Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2023, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
03373999.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
03373999.xls
Resource
win10v2004-20230220-en
General
-
Target
03373999.xls
-
Size
1.8MB
-
MD5
fd4ea629d606346a6bce6b46ef0578f8
-
SHA1
703f80d2bfbf6e2c4803e43a1a9fc994798a4dc1
-
SHA256
62cbed8b8215059d60eb35d6b35ebc55bb0d5960fc71c3ac368bab71ddaa85a6
-
SHA512
20a980058b2187dd057e5b3905446a8bb4202311770063acd5ba417d8ad9d4043f63340f212831c4a69cc77488ce8e9ecea10a06f8ad3b0c48407c9c17342d05
-
SSDEEP
49152:4LK5g6ghO0EO0ida6Hg6ghO0EO0mda6V6Ds:oQgZmid/dgZmmd/QD
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1096 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1096 EXCEL.EXE 1096 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1096 EXCEL.EXE 1096 EXCEL.EXE 1096 EXCEL.EXE 1096 EXCEL.EXE 1096 EXCEL.EXE 1096 EXCEL.EXE 1096 EXCEL.EXE 1096 EXCEL.EXE 1096 EXCEL.EXE 1096 EXCEL.EXE 1096 EXCEL.EXE 1096 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\03373999.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1096
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD55e32abe7ed20ed209866c70040c5b2e3
SHA1b5dab88af0ec94ac9bd2bff4fb6a573a5f5c131d
SHA2565a907b3394f4f553a4e0631930fbb6bed9c2a8ffcee562136766f09ad1087cb5
SHA512665e29626990c2b0b761ceee2e2f095bcefdc08e12bfb6b63e60d245e60016f9db1b86485a5499b481d5d16c8a5407f22756552eb80dbf1f61cbcbfd6fc058c9