Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
8�...23.xls
windows7-x64
1�...23.xls
windows10-2004-x64
1�...21.xls
windows7-x64
1�...21.xls
windows10-2004-x64
1�...23.xls
windows7-x64
1�...23.xls
windows10-2004-x64
1�...2X.xls
windows7-x64
1�...2X.xls
windows10-2004-x64
1�...25.xls
windows7-x64
1�...25.xls
windows10-2004-x64
1�...42.xls
windows7-x64
1�...42.xls
windows10-2004-x64
1�...26.xls
windows7-x64
1�...26.xls
windows10-2004-x64
1�...19.xls
windows7-x64
1�...19.xls
windows10-2004-x64
1�...28.xls
windows7-x64
1�...28.xls
windows10-2004-x64
1�...29.xls
windows7-x64
1�...29.xls
windows10-2004-x64
1�...29.xls
windows7-x64
1�...29.xls
windows10-2004-x64
1�...43.xls
windows7-x64
1�...43.xls
windows10-2004-x64
1�...79.xls
windows7-x64
1�...79.xls
windows10-2004-x64
1�...82.xls
windows7-x64
1�...82.xls
windows10-2004-x64
1�...29.xls
windows7-x64
1�...29.xls
windows10-2004-x64
5�...21.xls
windows7-x64
1�...21.xls
windows10-2004-x64
1Analysis
-
max time kernel
156s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 19:25 UTC
Behavioral task
behavioral1
Sample
Աϱϸ/220521196910201723.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Աϱϸ/220521196910201723.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
Աϱϸ/370283197710044321.xls
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Աϱϸ/370283197710044321.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
Աϱϸ/370602196703093423.xls
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Աϱϸ/370602196703093423.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Աϱϸ/37060219791012432X.xls
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
Աϱϸ/37060219791012432X.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
Աϱϸ/370703198108250325.xls
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
Աϱϸ/370703198108250325.xls
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
Աϱϸ/370727193710070042.xls
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
Աϱϸ/370727193710070042.xls
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
Աϱϸ/370727193909100026.xls
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
Աϱϸ/370727193909100026.xls
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
Աϱϸ/370727194109022319.xls
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
Աϱϸ/370727194109022319.xls
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
Աϱϸ/370727194311140028.xls
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
Աϱϸ/370727194311140028.xls
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
Աϱϸ/370727194501220029.xls
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
Աϱϸ/370727194501220029.xls
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
Աϱϸ/370727194509100929.xls
Resource
win7-20220901-en
Behavioral task
behavioral22
Sample
Աϱϸ/370727194509100929.xls
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
Աϱϸ/370727194512070943.xls
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
Աϱϸ/370727194512070943.xls
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
Աϱϸ/370727194609298979.xls
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
Աϱϸ/370727194609298979.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
Աϱϸ/370727194706280682.xls
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
Աϱϸ/370727194706280682.xls
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
Աϱϸ/370727194706289329.xls
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
Աϱϸ/370727194706289329.xls
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
Աϱϸ/370727194802200021.xls
Resource
win7-20221111-en
Behavioral task
behavioral32
Sample
Աϱϸ/370727194802200021.xls
Resource
win10v2004-20221111-en
General
-
Target
Աϱϸ/370727194706289329.xls
-
Size
13KB
-
MD5
29d222a6bbb4b34c5782ab7ca0328819
-
SHA1
6ddd969e4f473672a9259e85e35598e400b8e51d
-
SHA256
571fab6aad2f116e316adffb7f59ab35b000e36dc01b6718e0d9b7584e647d6a
-
SHA512
1e63246c4f689e73c034d79ea14c5f9a038680630011d7ec4ccc08a0a125ab1f8df23aadadde7f04a9a251bbf605a485be7b1aeced692606e43cac6e46c825f1
-
SSDEEP
48:rYLZgDTRczPS3VduILPrqt1ay75Gcr74fVqHz62dhhyJTR6LU3+:UqDdcGHLqavcrbtRETRVO
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{BFF5B2FD-EB24-49F3-84AB-97468A025DA7}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{ED21D993-4461-417C-9213-8F022EE31263}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1008 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1008 EXCEL.EXE 1008 EXCEL.EXE 1008 EXCEL.EXE 1008 EXCEL.EXE 1008 EXCEL.EXE 1008 EXCEL.EXE 1008 EXCEL.EXE 1008 EXCEL.EXE 1008 EXCEL.EXE 1008 EXCEL.EXE 1008 EXCEL.EXE 1008 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Աϱϸ\370727194706289329.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:3616