Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
hrdcktbq/好人多窗口同步器使用说明电子版.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
hrdcktbq/好人多窗口同步器使用说明电子版.doc
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
hrdcktbq/补丁.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
hrdcktbq/补丁.exe
Resource
win10v2004-20240508-en
General
-
Target
hrdcktbq/好人多窗口同步器使用说明电子版.doc
-
Size
184KB
-
MD5
30a8c669dbd3d204b4dd896b8d9305bd
-
SHA1
d84afad58f28429fdebf59c7f84eda9b3eb8f445
-
SHA256
c0ffeec7e5a4f7c16c685ee00fcd820301b0832bb1df9ce7f847e6f78fe3dc98
-
SHA512
763d63122d57dd51c85f01bfe5cc4b791ed78933e52e9cad4188729834d10ac069d9ff7fb117d2c356034f21b2d1fc73853b1390e4d9326da758a4094561fde1
-
SSDEEP
3072:jUR8H+szPOG8jox9XrzMH6vReDsjMDeb1m/1+Fl8d3i1X1+OIGHnX:jUR8H+iPOGJx9bdvqDe4/1+IY1X1+Or3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4284 WINWORD.EXE 4284 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4284 WINWORD.EXE 4284 WINWORD.EXE 4284 WINWORD.EXE 4284 WINWORD.EXE 4284 WINWORD.EXE 4284 WINWORD.EXE 4284 WINWORD.EXE 4284 WINWORD.EXE 4284 WINWORD.EXE 4284 WINWORD.EXE 4284 WINWORD.EXE 4284 WINWORD.EXE 4284 WINWORD.EXE 4284 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\hrdcktbq\好人多窗口同步器使用说明电子版.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4284
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3704 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:736