Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
02/04/2023, 14:22
230402-rpxgssaa81 1Analysis
-
max time kernel
493s -
max time network
495s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
wifi.csv
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
wifi.csv
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
wifi.csv
-
Size
1.7MB
-
MD5
dd664364a9cba6de52e16a0bfac2d06c
-
SHA1
887739181fb81c6f71f1915e4a3f2b04d91b53fe
-
SHA256
6ba8f0e53a1635b4a5474c748d1be91611203b95b538de49d760bac18b4bacbb
-
SHA512
8f2bd027e743350203ec56c2edbeba7a1d41344b3cf0ec2d78c1ca8a75b550a8a957abdcb45f5c0aa22817f955c1bb91df2a1044f746a8da727939c8f9ee4605
-
SSDEEP
1536:VzXS8GG5n8X66i8nebL5M3QklHLxpvPynerxY5UJkm62L8sFE7u6k1C30gb8LjZ2:ZS8G3HiZunnvGMFxNpJs
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1632 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1632 EXCEL.EXE 1632 EXCEL.EXE 1632 EXCEL.EXE 1632 EXCEL.EXE 1632 EXCEL.EXE 1632 EXCEL.EXE 1632 EXCEL.EXE 1632 EXCEL.EXE 1632 EXCEL.EXE 1632 EXCEL.EXE 1632 EXCEL.EXE 1632 EXCEL.EXE 1632 EXCEL.EXE 1632 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\wifi.csv"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1632