Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
e899940918028dddbf5018a337e38b32b9bd71f874e6b49793d9aa04033b900d.docx
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
e899940918028dddbf5018a337e38b32b9bd71f874e6b49793d9aa04033b900d.docx
Resource
win10v2004-20231020-en
General
-
Target
e899940918028dddbf5018a337e38b32b9bd71f874e6b49793d9aa04033b900d.docx
-
Size
2.9MB
-
MD5
ee33d715757bf6775552baef88e3ea48
-
SHA1
78f24fd031ea774987fd46abbb62c8886a2e1248
-
SHA256
e899940918028dddbf5018a337e38b32b9bd71f874e6b49793d9aa04033b900d
-
SHA512
d9c83329e9c6f44f8abee619263539e46a9596810174903b5e4b6b8a3a8a81b1bbe00d1a13da6dae310cd036de01ff0c93bde9fbce6b1a49077bbeee200efe41
-
SSDEEP
49152:eLQxhOizn7T+ZcRc+FAr4UQqHW9AMHgoxwLm7lm+Sc8C460REZZZKP1LglEuf81/:eshFH+Zcc+OMUnHW5gox0m8+Sc8h69Wp
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 376 WINWORD.EXE 376 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 376 WINWORD.EXE 376 WINWORD.EXE 376 WINWORD.EXE 376 WINWORD.EXE 376 WINWORD.EXE 376 WINWORD.EXE 376 WINWORD.EXE 376 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e899940918028dddbf5018a337e38b32b9bd71f874e6b49793d9aa04033b900d.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD535e37e283a539fb5c1bd1995599b9730
SHA17a0ad64f7937c8d22c937873aa28445a10cd5099
SHA2562dde6fe5744469a8acacfa4908c9b69afe2fee9df66240f642ea88e71cb45339
SHA512b99e2a7866b9503b437cf97e11913a957e2529d696d8a2e936fc1aa6709898231943625b15db12c284e9e5a28060958ea0acb70987214f9a43f3c69837fbb37a