Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows10_x64 -
resource
win10 -
submitted
08/07/2020, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.XLM.Trojan.Abracadabra.1.Gen.6287.29239.xls
Resource
win7
Behavioral task
behavioral2
Sample
SecuriteInfo.com.XLM.Trojan.Abracadabra.1.Gen.6287.29239.xls
Resource
win10
General
-
Target
SecuriteInfo.com.XLM.Trojan.Abracadabra.1.Gen.6287.29239.xls
-
Size
692KB
-
MD5
e831a772b7c320e2dddbe6f336fa45b9
-
SHA1
c1413b860ac40c11b0a768f58b5a510ce2173f6e
-
SHA256
6e5a237d9da69487ffff817b7ffb44000be5112546e8e8ae0a1d0f803aad8ca1
-
SHA512
445e05395548de7a83ec2c469fb80355cc675e41f1cfe2726fda694cdf67410799017fdb7a4c2c5000b06cc614aeb3159e308189e7b0044c81f7d75ae139cde6
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 976 EXCEL.EXE 976 EXCEL.EXE 3092 dwwin.exe 3092 dwwin.exe -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3912 976 DW20.EXE 66 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 976 wrote to memory of 3912 976 EXCEL.EXE 71 PID 976 wrote to memory of 3912 976 EXCEL.EXE 71 PID 3912 wrote to memory of 3092 3912 DW20.EXE 72 PID 3912 wrote to memory of 3092 3912 DW20.EXE 72 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE 976 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 976 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.XLM.Trojan.Abracadabra.1.Gen.6287.29239.xls"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
PID:976 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 18042⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 18043⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-