Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
57s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
24/09/2022, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
01.06.2023_Genel_Siparislerimiz.xlsx
Resource
win10-20220812-en
5 signatures
150 seconds
General
-
Target
01.06.2023_Genel_Siparislerimiz.xlsx
-
Size
102KB
-
MD5
d0227d7497666b6a67046349916f59cd
-
SHA1
07038c8a2c8e42e92c0c75769299a384d95a817e
-
SHA256
a6e96799222a133139c4426067330763acc5f8e59f05e1af8636851b0d6aac89
-
SHA512
5ecc280a150840346999ca40d9ce6c7c0968533f5b6a75325f9eece9b041509fb454227e9848aa967a575803282778c5ee85f5b729fc5712259a59f4b68c175e
-
SSDEEP
1536:C2xdrw5VwtwtaAqU+uQrqwb3BZet4vHOgfagqMgaVSg8Nodl4qrTf1E:d7rw5itUVqUgq4ntfOgfaCgsSzN/qNE
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3884 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3884 EXCEL.EXE 3884 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3884 EXCEL.EXE 3884 EXCEL.EXE 3884 EXCEL.EXE 3884 EXCEL.EXE 3884 EXCEL.EXE 3884 EXCEL.EXE 3884 EXCEL.EXE 3884 EXCEL.EXE 3884 EXCEL.EXE 3884 EXCEL.EXE 3884 EXCEL.EXE 3884 EXCEL.EXE 3884 EXCEL.EXE 3884 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\01.06.2023_Genel_Siparislerimiz.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3884