Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
29s -
max time network
18s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18/04/2023, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
export-tvm-security-recommendations MacOS.csv
Resource
win10-20230220-en
5 signatures
150 seconds
General
-
Target
export-tvm-security-recommendations MacOS.csv
-
Size
2KB
-
MD5
90fa6c4d9ee59f05a8a5333230c2cc25
-
SHA1
83a3a5a09c9d7e76ac61cc3b68fdb5ba5f6a8eea
-
SHA256
922f9a5ccc0efda05d1cde838cbb24a50f0c25290cdac3a73bc59ac7d2ecebc9
-
SHA512
be04dc5924b5c2b6d42e029f45e743d8431a674317322a441f90938410a285734561b47e7d1367071ce9c325747e4e3a2fdb36e32d6d89f2522f53b129b017f7
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4080 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4080 EXCEL.EXE 4080 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\export-tvm-security-recommendations MacOS.csv"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4080