Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
Atsakymas i paklausima del tvarkomu paskolu.docx
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Atsakymas i paklausima del tvarkomu paskolu.docx
Resource
win10v2004-20230915-en
General
-
Target
Atsakymas i paklausima del tvarkomu paskolu.docx
-
Size
30KB
-
MD5
0155dac7e6804d3b6b4a0ad013eb0c8a
-
SHA1
68bfc493f4872a00ad79465c946bc83f792383f0
-
SHA256
5aab69fea7e77f1eb4a4aa5ec4092ed44f3be4afda3d2d855b4e8c8328d264db
-
SHA512
7e287e3afe8b04a0e19cb3d47c3ab77a9184f80abff5f5bf9d91b909604d87b79bba61262d086b591520124c338cf2a12af2944cb2b62fe5db241d4b6ed9d5fa
-
SSDEEP
384:PkSldj0nN+8aPZjAwlbapm66v1KAjoxg9HFHxv7bfPBQk5eEH/VcafhrTu2qgWBX:zdj0nV2j5baopwgFp79e+ZTJZcfB
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2024 WINWORD.EXE 2024 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Atsakymas i paklausima del tvarkomu paskolu.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2024