Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2023, 14:27

General

  • Target

    بررسی شبکه های سنسوری بیسیم در مخابرات/Powerpoint/بررسی شبک�.pps

  • Size

    5.8MB

  • MD5

    024143d90f67bc5e2fc627337b9eaa01

  • SHA1

    fe838ef8c8e16195b2da50162a2b1a53453a2a9e

  • SHA256

    9758f72d461cbb0bb86306bdc378c3fca34ae5cf9430acbecc83809ef438d052

  • SHA512

    a6f88a107c908846f7d26b0127e8b3fcf75b7d29d24f639b179463dfd634e094b5190373ddf2dc7ac3edc22de3ac29eaed091c7a5c1421268998f4324ec6b782

  • SSDEEP

    98304:y1Y0FetZnnqakFWVjA6PvxIHD8z9CYXqvnHvlDpm8ObJ3OLq08tp0:oYket5kF6jAkxIj8z9CGSHdqbJ3eq08E

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\بررسی شبکه های سنسوری بیسیم در مخابرات\Powerpoint\بررسی شبک�.pps" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:5092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5092-0-0x00007FFE8EC90000-0x00007FFE8ECA0000-memory.dmp

    Filesize

    64KB

  • memory/5092-2-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-1-0x00007FFE8EC90000-0x00007FFE8ECA0000-memory.dmp

    Filesize

    64KB

  • memory/5092-4-0x00007FFE8EC90000-0x00007FFE8ECA0000-memory.dmp

    Filesize

    64KB

  • memory/5092-3-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-5-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-7-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-6-0x00007FFE8EC90000-0x00007FFE8ECA0000-memory.dmp

    Filesize

    64KB

  • memory/5092-9-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-8-0x00007FFE8EC90000-0x00007FFE8ECA0000-memory.dmp

    Filesize

    64KB

  • memory/5092-10-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-11-0x00007FFE8CAD0000-0x00007FFE8CAE0000-memory.dmp

    Filesize

    64KB

  • memory/5092-12-0x00007FFE8CAD0000-0x00007FFE8CAE0000-memory.dmp

    Filesize

    64KB

  • memory/5092-25-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-26-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-27-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-28-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-51-0x00007FFE8EC90000-0x00007FFE8ECA0000-memory.dmp

    Filesize

    64KB

  • memory/5092-52-0x00007FFE8EC90000-0x00007FFE8ECA0000-memory.dmp

    Filesize

    64KB

  • memory/5092-53-0x00007FFE8EC90000-0x00007FFE8ECA0000-memory.dmp

    Filesize

    64KB

  • memory/5092-54-0x00007FFE8EC90000-0x00007FFE8ECA0000-memory.dmp

    Filesize

    64KB

  • memory/5092-55-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-56-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-57-0x00007FFECEC10000-0x00007FFECEE05000-memory.dmp

    Filesize

    2.0MB