Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    219s
  • max time network
    234s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 22:46

General

  • Target

    cec574ced782ba8ad042247f3716b44c24b8cd842f1342432885e3cdbc0ba7e1.xls

  • Size

    54KB

  • MD5

    abc0ea28ddf16da0c773f78c0bfe6df7

  • SHA1

    58d256791aa2b59958cef87c1d13764fcab7828b

  • SHA256

    cec574ced782ba8ad042247f3716b44c24b8cd842f1342432885e3cdbc0ba7e1

  • SHA512

    21cbac64188c8da1788cd343fa09a567fb4cd1f5a2faf29f4a1d048d37fed00e1d7afbe287ba054ebc4c6e551f7c9dfd4b0b95b69b6ff4d55039b31a7bf77630

  • SSDEEP

    768:m888w8I+NJOpVR2Ur6AAKObxrZXWv7DwXP244gmzMglPCF3vIPbA:m888w8I+NJOpTr6xiMPA5zMPF3vI8

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cec574ced782ba8ad042247f3716b44c24b8cd842f1342432885e3cdbc0ba7e1.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:5096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5096-132-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/5096-133-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/5096-134-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/5096-135-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/5096-136-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/5096-137-0x00007FFBEDA70000-0x00007FFBEDA80000-memory.dmp

    Filesize

    64KB

  • memory/5096-138-0x00007FFBEDA70000-0x00007FFBEDA80000-memory.dmp

    Filesize

    64KB

  • memory/5096-140-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/5096-141-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/5096-142-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/5096-143-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB