Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
order703233.xls
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
order703233.xls
Resource
win10v2004-20230703-en
General
-
Target
order703233.xls
-
Size
1.1MB
-
MD5
8cc4e73f5ceb73680f5f59b09997d8a3
-
SHA1
263fb5f059b972f779b4f5d14fb8e674a5b6c799
-
SHA256
e68ea041c96b370e4d00b77da341aef26e7e25403198f5a49e9f9e310f66dc90
-
SHA512
6dc39b4d0065b9bddd34ee65bd2369fd61d6b14fe4e2dd69aefca48ace7b6b974fb8c151b85d7bc50ceebe44b935b15358126cf876e95720da975e76fb792613
-
SSDEEP
24576:Ez0w6sYz+o0xfsjcUos+xKXw6s5zDo0xfsjcUos+xKN3tYjYqJP46w7B:ET6sYOxfsjdos+xKA6s5Txfsjdos+xKp
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4572 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4572 EXCEL.EXE 4572 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4572 EXCEL.EXE 4572 EXCEL.EXE 4572 EXCEL.EXE 4572 EXCEL.EXE 4572 EXCEL.EXE 4572 EXCEL.EXE 4572 EXCEL.EXE 4572 EXCEL.EXE 4572 EXCEL.EXE 4572 EXCEL.EXE 4572 EXCEL.EXE 4572 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\order703233.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5476c7c2f309c957f6428d04e94c4f64a
SHA1f1b0fa252babfb7002dc87069a436ad71bda532f
SHA256c0da66b866cc999aee20456c2eee3eefc05046b8f5df3755f95fecb85f9f8be5
SHA512c941fbacc6c98b556ea742538b2f2c61a66be677aa5f97457dfe07ea9652e17fe545ac05740f8ed20b1449fdcf38e97c49fe73ff8d53220a4e8d3e6e3615854e