Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
271s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2023, 15:44
Behavioral task
behavioral1
Sample
loader_64.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
loader_64.exe
Resource
win10v2004-20231023-en
General
-
Target
loader_64.exe
-
Size
7.2MB
-
MD5
4dd5c68b13c477a52c78e73485da537d
-
SHA1
5350d568f3b8ad99187658b33d27d56b4b7e9a8b
-
SHA256
6f700f26d07ac71f871247af062375dc8a8c8aaf3209bc87a4345a0199dd6863
-
SHA512
49b76a238aedf81d8d3923692c2a8db315f2cb202c318add07e7a817a1150b3f176e5cafcd773b823659df26273b44cb8cdfbd7a729bc542773ce763b3876988
-
SSDEEP
196608:gI4xsACmyov6kJS6YXApBH8u9hX9eDOgZvz3rZdXZ7M7RVbZq:iIMCt4pBH8uDX9eDZZnq7U
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4872-0-0x00007FF71E1A0000-0x00007FF71F278000-memory.dmp upx -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4648 WINWORD.EXE 4648 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE 4648 WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader_64.exe"C:\Users\Admin\AppData\Local\Temp\loader_64.exe"1⤵PID:4872
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Files.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4648
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD535375f95b1430c8b11ebeb931fba0dda
SHA15122d139ac357db969c191b941bd479ceb9dc59f
SHA256fd5691afe44306226fa973037fe144c3214867067cf88cb2285394888d959d5b
SHA512b9043a4d4470ac90f83244a81fad5de8944b83ba1e8ab6bbc7d29fb216c2ded74bf1c7b1ca8c84535b989075660e83f676e273a1b524f9e5dd8e04fee412cc6b