Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
3英宇职�...��.rtf
windows7-x64
4英宇职�...��.rtf
windows10-2004-x64
1英宇职�...��.rtf
windows7-x64
4英宇职�...��.rtf
windows10-2004-x64
1英宇职�...��.rtf
windows7-x64
4英宇职�...��.rtf
windows10-2004-x64
1英宇职�...��.rtf
windows7-x64
4英宇职�...��.rtf
windows10-2004-x64
1英宇职�...�1.doc
windows7-x64
6英宇职�...�1.doc
windows10-2004-x64
6英宇职�...�2.doc
windows7-x64
6英宇职�...�2.doc
windows10-2004-x64
6英宇职�...�3.doc
windows7-x64
6英宇职�...�3.doc
windows10-2004-x64
6英宇职�...��.rtf
windows7-x64
4英宇职�...��.rtf
windows10-2004-x64
1英宇职�...��.rtf
windows7-x64
4英宇职�...��.rtf
windows10-2004-x64
1英宇职�...��.rtf
windows7-x64
4英宇职�...��.rtf
windows10-2004-x64
1英宇职�...��.rtf
windows7-x64
4英宇职�...��.rtf
windows10-2004-x64
1英宇职�...��.exe
windows7-x64
3英宇职�...��.exe
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
英宇职业介绍管理系统/人才库汇总表标题.rtf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
英宇职业介绍管理系统/人才库汇总表标题.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
英宇职业介绍管理系统/人才库汇总表页脚.rtf
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
英宇职业介绍管理系统/人才库汇总表页脚.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
英宇职业介绍管理系统/介绍信查询汇总表标题.rtf
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
英宇职业介绍管理系统/介绍信查询汇总表标题.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
英宇职业介绍管理系统/介绍信查询汇总表页脚.rtf
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
英宇职业介绍管理系统/介绍信查询汇总表页脚.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
英宇职业介绍管理系统/介绍信模板1.doc
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
英宇职业介绍管理系统/介绍信模板1.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
英宇职业介绍管理系统/介绍信模板2.doc
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
英宇职业介绍管理系统/介绍信模板2.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
英宇职业介绍管理系统/介绍信模板3.doc
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
英宇职业介绍管理系统/介绍信模板3.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
英宇职业介绍管理系统/招聘信息汇总表标题.rtf
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
英宇职业介绍管理系统/招聘信息汇总表标题.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
英宇职业介绍管理系统/招聘信息汇总表页脚.rtf
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
英宇职业介绍管理系统/招聘信息汇总表页脚.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
英宇职业介绍管理系统/招聘单位汇总表标题.rtf
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
英宇职业介绍管理系统/招聘单位汇总表标题.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
英宇职业介绍管理系统/招聘单位汇总表页脚.rtf
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
英宇职业介绍管理系统/招聘单位汇总表页脚.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
英宇职业介绍管理系统/英宇职介管理.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
英宇职业介绍管理系统/英宇职介管理.exe
Resource
win10v2004-20240802-en
General
-
Target
英宇职业介绍管理系统/介绍信模板1.doc
-
Size
20KB
-
MD5
9fd968220b7dee78e526f3d6499819a2
-
SHA1
9aa171556631a3c349b7cec0c4d41f281d57da2a
-
SHA256
ae62d6cfce8284694966abb081dbad4c79d12f5f15b8cccbea4523efaa251da1
-
SHA512
b5bb0e5cfcdf865b20407f4c7d8cf559c4a93e9f826c37349fdb1b5e2abcfd2798d32dd3dc75a25ff5037b3455a25e2983ac0bcdc2598090119c1f5c4406ccb1
-
SSDEEP
96:OyMGgpuqcmsIQe/4uCYe/2QE0GbTP6TXvH7hj5qmHfLrsUYDq2VXDQzc:ODxcmUe/45Ye/2+GbMdjwUT2m
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4152 WINWORD.EXE 4152 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\英宇职业介绍管理系统\介绍信模板1.doc" /o ""1⤵
- Enumerates connected drives
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD596f2d241c9159aaca13f08ba073f24b3
SHA1edab4f37b07d7e4227f91aee2d5827d7909e159a
SHA2566f76c91ef62a49c847d22a603d2b7a7bb1b8bc2a00ba378618ccc180153bbae8
SHA5129add42a3921821b25fde035536203994ca82da352cfb76b5414a73c41eadd959b06adfceef758e8d6fad71cba5038b516a8ba6b552da8a7ced799403b766a20b