Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
Нападение на американские космические системы очень д.scr
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Нападение на американские космические системы очень д.scr
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Новый щит и новый меч Вооруженные Силы России и США.doc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Новый щит и новый меч Вооруженные Силы России и США.doc
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Ракетно-ядерная рулетка.doc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Ракетно-ядерная рулетка.doc
Resource
win10v2004-20240709-en
General
-
Target
Ракетно-ядерная рулетка.doc
-
Size
52KB
-
MD5
49b90b2f7d5c580ddd117e50f2b60eae
-
SHA1
630930c079461afc6ff2c527efd12d3c463a76a6
-
SHA256
cab10927a6399a7cf46687d59c63b9ef013c9e4fb822db595937339344558813
-
SHA512
42b6cd4f85c2cb295b0b12b2bfc59e69f66a2cb546330f8689cb1c7e185a7802aa9c19616a39c4508e5a8821de0f9567fe209af6f65710601d0f345aaa9478db
-
SSDEEP
384:9XKjWCzWFnReLmvXZgGp0SItuJ7e/VhdZZwikYZAWEyGcSdW+wRsCB4KD2V:VizWF5MuJ7cVhpzJKCBx2V
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3760 WINWORD.EXE 3760 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3760 WINWORD.EXE 3760 WINWORD.EXE 3760 WINWORD.EXE 3760 WINWORD.EXE 3760 WINWORD.EXE 3760 WINWORD.EXE 3760 WINWORD.EXE 3760 WINWORD.EXE 3760 WINWORD.EXE 3760 WINWORD.EXE 3760 WINWORD.EXE 3760 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Ракетно-ядерная рулетка.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f