Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
07/07/2020, 11:46
200707-l66r2vh3ha 107/07/2020, 11:42
200707-mrc92g3k5j 107/07/2020, 11:12
200707-8s9ccyfyp2 1Analysis
-
max time kernel
130s -
max time network
148s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07/07/2020, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
URGENT.xlsx
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
URGENT.xlsx
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
URGENT.xlsx
-
Size
85KB
-
MD5
d79b99270ed6b1a7767fa1e62ced9e20
-
SHA1
03caddc36c3501dfa28b69113506a597953ee901
-
SHA256
57526978347b4a435a44c0ca55149ac9cd8bdb0def66c73df52cda81ac8b5546
-
SHA512
14148b0656d00c09f455126c3bc6c787e06eee23a7a7c49577f6c9f7f03ee19b8f64dd0405bfe84db600bcf6599e3e030b5a4d4360b524ed90fe73428941c076
Score
1/10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE 1484 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1484 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\URGENT.xlsx"1⤵
- Enumerates system info in registry
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
PID:1484