Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1784s -
max time network
1142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
2023-10-08 BD_MINDEPORTE 1364 2021 - Editable.xlsm
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-10-08 BD_MINDEPORTE 1364 2021 - Editable.xlsm
Resource
win10v2004-20230915-en
General
-
Target
2023-10-08 BD_MINDEPORTE 1364 2021 - Editable.xlsm
-
Size
959KB
-
MD5
6f387e900d189fc2adb2ebb4b0662294
-
SHA1
a121c091bf40df476facd7386e60d53d5e514623
-
SHA256
b1b32a2ee8209734f7c6139e29755a255398360ec141ae49e57b7aa8ceffb7b6
-
SHA512
a8532f8d5c044418a05193a3244f8884c6cdb4bbf3cdb0de5e984b9512d3f9500083779cc35f4f82a8300210676c0dd4f1cc4be9d4bd7830c48e6bf5500841f3
-
SSDEEP
24576:YnX3syDywqvNvSlzRIBkYln+i19RXXvvcu4NGuKsrI:q2wZzRIBkYlnlfRXnENGuKF
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1940 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1940 EXCEL.EXE 1940 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1940 EXCEL.EXE 1940 EXCEL.EXE 1940 EXCEL.EXE 1940 EXCEL.EXE 1940 EXCEL.EXE 1940 EXCEL.EXE 1940 EXCEL.EXE 1940 EXCEL.EXE 1940 EXCEL.EXE 1940 EXCEL.EXE 1940 EXCEL.EXE 1940 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2023-10-08 BD_MINDEPORTE 1364 2021 - Editable.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1940