Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
18s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/12/2024, 21:45
Behavioral task
behavioral1
Sample
a485a724a0797a0cae1bc7f59e0403a3b77d42afacbc579aae41c458dfea2b0b.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a485a724a0797a0cae1bc7f59e0403a3b77d42afacbc579aae41c458dfea2b0b.doc
Resource
win10v2004-20241007-en
General
-
Target
a485a724a0797a0cae1bc7f59e0403a3b77d42afacbc579aae41c458dfea2b0b.doc
-
Size
34KB
-
MD5
ee86c554c2b0a1fd3b6b396970c0be5b
-
SHA1
a477f901a2e6c97a05f81c877f05144180e400f7
-
SHA256
a485a724a0797a0cae1bc7f59e0403a3b77d42afacbc579aae41c458dfea2b0b
-
SHA512
f8f32e22eb8d18f93225fe3d422e27a3f7c6e93a5692873b28251b8cea1a924baf45459d08be35af97ee7c7a3bf4b5c22eb2465dc04ebc39ff9e9623606bb0d3
-
SSDEEP
384:j2iSwvxjk+tV6L4Sivwre50j63+pz/nwQVlN3L:jZxw+tUdivnv+pHtL
Malware Config
Extracted
metasploit
windows/reverse_tcp
127.0.0.1:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1932 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1932 WINWORD.EXE 1932 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2524 1932 WINWORD.EXE 30 PID 1932 wrote to memory of 2524 1932 WINWORD.EXE 30 PID 1932 wrote to memory of 2524 1932 WINWORD.EXE 30 PID 1932 wrote to memory of 2524 1932 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a485a724a0797a0cae1bc7f59e0403a3b77d42afacbc579aae41c458dfea2b0b.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2524
-