Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
BC paper compound supplementary information v6.docx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BC paper compound supplementary information v6.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Cytochrome Bc manuscript v6.docx
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Cytochrome Bc manuscript v6.docx
Resource
win10v2004-20241007-en
General
-
Target
BC paper compound supplementary information v6.docx
-
Size
2.3MB
-
MD5
70275562a4eff606fec08077c76b7f19
-
SHA1
df508baff707d37bda13f7bf12a43c7408844fac
-
SHA256
46e73d3c90314653369a9dee5bf9e8730521336a44a837cafedd358f56c356ad
-
SHA512
1e678be5aa7c04bc59babfad5bc78f1850a39be9b016a16ff04a77cc8fc04d6a941671ea931f56e14a3a14bfe074613638c2826ae12b4840a9d082cd9cec27b2
-
SSDEEP
49152:ukvbForDbJoc2XqXiBMQfI0UHjpT7lOeCYSq5XotTWA465giWZ+mhCtArIUToQ:ukzFo3beB6XiKiUHdlOe8ef7i8ZBhDrh
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2088 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2088 WINWORD.EXE 2088 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1940 2088 WINWORD.EXE 30 PID 2088 wrote to memory of 1940 2088 WINWORD.EXE 30 PID 2088 wrote to memory of 1940 2088 WINWORD.EXE 30 PID 2088 wrote to memory of 1940 2088 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\BC paper compound supplementary information v6.docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD560e2cd58e43c7058deb0f4d128effb4e
SHA1885f8abb623737ba20a631af55f39f759c06967c
SHA2565018115a1d78784c9b6854f01c4cad7ed4a60f665d3c2b65e123efae16281f08
SHA5127c0b89dfa0e17f1cdc72a046af9c8a009364ceaf27142bf5239b4efaa3018b0e40a999d2964e6a9fc4bd9a28f1dd6f6a093a5e5ae9299de46583cf342b643c5d
-
Filesize
1.3MB
MD531d81d59d03eebee6fbef5845e5780e1
SHA10eb471246284ee9ef011812a613b691e08045de9
SHA2563eb36d78f09b29cd3511662c4b732406d12adece9465fb3d6c1399f0355662a9
SHA512568602db1a82340aa8dfb29c5ca2c6acc6e6710af47b3ea9aeba1d45de2c17c7343e7cd05443eb2801812d8b4c033e7352712e21d86e87958635e7c52eea7d2a
-
Filesize
49KB
MD57512398cb585026249bfb4d859d7979f
SHA1f5835088c413d8025a33a0d54b84214d0a7e8c73
SHA2563f3a116fffaf22b46a3214afc41177453f1a7b3b7f23e3a36f259c1311d23699
SHA512be6540b14451658e4f4488fe22bc47a7b4a8c4377c855a0acca8609289eed9253a94a7a7d9bd2e04ac2b2a2086b922b87eaff5c9af84ed29a6e6ea1ed2563ec3
-
Filesize
49KB
MD5e240bc7c08d225c73b95af61f300d1df
SHA1d49ad78fd46bb35f040e951e2499ac0c515de8d6
SHA256e558d61eca3bf7c31a99db923436dedcbc849348e87ad6a49c92e5ed32f45f40
SHA512b60719601d2cd6f9347cba47f84929444e474dc0c83afb208278083f9f84142e3d5a8974cf28c1905f2d003c93f1f0b4d3c6060209801595d49fb4acb9aeb951
-
Filesize
1.4MB
MD541e36c36b9f79d7602f2770cfc5d4cb6
SHA119d7271a35beb8f752e16d3d49b4969af0e2cf48
SHA2568d26fe8498a3575ac4598512ed0c69e2f59cb7c488c2944b12cdbf1689f6245d
SHA5128f85ac40f2ebab968f07edc031fbe4ea80915f0e2dd4371222ac82db9527d89759077764ec361f5ce80847b39bd9e95ddc659c84c7622aa093d50bf795c4ede8
-
Filesize
21KB
MD5b8b3cb57b43dd8a1baea31d5c0c5f34d
SHA1c1e382dfd0e1164602edb84b4ffcfdaf71b981e7
SHA256f4c322b578d523815f2ce159ed1a897cb78745c5b16d02ce670d121f5661a91d
SHA5124cb487bdb299cfae0d35512db5af54e01e6322cdf6fa51e5ca16f15c858c0b8d401564f95fc6da6788b4774f6b4b3ef31f586d9d4033e4a0de87a1b1aac1ba77
-
Filesize
1.3MB
MD5e600763be4d8543ad6e49c9923d9eb2b
SHA1a031983790bbe5231cf74b0123a75b203d735429
SHA25663bcdba4ecd87d4b699f2b3cd692dcbd46dd094c486443345742e5dca61ee5bb
SHA512a45a81cbef3c590eb380a1fe6f9d62f1aa30541ac1a3c865a541d304e1ae73d83c315fa9d0baa384a4dfa3fc5787c77809662e205d473e155ec7978914678506
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84