Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
24 05 07 Board Meeting final.docx
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
24 05 07 Board Meeting final.docx
Resource
win10v2004-20240426-en
General
-
Target
24 05 07 Board Meeting final.docx
-
Size
43KB
-
MD5
0b695f0e9639fd6aaeeecefcd7c42cc6
-
SHA1
c934021a8aed63c6e2a7ce14a81a92b07dd3336b
-
SHA256
bad4163aa2c742d5dca8cf01c6cb5024c8d2e816507fafd741ac92c26cbcaee6
-
SHA512
02f9c55c9afbb69e795544044d5e63b73c2d1a1a9bcc2c1e567178cf6f3c6b2bbe24ce69dc0d605a05d8dc91bdd8bf813ba20cf68762c10bdf7359cf47e888df
-
SSDEEP
768:cxFkgFcvlgikMU9EG9gmbSB6t4T/Tn2H7bizWz6CTUDb3FLWMO3FrnSV7Wc:hgqvejk7y4TCHXHWWs3VMrSYc
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1088 WINWORD.EXE 1088 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE 1088 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\24 05 07 Board Meeting final.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851227[[fn=sist02]].xsl
Filesize245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e