Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
0ab74970f40073e5de46a0f9f9fd8ea83f7082f4e0be27fcd45d249515f91d1c.docx
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ab74970f40073e5de46a0f9f9fd8ea83f7082f4e0be27fcd45d249515f91d1c.docx
Resource
win10v2004-20240802-en
General
-
Target
0ab74970f40073e5de46a0f9f9fd8ea83f7082f4e0be27fcd45d249515f91d1c.docx
-
Size
10KB
-
MD5
6b1defc7973541003416b77a1b06ac87
-
SHA1
c1bde8cbc4e5d405d9ecded4b07c50c374888a1c
-
SHA256
0ab74970f40073e5de46a0f9f9fd8ea83f7082f4e0be27fcd45d249515f91d1c
-
SHA512
fa651061ab3042e3590ea846a037f077b410dc23a43de4ef8cc171930cb081c6e6ff1f77d677201c84074abdf58503050a5a8b337262e4f4db0f58ba2ef7895b
-
SSDEEP
192:OEhM6yD7Z/c+8poF1d3jvvtlN9264wpCGhe3b8rfrGxjPCUUufeU:OqJGcfa7pr1lN92hwkGA3b+fyxjPCzu7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\http:\172.31.102.226:8000\index.html! WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3024 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3024 WINWORD.EXE 3024 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0ab74970f40073e5de46a0f9f9fd8ea83f7082f4e0be27fcd45d249515f91d1c.docx"1⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{AE0257D1-64E0-41A0-9708-EDD65F83DB18}.FSD
Filesize128KB
MD5cecac51b52c114ca3b6bf16f4d04014f
SHA1cf0addf492f1c47fc8e52bf208f6c23392712d7e
SHA2561f56c6a1e996c7eb823b3d85678f214e2e1c2ee4862398470c7112c077c4be36
SHA51298526556301060978a3edb3ddfaaba0128677ebdc788d99c78f05d07d88c22777a2a4abb956ad66ed5f198af21a5c3981f968fcf2dd4f8dc0864b5155448e361
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD57b50c85a72998da2b89d6dfb66dc06d2
SHA1a7def793a1e654cece1e9ac9d2d2ddb690fde624
SHA25627a308be2c4fb34d4ac82b26212ecc1b6db92569f5bb3dc2635c980ee8c23dda
SHA512e06f47f1b0abb6eba92d8ec56c2f8f8cfcbdc65c710853412c5098db5d05e39be7b70727b80aead32828584c7db925422d1234ca00bc66117d3a762031f736cf
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{3B2CAC01-782A-4135-BDBA-36E718EBC3C7}.FSD
Filesize128KB
MD5344eb74250fe55814f4622f5c78cdfdd
SHA1f9f3e7b742a61f751db53e4e7b5f7a0401866032
SHA2561dbb73b70a6054451502c48a1c5f8d0ae97fb509d010a03f0c474fe1f8ecd49d
SHA51260070fcafac914c8f823322c1a16ebad23c291ec74e5429c078c3482011cbe7684ae5239e803ba2c6ccbcbaaeacd0e43bcaf6fe3e22b79d36bb043cb86ed5051
-
Filesize
128KB
MD5fd04c1c27af320ce11c6347f6cf43f00
SHA16a8a63a2ce7285273f9dcf4f8e937298fa20e4bd
SHA2568dc3b2c4b613d69e7b101d7d997f3d9e691c745dc39c1f2196e06640b72205c7
SHA5123847fb878f96209994b11c20f7f43bd14b5a1e4a7fe668d8291b9f97e376540c4bb136a7f735ba212a0cda571ee2a5849648fe6395ff9064339d30ccffeceb5b