Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
128s -
platform
windows10_x64 -
resource
win10 -
submitted
13/07/2020, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.DOC.Kryptik.Q.20559.xls
Resource
win7v200430
Behavioral task
behavioral2
Sample
SecuriteInfo.com.DOC.Kryptik.Q.20559.xls
Resource
win10
General
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.20559.xls
-
Size
296KB
-
MD5
99d2053effd6a4b7aaf0d42ab3a065bf
-
SHA1
345fb54bfaa4c458d15223d604de854600fcb2d8
-
SHA256
473291804cc6e62a92dd5a63b6af620085143cb1fcfbc4baf42792aae2a36a73
-
SHA512
338b62ae3bc03b455bb2e023d9322391bc5da77b93a7897ccc03dad55ecbbf05e19f55acf940122e539dc96e1377269609ed814af12ed3af9f8a9f731ff514e4
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3788 EXCEL.EXE 3788 EXCEL.EXE 3788 EXCEL.EXE 3788 EXCEL.EXE 3788 EXCEL.EXE 3788 EXCEL.EXE 3788 EXCEL.EXE 3788 EXCEL.EXE 3788 EXCEL.EXE 3788 EXCEL.EXE 3788 EXCEL.EXE 3788 EXCEL.EXE 3788 EXCEL.EXE 3788 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3788 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3036 3788 rundll32.exe 66 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3788 wrote to memory of 3036 3788 EXCEL.EXE 71 PID 3788 wrote to memory of 3036 3788 EXCEL.EXE 71 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Enumerates connected drives 3 TTPs
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.DOC.Kryptik.Q.20559.xls"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
PID:3788 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\WbMFNqE\DTXZRqG\fytiOXY.dll,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:3036
-