Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1资料/__i...1.docx
windows7-x64
3资料/__i...1.docx
windows10-2004-x64
1资料/__i...in.dll
windows7-x64
1资料/__i...in.dll
windows10-2004-x64
1资料/__i...io.dll
windows7-x64
1资料/__i...io.dll
windows10-2004-x64
1资料/__i...z2.dll
windows7-x64
1资料/__i...z2.dll
windows10-2004-x64
1资料/__i...es.dll
windows7-x64
1资料/__i...es.dll
windows10-2004-x64
1资料/__i...al.dll
windows7-x64
1资料/__i...al.dll
windows10-2004-x64
1资料/__i...ee.dll
windows7-x64
1资料/__i...ee.dll
windows10-2004-x64
1资料/__i...ib.dll
windows7-x64
1资料/__i...ib.dll
windows10-2004-x64
1资料/__i...ma.dll
windows7-x64
1资料/__i...ma.dll
windows10-2004-x64
1资料/__i...si.dll
windows7-x64
1资料/__i...si.dll
windows10-2004-x64
1资料/__i...ng.dll
windows7-x64
1资料/__i...ng.dll
windows10-2004-x64
1资料/__i...ed.dll
windows7-x64
1资料/__i...ed.dll
windows10-2004-x64
1资料/__i...ue.dll
windows7-x64
1资料/__i...ue.dll
windows10-2004-x64
1资料/__i...e3.dll
windows7-x64
1资料/__i...e3.dll
windows10-2004-x64
1资料/__i...sl.dll
windows7-x64
1资料/__i...sl.dll
windows10-2004-x64
1资料/__i...ion.py
windows7-x64
3资料/__i...ion.py
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
资料/__init__/11.docx
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
资料/__init__/11.docx
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
资料/__init__/WeChatWin.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
资料/__init__/WeChatWin.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
资料/__init__/_asyncio.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
资料/__init__/_asyncio.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
资料/__init__/_bz2.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
资料/__init__/_bz2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
资料/__init__/_ctypes.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
资料/__init__/_ctypes.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
资料/__init__/_decimal.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
资料/__init__/_decimal.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
资料/__init__/_elementtree.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
资料/__init__/_elementtree.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
资料/__init__/_hashlib.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
资料/__init__/_hashlib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
资料/__init__/_lzma.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
资料/__init__/_lzma.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
资料/__init__/_msi.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
资料/__init__/_msi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
资料/__init__/_multiprocessing.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
资料/__init__/_multiprocessing.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
资料/__init__/_overlapped.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
资料/__init__/_overlapped.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
资料/__init__/_queue.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
资料/__init__/_queue.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
资料/__init__/_sqlite3.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
资料/__init__/_sqlite3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
资料/__init__/_ssl.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
资料/__init__/_ssl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
资料/__init__/action.py
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
资料/__init__/action.py
Resource
win10v2004-20240802-en
General
-
Target
资料/__init__/11.docx
-
Size
19KB
-
MD5
b93aaa92dfee1e8c7083ae7ebf3e69ba
-
SHA1
f36193022a58c9500e57ad69772c264969a14190
-
SHA256
ee336b4f788842d2e7f922d64d8cf5e36a35c8b3bf053fd5542493e8f15afccc
-
SHA512
f6e0959ba01ecfb249dca019b7e3b9f27497165ea7ffd898177fe7fcb7b98d8fee191df6d2d2e8af90de2213725ee7871a4df08137b9e3a53cdc1bca203a8e90
-
SSDEEP
384:CzhqYl40uBRkV5Qe/g9KvUjbyW6ZgMnw3JzCbVwY7PRm:CzhqzHG/g4vMz0uzCBBk
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4964 WINWORD.EXE 4964 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\资料\__init__\11.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4964