Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
10/03/2024, 17:12
240310-vq913agh56 810/03/2024, 17:10
240310-vpsqdsgg96 810/03/2024, 17:06
240310-vmncwsha4z 8Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 17:12
Behavioral task
behavioral1
Sample
invitation.docm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
invitation.docm
Resource
win10v2004-20240226-en
General
-
Target
invitation.docm
-
Size
149KB
-
MD5
80fd5db1b1ba6cfbab12ccc73c7c8d92
-
SHA1
7795a63ff618a40ced25823647dfd60df73d4eb6
-
SHA256
ce9f4c1bd44ff0a9131e63cf4f8c0ce5c1c8e4eb77bffe843a325d08b34eb9bb
-
SHA512
ef745cee04124d6cb8f024b1d7d6a973ca3e48aded9cfe6225889ac87495d67864aca84e9e6ac80053aaec65750966b0944a5c91b5f062a0b0876a111c47fc20
-
SSDEEP
3072:tTRK13SlTv2fLlbCKaqnegOf30y3ATynjg1D1TViB/4yG:pvNvCLl7BeHsmtgp1TViZ+
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3112 WINWORD.EXE 3112 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3112 WINWORD.EXE 3112 WINWORD.EXE 3112 WINWORD.EXE 3112 WINWORD.EXE 3112 WINWORD.EXE 3112 WINWORD.EXE 3112 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\invitation.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3112