Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 05:01
Behavioral task
behavioral1
Sample
ORDER-203-2083868-0173124.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ORDER-203-2083868-0173124.doc
Resource
win10v2004-20240802-en
General
-
Target
ORDER-203-2083868-0173124.doc
-
Size
122KB
-
MD5
2c2e83215a10870751a56bf816f3c582
-
SHA1
d75f20755a4bafdefce29abfbe7521d38a608974
-
SHA256
66d46134866aff619b5da9ddc4e36dd67d5fedfb1a9accb6f418a77c1989bd70
-
SHA512
4df99bca9b0fc82b6408d337bccee65503bdad1bf7f74a4cb85a97cd5cb29bc5bc0907ff6a5bdf62df78b283cd7b477a301b5f854f909aaf71ca6f4925252145
-
SSDEEP
768:1Jg1fReQXjCURYZpCXq87tDw4LIxfFMXNbNlEe0+NY:o15em+jZpC6Mtmi
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2028 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2028 WINWORD.EXE 2028 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2568 2028 WINWORD.EXE 33 PID 2028 wrote to memory of 2568 2028 WINWORD.EXE 33 PID 2028 wrote to memory of 2568 2028 WINWORD.EXE 33 PID 2028 wrote to memory of 2568 2028 WINWORD.EXE 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ORDER-203-2083868-0173124.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2568
-