Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08/02/2023, 19:48
Behavioral task
behavioral1
Sample
97b7c1f07a298273b65fd89ca73a0d9315b8e864df0dc8f71ea982151872a2ce.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
97b7c1f07a298273b65fd89ca73a0d9315b8e864df0dc8f71ea982151872a2ce.xls
Resource
win10v2004-20221111-en
General
-
Target
97b7c1f07a298273b65fd89ca73a0d9315b8e864df0dc8f71ea982151872a2ce.xls
-
Size
192KB
-
MD5
e77733eaf39be4c0c617ca0d04de7e92
-
SHA1
ecfec5905eb8cad7e4bb2ab250eaf2e068762475
-
SHA256
97b7c1f07a298273b65fd89ca73a0d9315b8e864df0dc8f71ea982151872a2ce
-
SHA512
b67fc175f614a5a08279b1ded721861847657df856dd43548875d356e4221d42c513f4a6e1c918605d408d15668afded47ba34cc35e778c6c7c7039e080128ea
-
SSDEEP
6144:sxEtjPOtioVjDGUU1qfDlavx+c/UgLYrG4Hiestu:QsY
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4624 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE 4624 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4624 wrote to memory of 4044 4624 EXCEL.EXE 89 PID 4624 wrote to memory of 4044 4624 EXCEL.EXE 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\97b7c1f07a298273b65fd89ca73a0d9315b8e864df0dc8f71ea982151872a2ce.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4044
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3852