Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
14813c4b6f79f7bb19b05ce071a63c65.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14813c4b6f79f7bb19b05ce071a63c65.doc
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
decrypted.xlsx
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
decrypted.xlsx
Resource
win10v2004-20231215-en
General
-
Target
14813c4b6f79f7bb19b05ce071a63c65.doc
-
Size
592KB
-
MD5
14813c4b6f79f7bb19b05ce071a63c65
-
SHA1
779547f8b4a8d017a143f1d26d053e8ecdeace8d
-
SHA256
86d1c75bf83dcf853506623fd7c7bcd08e5a871a9efee0b472a65551d8d13304
-
SHA512
66ff6161729d9705459aefd54a87b16a65ef2746ea33ae182ff03f109c62adff2a08be16bc4a26604d2de52b002c091ccd87e5326331a3a205647ce05b88a9d1
-
SSDEEP
12288:4SDHOHVbNLL3pMW9CRgJfrDMmrV5kTm8popue:4MOHVbFpMW9CRgJjDMmLkTm88
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4768 WINWORD.EXE 4768 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE 4768 WINWORD.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\14813c4b6f79f7bb19b05ce071a63c65.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4768