Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 08:19
Behavioral task
behavioral1
Sample
d1ac24fe6d7320c30ea4af2b81dfd19521c8554a43a1e84b4252ef5a1fc637d9.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d1ac24fe6d7320c30ea4af2b81dfd19521c8554a43a1e84b4252ef5a1fc637d9.doc
Resource
win10v2004-20240226-en
General
-
Target
d1ac24fe6d7320c30ea4af2b81dfd19521c8554a43a1e84b4252ef5a1fc637d9.doc
-
Size
30.9MB
-
MD5
c6f6f2538ad1eea24d9c0fd820a91f16
-
SHA1
cfb78614644cf7a7c3a88e1f9c11ef3b37ef33dc
-
SHA256
d1ac24fe6d7320c30ea4af2b81dfd19521c8554a43a1e84b4252ef5a1fc637d9
-
SHA512
b1f3967fa8c01c9f41af519663913c793640d021797cca92e6c9e074da59e10f27e5b733160995b6e7fa8c15c8dd1404fade1c9544ce27d7be2deba027e95e92
-
SSDEEP
49152:OtI7KZh1XatFfINl8iNGbKjPqj/xC2I2gZm:OrZh1X8wNlVFPqjY92g8
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4812 WINWORD.EXE 4812 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d1ac24fe6d7320c30ea4af2b81dfd19521c8554a43a1e84b4252ef5a1fc637d9.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4812