Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
e25c5110-11f8-4948-2c27-08dcb6c2a63e.docx
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e25c5110-11f8-4948-2c27-08dcb6c2a63e.docx
Resource
win10v2004-20240802-en
Errors
General
-
Target
e25c5110-11f8-4948-2c27-08dcb6c2a63e.docx
-
Size
179KB
-
MD5
af451f49111d54cab74320ab65bc4783
-
SHA1
b39fd9a64df62b97b91227966a0cf0a72d2d5c72
-
SHA256
43fd4f99f4121ae1c321154612d720660bac3407252c6b0ee2e269519a64b203
-
SHA512
f467f991db2aec88f59090784f9b3616b5d36a0fd393896ac703cd4c7b451398e9e071a3131b62dba1a1ab68e82dd18ef8fd53d741201e37ebb0b36660b459c3
-
SSDEEP
3072:ciY5rj1ATug+mhTZMxjcFQ9csn4qAzYjDp/shKuikycBSRjR/Vx7XU4Tto:m5r/g+qZMpcFSQzYHut4d1Bo
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1552 WINWORD.EXE 1552 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 1552 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1552 WINWORD.EXE 1552 WINWORD.EXE 1552 WINWORD.EXE 1552 WINWORD.EXE 1552 WINWORD.EXE 1552 WINWORD.EXE 1552 WINWORD.EXE 1552 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e25c5110-11f8-4948-2c27-08dcb6c2a63e.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5f377b8e4ce4950bb85095bd43e6a5b15
SHA1b8a9add7f276f9c400188e93e47e85b58d2ae7e0
SHA2560f92e54c5d5fef0c184afcfbf68570eb8b20eb6c58e1da3f1f4abff07281c0e2
SHA51284775be66f96f2b4e0d2dba80ab60155017ece263df49321bcde6b9022f28a93ef603bbe976ed47b843e9b23731be2b25fc609b5a6e0ccb15531837ab32e33b6