Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
16/10/2023, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
to.js
Resource
win10-20230915-en
General
-
Target
to.js
-
Size
1.6MB
-
MD5
5e4ffc4c684dff33e93e3458b6d8bf4e
-
SHA1
fd078617e4ebcc5d42840684c1616e3be5f6aff7
-
SHA256
0415dcb6b7c2b05ba045ca7c5788da43f7257b065457186e3ea0d0d31d81bea3
-
SHA512
5ceddeb9a2e08c4dfa67fcb903b1960606694a935852ae8442eef41e2f28886c1093bff7fc29a5e33e3b4c1a9041afbb46a66e1c989a68d75639beb301faa623
-
SSDEEP
24576:uJ+Og0CHWGpMBc9qrLILzmRhnFVUKPp3EzJ+Og0CHWGpMBc9qrLILzmRhnFVUKPM:7Vm83HoJjVm83HoJ+
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5004 EXCEL.EXE 2148 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 2148 EXCEL.EXE 2148 EXCEL.EXE 2148 EXCEL.EXE 2148 EXCEL.EXE 2148 EXCEL.EXE
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\to.js1⤵PID:4940
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5004
-
C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\457ABE4E-9A60-46A6-AD69-1873E3D2ADBE
Filesize156KB
MD5027bf292486e8012fb057bdf486a2f2f
SHA1597ebeabccd4e14ac9eb25750a98620a64cc7f2b
SHA2567c0f2c295fb0559f7d7e51a5d66dd6d8ead1eeed182fd3dbafe44f5399a0d54e
SHA51239df50fe8a0bbf9ff9fdc94d86eeb669def06d1d4fc36b15b70d2436f067750939edef56604e192c4583a5b041cbd3ff4bfa2aaee1a19bf6fa85f2c2ff191809
-
Filesize
322KB
MD50487d69acce98818cecc29feef2049d2
SHA1c416157b43a4630ee0f13ab652118cd42e9397e1
SHA25692a6e62890c2cfedc8c7597cfd8dfec156346e2391fecfc8c47f06b659cd94c0
SHA51254ed3a2c3e55a1caff0a43978f62ba7ff9050dadfddc91b174afa6d77e5b4b00019e986bee30a8c3408110d613ca59f95542868e0bb269bf6eb65a53fe7422af
-
Filesize
24KB
MD58665de22b67e46648a5a147c1ed296ca
SHA1b289a96fee9fa77dd8e045ae8fd161debd376f48
SHA256b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f
SHA512bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da