Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
77bea19bf75d96e47af382454c414708e92c3e89273fb8f71590a1c9f5a80c21.rtf
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
77bea19bf75d96e47af382454c414708e92c3e89273fb8f71590a1c9f5a80c21.rtf
Resource
win10v2004-20240611-en
General
-
Target
77bea19bf75d96e47af382454c414708e92c3e89273fb8f71590a1c9f5a80c21.rtf
-
Size
355KB
-
MD5
c8dd6964b7d481e52f8aef6b5af2c66c
-
SHA1
be89c5ba35edc8ec4d39f9967276dc77eb751ed9
-
SHA256
77bea19bf75d96e47af382454c414708e92c3e89273fb8f71590a1c9f5a80c21
-
SHA512
56184cdc3e201ba2c318baf72733413c688e099572d970a56507c3091056ab0704bd8769cdba2a21cb58bcb7171015569863bc226cafc3bcfffdb1b730305abd
-
SSDEEP
1536:uVPJM5JT77dHkTupkn/T2ivHWg55xi+qLO8YPE+oS1V9a:4K5J5H8upQ/yiPWgxi+qLOvoS
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5072 WINWORD.EXE 5072 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5072 WINWORD.EXE 5072 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5072 wrote to memory of 3484 5072 WINWORD.EXE 85 PID 5072 wrote to memory of 3484 5072 WINWORD.EXE 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\77bea19bf75d96e47af382454c414708e92c3e89273fb8f71590a1c9f5a80c21.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642B
MD54f03b86e4d6631c26ff5fffc7332be1d
SHA114952a78ea51df67d5b5b6c6b4de3d96ba7935bd
SHA25683f4ea26254d69825486bffd1d400217aac7245c5c48fe5acc3ccdea173c4851
SHA5124bed29b66444d826e89589b55dd786758ff68fcd2daf8296703d4443edb991fffce563e20db22bfb34fdb488638bbb43252392b6c105d12e721329adc2774632
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d