Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
14/06/2023, 17:21
230614-vw6wlabh9t 114/06/2023, 15:25
230614-st3eaaaf63 114/06/2023, 15:11
230614-skydzaaf7t 114/06/2023, 15:08
230614-sjbhtaae36 1Analysis
-
max time kernel
191s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2023, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
toCheck.xlsx
Resource
win10v2004-20230220-en
6 signatures
300 seconds
General
-
Target
toCheck.xlsx
-
Size
5.2MB
-
MD5
d58c7369c34cd53ff2fb0f76fe059756
-
SHA1
e9d2f46c9bf3d82ec9b744fa5aebc9b58f71bb55
-
SHA256
79c1cc9bac58aa158b79e021830f158e53e1867aa3d2192aa0ffd71d008f10f4
-
SHA512
a67e26b425eff318931bf80e0e4f47586dc2ea7a320a8246f88d108cfe056587d2f3e007db9990df07758143ef58a3688f0a56fc41200a04fcd5a55cec88050d
-
SSDEEP
98304:Lp5XZT7sP3WxQSHS72DPUG08GzYr4P9yl8TlYabZv98YkvTGDq9A3Cksmw:V5JT7ZQSHSSwb8X8P9m83Nvavu/Pw
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3804 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 3804 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3804 EXCEL.EXE 3804 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE 3804 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\toCheck.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3804