Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
روش های نوین تدریس/روش های نوین تدریس 1.docx
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
روش های نوین تدریس/روش های نوین تدریس 1.docx
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
روش های نوین تدریس/پرسشنامه.docx
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
روش های نوین تدریس/پرسشنامه.docx
Resource
win10v2004-20231023-en
General
-
Target
روش های نوین تدریس/پرسشنامه.docx
-
Size
19KB
-
MD5
52c3950c4595e12fbdd22503b25c505e
-
SHA1
d12bb2bfe69412b2cf053e5d5c33b52651be4b1f
-
SHA256
2eb0aaaf83d6ee6ea028bbe83e984735a1da5aab43e78d11519dc42079824a6d
-
SHA512
bb2a5e9104467d17154c46a916fa162b307c37af123d22a3ed86073377688274a3b0444edd72e7dc5ef2ead372ad50b92511925723a5ff700ffaa4f619031bd5
-
SSDEEP
384:HrrtMr5Co9ZS5BDcNCQ4jBAZprh7R4keQpB:3tMr5Z9Z6BwCQ4jiZprIsB
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1180 WINWORD.EXE 1180 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\روش های نوین تدریس\پرسشنامه.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1180