Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    160s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 16:28

General

  • Target

    100% TT COPY.xlam

  • Size

    620KB

  • MD5

    eb88893f73ee849e3b5d3652f03e3d77

  • SHA1

    c5508f5ea2ea317d300d9d217937de549e3e3eee

  • SHA256

    dca28fc1be6424d51a5ff7f69d50c19b75631c5fabfcbfad25f8f69ee395cb01

  • SHA512

    cafa0b8d93cd408eb7093e1a6591bcb1df82d2dae95589c91d1cf2f24486631c6a8640c77ecfdf7c73abe1e441e151f62453dbd01bc524c6f4426a726a111211

  • SSDEEP

    12288:C6nWWf7RrFwmoLHbcSs5CJIt2Wy1+wp4ghGgQt/7YWhR798J7Hd+z590xhfd3Qx:VZ9rFzBCJX5ddny9CLd+Cgx

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\100% TT COPY.xlam"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4440-0-0x00007FFC59010000-0x00007FFC59020000-memory.dmp

    Filesize

    64KB

  • memory/4440-2-0x00007FFC59010000-0x00007FFC59020000-memory.dmp

    Filesize

    64KB

  • memory/4440-3-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-5-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-4-0x00007FFC59010000-0x00007FFC59020000-memory.dmp

    Filesize

    64KB

  • memory/4440-1-0x00007FFC59010000-0x00007FFC59020000-memory.dmp

    Filesize

    64KB

  • memory/4440-6-0x00007FFC59010000-0x00007FFC59020000-memory.dmp

    Filesize

    64KB

  • memory/4440-7-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-8-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-9-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-10-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-11-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-12-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-13-0x00007FFC56D30000-0x00007FFC56D40000-memory.dmp

    Filesize

    64KB

  • memory/4440-14-0x00007FFC56D30000-0x00007FFC56D40000-memory.dmp

    Filesize

    64KB

  • memory/4440-16-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-17-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-18-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-19-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-20-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-21-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-22-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-23-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-24-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-25-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-26-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-27-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-28-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-32-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-42-0x00007FFC59010000-0x00007FFC59020000-memory.dmp

    Filesize

    64KB

  • memory/4440-43-0x00007FFC59010000-0x00007FFC59020000-memory.dmp

    Filesize

    64KB

  • memory/4440-46-0x00007FFC59010000-0x00007FFC59020000-memory.dmp

    Filesize

    64KB

  • memory/4440-45-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-44-0x00007FFC59010000-0x00007FFC59020000-memory.dmp

    Filesize

    64KB

  • memory/4440-47-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-48-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-49-0x00007FFC98F90000-0x00007FFC99185000-memory.dmp

    Filesize

    2.0MB