Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
3d7cfc88c7d8d19c21f897a2c03801cc.rtf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d7cfc88c7d8d19c21f897a2c03801cc.rtf
Resource
win10v2004-20231215-en
General
-
Target
3d7cfc88c7d8d19c21f897a2c03801cc.rtf
-
Size
50KB
-
MD5
3d7cfc88c7d8d19c21f897a2c03801cc
-
SHA1
e0a449a97361013e5976791a8f209f3d2f1d1823
-
SHA256
fe7c9a2b809d7f5a0af5e0d8e8d62fafd2f922d9a24716de495a1398643b53a0
-
SHA512
7d92aab8c721df48edae9d9ae6e5ade0a651c959ba05ad069a30684397c014ffff6f228fd70bed5e14609f066732584bed1c525a1e2456feed2e5f03c5e377be
-
SSDEEP
768:uNuAL60V502HFUDmGIFmwFrKBqQA7bzmqhe6XQKOWM2xs/gSdlY:uNuS60V6BhIE8rKAQWzS6gKOWeIl
Malware Config
Signatures
-
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2076 1756 DW20.EXE 26 -
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1756 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1756 WINWORD.EXE 1756 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1756 WINWORD.EXE 1756 WINWORD.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2076 1756 WINWORD.EXE 27 PID 1756 wrote to memory of 2076 1756 WINWORD.EXE 27 PID 1756 wrote to memory of 2076 1756 WINWORD.EXE 27 PID 1756 wrote to memory of 2076 1756 WINWORD.EXE 27 PID 1756 wrote to memory of 2076 1756 WINWORD.EXE 27 PID 1756 wrote to memory of 2076 1756 WINWORD.EXE 27 PID 1756 wrote to memory of 2076 1756 WINWORD.EXE 27 PID 2076 wrote to memory of 2136 2076 DW20.EXE 28 PID 2076 wrote to memory of 2136 2076 DW20.EXE 28 PID 2076 wrote to memory of 2136 2076 DW20.EXE 28 PID 2076 wrote to memory of 2136 2076 DW20.EXE 28
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3d7cfc88c7d8d19c21f897a2c03801cc.rtf"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE"C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 9442⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 9443⤵PID:2136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872B
MD5ec492975df14fdde97017437c336878f
SHA1bb27876bbfc5263133e068b7f648fa7f22cee5f6
SHA2567954a8282b88a73c11d42af7e54eb38200aaff23b4e4ed2c877dc207bd12a4b4
SHA512a2b0560bd58effb43060598390933029771968df533a0fa1f2d487f2d2fcc8a26448650091782f813c0567b51b2b603c3b7275daf62460ce57bb99dfa95e7a97