Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/02/2023, 17:53 UTC

230202-wgjcesbe5t 1

02/02/2023, 00:21 UTC

230202-anerxsdf69 1

Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2023, 17:53 UTC

General

  • Target

    Personal monthly budget1.xlsx

  • Size

    40KB

  • MD5

    b53b1bd8c5d13b78377a150c70d5476c

  • SHA1

    6096c6f9b23ee66ab5b18b28be0c581cd15f7466

  • SHA256

    efc30c2a151fc59178d5670525082d4aaf81e5fb4b175414b3427a2c3aad437f

  • SHA512

    b882dc006183cc359975bdb3aa338c659cb9f4ceccf2249dadc563660f2f2e0b95caee943fa77ff8dc4c430b3818e739ddc8f9a1bb891e0bf2a46bac01f83d18

  • SSDEEP

    768:ec2cloocpwH0VHXbF2Kay92O/qYXB9TMm2mgMIYwVw5Cuv8T1U:eRvxpu6HJ5hbTMmPTI1wh0S

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Personal monthly budget1.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4572

Network

    No results found
  • 20.189.173.12:443
    322 B
    7
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4572-132-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/4572-133-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/4572-134-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/4572-135-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/4572-136-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/4572-137-0x00007FFC232B0000-0x00007FFC232C0000-memory.dmp

    Filesize

    64KB

  • memory/4572-138-0x00007FFC232B0000-0x00007FFC232C0000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.