Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
eD0C#50003_Mn8.docx
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eD0C#50003_Mn8.docx
Resource
win10v2004-20240802-en
General
-
Target
eD0C#50003_Mn8.docx
-
Size
36KB
-
MD5
9c1eeb3be212d8a2d2fc1d5c08b566f7
-
SHA1
c8d68b0e28d5e303418bc8891bfc5a51354bba1b
-
SHA256
b24509ddc372c34411bf3d7f1fc4b7ee718f52b830bddab42805f146b6df2d16
-
SHA512
04a2620bc1df58c00d6939d8a5ae49e83ae7c560cdd36acbddfc9793cfee060f9e10e54eea04f32515b0460c0042de34078c4648f67dfb298eb1507d9a760cec
-
SSDEEP
768:pUrSps3pqCTn+FRUxJYzx5ahyY6PbBSAHio3WiFzrQVmcI3:pUXl+BlbVSZkzFYmB
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2656 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2656 WINWORD.EXE 2656 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2532 2656 WINWORD.EXE 30 PID 2656 wrote to memory of 2532 2656 WINWORD.EXE 30 PID 2656 wrote to memory of 2532 2656 WINWORD.EXE 30 PID 2656 wrote to memory of 2532 2656 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\eD0C#50003_Mn8.docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2532
-