Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2024, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
fdaf02b921c18eac21449e9d754398ddeef9a72f29e93f8cd56d3e2a98dded7e.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fdaf02b921c18eac21449e9d754398ddeef9a72f29e93f8cd56d3e2a98dded7e.doc
Resource
win10v2004-20241007-en
General
-
Target
fdaf02b921c18eac21449e9d754398ddeef9a72f29e93f8cd56d3e2a98dded7e.doc
-
Size
28KB
-
MD5
67c4fd7cd06ba2d553c6a91cefc7896d
-
SHA1
dc8cc2e507fabd95daede72c9434f0ab8ec5df1d
-
SHA256
fdaf02b921c18eac21449e9d754398ddeef9a72f29e93f8cd56d3e2a98dded7e
-
SHA512
8e919a318c0bd89e3391264d9e761d185dae002eb1e6fe72740fad4be7c575ba45bc03ae5394091e2cec448dd2c039f9181c1758e3131fa70cf2ddc4a9816abe
-
SSDEEP
192:FPmlLZEvA+6/6r8px8SmvowzxfNIWTRse5A1eptPK4J1IzBNQJDLpmNa:Fi8iS8px8SMDfDRQ8tissNQtLM
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.8.128:80/6Xlb
- headers User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2904 3724 rundll32.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3724 WINWORD.EXE 3724 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3724 WINWORD.EXE 3724 WINWORD.EXE 3724 WINWORD.EXE 3724 WINWORD.EXE 3724 WINWORD.EXE 3724 WINWORD.EXE 3724 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87 PID 3724 wrote to memory of 2904 3724 WINWORD.EXE 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fdaf02b921c18eac21449e9d754398ddeef9a72f29e93f8cd56d3e2a98dded7e.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD58cc5d9d6362e333f2e860eb4cc447950
SHA167fab7560064e5876728a378f2022577d71da83f
SHA25641ed9e4b2d941c16efc47a89e4cbf83a43fa79ed0ec509a025185dc922e75e0b
SHA5122c95e584c109303662c17956c5a5746d0acef68b5afff635de8c2745604024070f94ac7b9fc13b413f0f983228657eaf8384ec49761573ae621b5d0f7147aac5