Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 13:02

General

  • Target

    9ce32ce5e2b70fec7f749e7868d89a4e3e739fed9c75cd6c4ec6eafde4c3711a.rtf

  • Size

    7KB

  • MD5

    d0d1fba6bb7be933889ace0d6955a1d7

  • SHA1

    97b1bf8f984ce9c17e48473409b9670741260ed5

  • SHA256

    9ce32ce5e2b70fec7f749e7868d89a4e3e739fed9c75cd6c4ec6eafde4c3711a

  • SHA512

    d9bfcffbdfc91f11b32aa09d0e013b4a7a84d383b66c062d3f139b02de03dff9dd03fb29c8f2c27156aa7ff43bd3af60dcb2233bbb3132891f731030b383f9f9

  • SSDEEP

    192:j7j4rIbadfwQkkS3KiZ6pL9lDOVMNcKYb4+r/ewc2:j7jqJqa+vc4ewc2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9ce32ce5e2b70fec7f749e7868d89a4e3e739fed9c75cd6c4ec6eafde4c3711a.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\B8E1FEA8.emf

      Filesize

      1KB

      MD5

      b6052c0bfdf729defcda65dc60b96a09

      SHA1

      9e28f321bb7fe666c6287ee54aba88341c5dc65a

      SHA256

      57bde8872e0e4c3db91e52fd0b3ec4e295f6b2b524e796c56e489fbddc61074c

      SHA512

      a8a36f0cf7b00d9670d4703e4036f079df4b6f7f82aae1c8ab5b192b051c3df35e938e47e0bfacf9fae5b803e100b79b64a3584fbb80c49e61c9dd2693cb80c9

    • memory/4988-13-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB

    • memory/4988-9-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB

    • memory/4988-3-0x00007FFE29FD0000-0x00007FFE29FE0000-memory.dmp

      Filesize

      64KB

    • memory/4988-5-0x00007FFE29FD0000-0x00007FFE29FE0000-memory.dmp

      Filesize

      64KB

    • memory/4988-8-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB

    • memory/4988-7-0x00007FFE29FD0000-0x00007FFE29FE0000-memory.dmp

      Filesize

      64KB

    • memory/4988-0-0x00007FFE29FD0000-0x00007FFE29FE0000-memory.dmp

      Filesize

      64KB

    • memory/4988-6-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB

    • memory/4988-2-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB

    • memory/4988-11-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB

    • memory/4988-4-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB

    • memory/4988-12-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB

    • memory/4988-1-0x00007FFE29FD0000-0x00007FFE29FE0000-memory.dmp

      Filesize

      64KB

    • memory/4988-15-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB

    • memory/4988-10-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB

    • memory/4988-16-0x00007FFE27B30000-0x00007FFE27B40000-memory.dmp

      Filesize

      64KB

    • memory/4988-14-0x00007FFE27B30000-0x00007FFE27B40000-memory.dmp

      Filesize

      64KB

    • memory/4988-38-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB

    • memory/4988-61-0x00007FFE29FD0000-0x00007FFE29FE0000-memory.dmp

      Filesize

      64KB

    • memory/4988-62-0x00007FFE29FD0000-0x00007FFE29FE0000-memory.dmp

      Filesize

      64KB

    • memory/4988-63-0x00007FFE29FD0000-0x00007FFE29FE0000-memory.dmp

      Filesize

      64KB

    • memory/4988-64-0x00007FFE29FD0000-0x00007FFE29FE0000-memory.dmp

      Filesize

      64KB

    • memory/4988-65-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB

    • memory/4988-66-0x00007FFE69F50000-0x00007FFE6A145000-memory.dmp

      Filesize

      2.0MB