Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2022, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
42f18ed050fa615002c777ce86a9b464540358b31010b5cfc4bec98137ba753e.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
42f18ed050fa615002c777ce86a9b464540358b31010b5cfc4bec98137ba753e.xls
Resource
win10v2004-20220812-en
General
-
Target
42f18ed050fa615002c777ce86a9b464540358b31010b5cfc4bec98137ba753e.xls
-
Size
108KB
-
MD5
55d3b2bcea799abc14492f9a46749d19
-
SHA1
b4269a8a48deb2ce13c91a6875de089b44bad310
-
SHA256
42f18ed050fa615002c777ce86a9b464540358b31010b5cfc4bec98137ba753e
-
SHA512
b6d5602e64f978282597e9c3668f53c5391df6491b208964e7bdc414a5b13c13b67494025f1c6e304982da7492b0b8f1810b4cfaf16865255b41cf8855357bab
-
SSDEEP
1536:oeeeqreSRHrTCWJGS1102ufmgOzIE8y5LgwLOiTwhWVbKp8zmOzQ7ITkiD2gukOf:CfzIWVb9nzQ7ITkDc/MJtXwuv4DKb
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3876 4996 cmd.exe 80 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4752 4996 cmd.exe 80 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4880 4996 cmd.exe 80 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4996 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4996 EXCEL.EXE 4996 EXCEL.EXE 4996 EXCEL.EXE 4996 EXCEL.EXE 4996 EXCEL.EXE 4996 EXCEL.EXE 4996 EXCEL.EXE 4996 EXCEL.EXE 4996 EXCEL.EXE 4996 EXCEL.EXE 4996 EXCEL.EXE 4996 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4996 wrote to memory of 3876 4996 EXCEL.EXE 92 PID 4996 wrote to memory of 3876 4996 EXCEL.EXE 92 PID 4996 wrote to memory of 4752 4996 EXCEL.EXE 94 PID 4996 wrote to memory of 4752 4996 EXCEL.EXE 94 PID 4996 wrote to memory of 4880 4996 EXCEL.EXE 95 PID 4996 wrote to memory of 4880 4996 EXCEL.EXE 95 PID 3876 wrote to memory of 756 3876 cmd.exe 98 PID 3876 wrote to memory of 756 3876 cmd.exe 98 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 756 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\42f18ed050fa615002c777ce86a9b464540358b31010b5cfc4bec98137ba753e.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\system32\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:4752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:4880
-