d78bc6f6fd768e2b318caa
SHA2569c325f4c822346e33240a3dcf3a624a692ede0cd552b4374d0eb61a9be571012
SHA51276ab29d00585571285905428428ab13e1cffb72a49f92538eed8a62399b33238313f186084c300a9986887f5395d3b257f6e6ca3929eb91360726240aa37afd1
-
Filesize
293B
MD55c204cd90cd0fc8e06ae478a6060f8e8
SHA16c8d3f828b5457ab20d78bc6f6fd768e2b318caa
SHA2569c325f4c822346e33240a3dcf3a624a692ede0cd552b4374d0eb61a9be571012
SHA51276ab29d00585571285905428428ab13e1cffb72a49f92538eed8a62399b33238313f186084c300a9986887f5395d3b257f6e6ca3929eb91360726240aa37afd1
-
Filesize
293B
MD55c204cd90cd0fc8e06ae478a6060f8e8
SHA16c8d3f828b5457ab20d78bc6f6fd768e2b318caa
SHA2569c325f4c822346e33240a3dcf3a624a692ede0cd552b4374d0eb61a9be571012
SHA51276ab29d00585571285905428428ab13e1cffb72a49f92538eed8a62399b33238313f186084c300a9986887f5395d3b257f6e6ca3929eb91360726240aa37afd1
-
Filesize
374B
MD5f7527f42289d19e38d328c8b9bf6c3c1
SHA111f79451278295174fc55e411ce43ae34a96a08e
SHA2566b521ad07453a6c79a87e855c44861209f9ae687bb99f480e19d28b03dcfd9ac
SHA512e80b3f93e3cca4352bb7c85b58c4486a331033531d9b83e3df35cd9ed2a7aef25eaa2b843f8f83b48d639fc9ea04608c0dcdf15b0a678cf0e4acb3c110dee82e
-
Filesize
293B
MD55c204cd90cd0fc8e06ae478a6060f8e8
SHA16c8d3f828b5457ab20d78bc6f6fd768e2b318caa
SHA2569c325f4c822346e33240a3dcf3a624a692ede0cd552b4374d0eb61a9be571012
SHA51276ab29d00585571285905428428ab13e1cffb72a49f92538eed8a62399b33238313f186084c300a9986887f5395d3b257f6e6ca3929eb91360726240aa37afd1
-
Filesize
293B
MD55c204cd90cd0fc8e06ae478a6060f8e8
SHA16c8d3f828b5457ab20d78bc6f6fd768e2b318caa
SHA2569c325f4c822346e33240a3dcf3a624a692ede0cd552b4374d0eb61a9be571012
SHA51276ab29d00585571285905428428ab13e1cffb72a49f92538eed8a62399b33238313f186084c300a9986887f5395d3b257f6e6ca3929eb91360726240aa37afd1
-
Filesize
293B
MD55c204cd90cd0fc8e06ae478a6060f8e8
SHA16c8d3f828b5457ab20d78bc6f6fd768e2b318caa
SHA2569c325f4c822346e33240a3dcf3a624a692ede0cd552b4374d0eb61a9be571012
SHA51276ab29d00585571285905428428ab13e1cffb72a49f92538eed8a62399b33238313f186084c300a9986887f5395d3b257f6e6ca3929eb91360726240aa37afd1
-
Filesize
54B
MD5d9b673a7658d4e650850a8f0a384336e
SHA155dac464d09e7c502b8d62fb1d14f9ce662e4e19
SHA2562ff399685922cad7c37b0eddec78b4e5ea21082855b6ad5290db421aa5e946eb
SHA5123e37e530e7052d3d3b5ca122f59d3dac186706a460219c549e9c0db7f636d9026a058d8ab43b877d791841374b4e5a8a5d42cfacb432014d9aaf26a32fbadfa0
-
Filesize
293B
MD55c204cd90cd0fc8e06ae478a6060f8e8
SHA16c8d3f828b5457ab20d78bc6f6fd768e2b318caa
SHA2569c325f4c822346e33240a3dcf3a624a692ede0cd552b4374d0eb61a9be571012
SHA51276ab29d00585571285905428428ab13e1cffb72a49f92538eed8a62399b33238313f186084c300a9986887f5395d3b257f6e6ca3929eb91360726240aa37afd1
-
Filesize
10KB
MD55e4ef26e46869b1cfa9b7f803eed5b33
SHA126d00ed8633f7ce0ea433b29a88f3602e38b7b0f
SHA2562ab4d420f543103c1f0188445a3a47eaa77817514573cb07cb8810903ae1f67d
SHA5127d2b36ac7f982b2885577d4c0d7fc467959bed68a07667b073fbf0bb072fd810099745567afa4e7a41bd1f0ce5a61efbff082173212542b8a38762faa4bf988e
-
Filesize
21KB
MD52cacf99569c85091ea987a02dc1e6bec
SHA1b7bf707938cc0cef3d3e24be0c8748ee699beb15
SHA25640e43aac9888c433d796e106c03846f48a1422d0950f27e0a2b793261e9f9e08
SHA51238d2397b71b83c1f5eb2453fa6a6b3c7457671835fef13d8c92e6c1ac5fd1677682f0a7219bf9ddf922891caf0021a680fcd6ac8dd03116acd149710430c5a02
-
Filesize
21KB
MD52cacf99569c85091ea987a02dc1e6bec
SHA1b7bf707938cc0cef3d3e24be0c8748ee699beb15
SHA25640e43aac9888c433d796e106c03846f48a1422d0950f27e0a2b793261e9f9e08
SHA51238d2397b71b83c1f5eb2453fa6a6b3c7457671835fef13d8c92e6c1ac5fd1677682f0a7219bf9ddf922891caf0021a680fcd6ac8dd03116acd149710430c5a02
-
Filesize
712B
MD536b06d73347fe0da8177bd212e2b3f77
SHA1f1fc033763b931a729b9da3eb29a0724fd3eb6b9
SHA256a2f68aacf94a11678abd24039f1a26c65c257c26ac7c31c87b442fbd7f6583d9
SHA512c2f90456644fd136c7ed33e83b9501d4c0323e294427b942a1bd078067be63ff3c5b3bc3c99f253b30d3ff579b64ef1699e3684612e9a4f4880e4a806f65c937
-
Filesize
480B
MD52981447b673ed84cf8a20457f175ff52
SHA1f92a9f28c9da1d09a8332d68287a74cd7d3a2538
SHA256f9459c9065454839cd1306c2e7759513bc5d204eb9a8095f5d49bd88654d8309
SHA5122ac7562bbf63d2befc037c02a6bd89d1d76e7df28004b151d7d6c4d61cfa0347a21879995b797f40da20da1ce763147cf18864e0a90906fbb71b74d190f8193b
-
Filesize
93B
MD5b33633c39e97015a56f82bebf3883f79
SHA15b1237ae05a0d493328f00a6828299b678a5b7ca
SHA256905bcd4c4246d200b81b26183f10b80f233c021d69b2fcc832cb2907e13ef623
SHA51253eebbf8e6a06907e07f781a0c146ba63a9627f07a356ddf0c44657592c38eee5434a6d3733d94d6dac409b033fe6a924c49aed92dad7ee2d9f5e9be3bf2239a