Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
58s -
max time network
132s -
platform
windows10_x64 -
resource
win10 -
submitted
08/07/2020, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.XLM.Trojan.Abracadabra.1.Gen.7969.24194.xls
Resource
win7v200430
Behavioral task
behavioral2
Sample
SecuriteInfo.com.XLM.Trojan.Abracadabra.1.Gen.7969.24194.xls
Resource
win10
General
-
Target
SecuriteInfo.com.XLM.Trojan.Abracadabra.1.Gen.7969.24194.xls
-
Size
675KB
-
MD5
a232a0a1cae699df3de319912a1d1a43
-
SHA1
964db62119ffd8bf045c4084e58fac9f99e93ded
-
SHA256
87091a9f7e6707e1ae49c2e0b8e0f93a7ede8762ff8ffb995c6669528ae6b5da
-
SHA512
fe508a8e7e290ce19793f8a475aa3f3fa3ce1deb079e90930f5bddac2d5aa28716af24844035b0a3af69f7e31b2ae513b4aa58e91fff9facfd9d13265c405c60
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3920 EXCEL.EXE 3920 EXCEL.EXE 3920 EXCEL.EXE 3920 EXCEL.EXE 3920 EXCEL.EXE 3920 EXCEL.EXE 3920 EXCEL.EXE 3920 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3920 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3920 EXCEL.EXE 3920 EXCEL.EXE 3924 dwwin.exe 3924 dwwin.exe -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2008 3920 DW20.EXE 66 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3920 wrote to memory of 2008 3920 EXCEL.EXE 71 PID 3920 wrote to memory of 2008 3920 EXCEL.EXE 71 PID 2008 wrote to memory of 3924 2008 DW20.EXE 72 PID 2008 wrote to memory of 3924 2008 DW20.EXE 72 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.XLM.Trojan.Abracadabra.1.Gen.7969.24194.xls"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
PID:3920 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 43082⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 43083⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-