Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:23
Behavioral task
behavioral1
Sample
0199459fc1005591eb55d40eaa15c09c.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0199459fc1005591eb55d40eaa15c09c.doc
Resource
win10v2004-20231215-en
General
-
Target
0199459fc1005591eb55d40eaa15c09c.doc
-
Size
35KB
-
MD5
0199459fc1005591eb55d40eaa15c09c
-
SHA1
adde9ea7028f7ec3ff8818c51afb754f77a517d7
-
SHA256
71d1c282e1d5dda186dc9d47e1b69db04d2d45566e22e8ebaf54c6eb93eac5b9
-
SHA512
f2e76048d482f1d55256048516a9d98df2a0afd260f2b1aba50be4301836aa4b80e18bc3a04057484bde176a1ca6524d06b4be81435c5ef69506db961a5d3d11
-
SSDEEP
384:QFBHvflHnbkam/ZMx1lz5vWD+WMjYSAltHE0:QLXurslvq+pE
Malware Config
Signatures
-
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\Root\Office16\Destrib.dll WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\~$estrib.dll WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\~WRD0001.tmp WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\~WRD0001.tmp WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\~WRL0002.tmp WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\~WRD0000.tmp WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1724 WINWORD.EXE 1724 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE 1724 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0199459fc1005591eb55d40eaa15c09c.doc" /o ""1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD55108311ccab956896b13f83130fc0fab
SHA178e62c438c0f49776f8c75bd5ab850e4d22276e5
SHA256ea1974df5d618eef17eff8cdde106fa1231f457aa1556f56cddb27fd90fadb4c
SHA5127d6ca91a91ca676de82219d7465de3c7b21437abb70823f24680ffaf621bfcfb6747dcf36b1bd38d30e40bd6ad0626be4270b5c622662a95e96bf88a9333f144
-
Filesize
11KB
MD5f2f58829b407fa46ede690fad7310465
SHA14755460535217c65d6d0eec381446e6f78549028
SHA2562569c0a106ec2c9bcef55f15e15d407b7224cd53f796aa6815bbc4d526cf265c
SHA512ec67e7fa3cc85b3efeef3e0fb02abe13229f4eec6b2c37c37faeb92f3c0e2068bad7c9d4927ed3326b4fb0530a3001d68699117751353c222fe4bf679e23c428
-
Filesize
1KB
MD5f9c84746b4e5ea3543321c0fb6aa99d8
SHA17bdab973c7b4e382cb4baaff4a826d8f28d3b62a
SHA256a81d157daff43e979dc23a9d117f39a51a9d5df614728dc8e22068c501a1b1f7
SHA512190c7165e2bf21e7281efa0c537b88905b16cacbc645134d5a90e7a58f943287c628d07015059a2d6612e0b384468f54290bc04b8910430f6aaa98bd91c1143a
-
Filesize
267B
MD563580fe839f6ae2d58d115b502f5d73c
SHA1b6285d35dd6c1023b43e50dac32f468aa2293438
SHA2568ffd99a924652ee62eea4e16a8a364b8dc81cb9ae23ae8e3bc2851786eed21ff
SHA5129f9d105b53b47b187c340ac836fa001d3918922debf3c6c09c02daa114618799ba7dc067f089303e53ec48450d1e95ec0ef40ba14a60d9bb1237cb02eaeb8020
-
Filesize
24KB
MD5bf672e076cb8efe10f9b0acce11dfbec
SHA1a1f221f1077daed8bc6bb9add6dec893aac7a2e4
SHA256425da99f7f017f8d36a673670e9588c4555efcaf57afb7d4264dae99d1a63d2b
SHA512fe5dc056355562fb215c0531f908bf8a0b0f89b0279d2025511115f8c6b5273734bf2e70278548686c3251d0dc85012674b211b89bba930d003087c89aede473
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5adddb11e5def8fc5e547d0bf748f284e
SHA1ed4601d1a0320202037e474d2661a0aaed858806
SHA256a85d53c06ada024dc48369bca459100672d04fde9e3c3bca15a1d0421db92bcf
SHA5124d30bbfe513f16582c6dd8c103c6845af3de7dff318307a494421077610b08a6c8385b42b2c1658370a6d27b8664c6968c4af92190ccc4cc4fed3b5b8002d917