Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 00:49

General

  • Target

    attachment-2.rtf

  • Size

    53KB

  • MD5

    c687546d381618badd2235c060102bc7

  • SHA1

    c00927e1acbf14aecba350f6008d4a00a1f6dbe7

  • SHA256

    c1efa5f2233e6e560329ee1cd6e0e2b986553ed2346cd002ab442bf213c9134f

  • SHA512

    b82e0cc2b5c0ae9f83bb0e1fd10c7a1121626d54a56e095f0c9e19e286750cf91f96799f0ee9553796b96f2f62f2e13adcc8403476feb9edbb9d1794a35712cf

  • SSDEEP

    384:D9Y8jl7bybzvdHHIwblYS6hTxD4zu4zA4z8CiDXf7GiKZtfFwBXU3qlurXrKFtbk:C8AK8zZzHz1ivU9RWFm

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\attachment-2.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2260-0-0x00007FFC64710000-0x00007FFC64720000-memory.dmp

    Filesize

    64KB

  • memory/2260-1-0x00007FFC64710000-0x00007FFC64720000-memory.dmp

    Filesize

    64KB

  • memory/2260-3-0x00007FFCA4690000-0x00007FFCA4885000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-2-0x00007FFC64710000-0x00007FFC64720000-memory.dmp

    Filesize

    64KB

  • memory/2260-4-0x00007FFCA4690000-0x00007FFCA4885000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-5-0x00007FFC64710000-0x00007FFC64720000-memory.dmp

    Filesize

    64KB

  • memory/2260-6-0x00007FFC64710000-0x00007FFC64720000-memory.dmp

    Filesize

    64KB

  • memory/2260-7-0x00007FFCA4690000-0x00007FFCA4885000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-8-0x00007FFCA4690000-0x00007FFCA4885000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-9-0x00007FFCA4690000-0x00007FFCA4885000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-10-0x00007FFCA4690000-0x00007FFCA4885000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-11-0x00007FFC62420000-0x00007FFC62430000-memory.dmp

    Filesize

    64KB

  • memory/2260-12-0x00007FFC62420000-0x00007FFC62430000-memory.dmp

    Filesize

    64KB

  • memory/2260-26-0x00007FFCA4690000-0x00007FFCA4885000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-47-0x00007FFC64710000-0x00007FFC64720000-memory.dmp

    Filesize

    64KB

  • memory/2260-48-0x00007FFC64710000-0x00007FFC64720000-memory.dmp

    Filesize

    64KB

  • memory/2260-49-0x00007FFC64710000-0x00007FFC64720000-memory.dmp

    Filesize

    64KB

  • memory/2260-51-0x00007FFCA4690000-0x00007FFCA4885000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-50-0x00007FFC64710000-0x00007FFC64720000-memory.dmp

    Filesize

    64KB

  • memory/2260-53-0x00007FFCA4690000-0x00007FFCA4885000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-52-0x00007FFCA4690000-0x00007FFCA4885000-memory.dmp

    Filesize

    2.0MB