Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    108s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/10/2022, 13:19

General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.62782271.5004.30641.xlsx

  • Size

    631KB

  • MD5

    f0fed0bcc4b919af95a70f7a5e605224

  • SHA1

    4fd73fe3f12d348a03cef90e382966d0562073a3

  • SHA256

    2c05644ade42219257242af1c0299cda243750efac7f59310a07983a04576fd1

  • SHA512

    fdec034b005266902d64820daef469b8a992660ac62d880db36e016d9799927179c8afc12254ed1eb0fb25aaf872ac933486f5757308a9a98b696797d05fbf88

  • SSDEEP

    12288:JMr6aFArJBGuBuHab/rajrt+AzGHOsiACOhu4SQrJeKOCKSZe0C:iJFAFwuBuomdzYeHOhu4nJeBXSU0C

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.62782271.5004.30641.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4232

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4232-132-0x00007FFE63C70000-0x00007FFE63C80000-memory.dmp

    Filesize

    64KB

  • memory/4232-133-0x00007FFE63C70000-0x00007FFE63C80000-memory.dmp

    Filesize

    64KB

  • memory/4232-134-0x00007FFE63C70000-0x00007FFE63C80000-memory.dmp

    Filesize

    64KB

  • memory/4232-135-0x00007FFE63C70000-0x00007FFE63C80000-memory.dmp

    Filesize

    64KB

  • memory/4232-136-0x00007FFE63C70000-0x00007FFE63C80000-memory.dmp

    Filesize

    64KB

  • memory/4232-137-0x00007FFE617F0000-0x00007FFE61800000-memory.dmp

    Filesize

    64KB

  • memory/4232-138-0x00007FFE617F0000-0x00007FFE61800000-memory.dmp

    Filesize

    64KB

  • memory/4232-140-0x00007FFE63C70000-0x00007FFE63C80000-memory.dmp

    Filesize

    64KB

  • memory/4232-141-0x00007FFE63C70000-0x00007FFE63C80000-memory.dmp

    Filesize

    64KB

  • memory/4232-142-0x00007FFE63C70000-0x00007FFE63C80000-memory.dmp

    Filesize

    64KB

  • memory/4232-143-0x00007FFE63C70000-0x00007FFE63C80000-memory.dmp

    Filesize

    64KB