Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2022, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
4_202210250456866742.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4_202210250456866742.xls
Resource
win10v2004-20220812-en
General
-
Target
4_202210250456866742.xls
-
Size
52KB
-
MD5
d3032968085db665381d9cbd3569f330
-
SHA1
9230520c6dd215e2152bb2e56b2a5d6b45ae8e13
-
SHA256
eb84a283ff58906786d63ffe43a8ff2728584428f5f7d9972c664f63f8790113
-
SHA512
2cb77be543bd5c37aa1b5fdc16a5b0b6775f0460ed4ebb3086d610b24e3064075bc9c5810e9a034ac1e9b47e5dd4d00c3a13868eda24a8356e3a1b2128241918
-
SSDEEP
1536:6eQlYkEIbSkKBEqEXPgsRZmbaoFhZhR0cixIHm0pS5iCGKqfx/30FramMC:6rlYkEIuPm3fNRZmbaoFhZhR0cixIHmZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4240 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4240 EXCEL.EXE 4240 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE 4240 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4_202210250456866742.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4240