Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3AppData/ex...r.xlsx
windows7-x64
1AppData/ex...r.xlsx
windows10-2004-x64
1BouncyCast...to.dll
windows7-x64
1BouncyCast...to.dll
windows10-2004-x64
1DocumentFo...ml.dll
windows7-x64
1DocumentFo...ml.dll
windows10-2004-x64
1ICSharpCod...ib.dll
windows7-x64
1ICSharpCod...ib.dll
windows10-2004-x64
1Newtonsoft.Json.dll
windows7-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1SuperQr.Core.dll
windows7-x64
1SuperQr.Core.dll
windows10-2004-x64
1SuperQr.exe
windows7-x64
1SuperQr.exe
windows10-2004-x64
1WeifenLuo....15.dll
windows7-x64
1WeifenLuo....15.dll
windows10-2004-x64
1WeifenLuo....ng.dll
windows7-x64
1WeifenLuo....ng.dll
windows10-2004-x64
1zxing.dll
windows7-x64
1zxing.dll
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2023, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
AppData/excel_to_qr.xlsx
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
AppData/excel_to_qr.xlsx
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
BouncyCastle.Crypto.dll
Resource
win7-20231025-en
Behavioral task
behavioral4
Sample
BouncyCastle.Crypto.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
DocumentFormat.OpenXml.dll
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
DocumentFormat.OpenXml.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
ICSharpCode.SharpZipLib.dll
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
ICSharpCode.SharpZipLib.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Newtonsoft.Json.dll
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
SuperQr.Core.dll
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
SuperQr.Core.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
SuperQr.exe
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
SuperQr.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral15
Sample
WeifenLuo.WinFormsUI.Docking.ThemeVS2015.dll
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
WeifenLuo.WinFormsUI.Docking.ThemeVS2015.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
WeifenLuo.WinFormsUI.Docking.dll
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
WeifenLuo.WinFormsUI.Docking.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
zxing.dll
Resource
win7-20231020-en
Behavioral task
behavioral20
Sample
zxing.dll
Resource
win10v2004-20231023-en
General
-
Target
AppData/excel_to_qr.xlsx
-
Size
8KB
-
MD5
ebbf524f5dd69f4743b4b6518ab58c28
-
SHA1
a0d9d399d1a8ffa32802187d308b1fb85d9f6e2e
-
SHA256
30e2493a0408dafd0e4763f1166720808222383d562f3871be6c9186b35161f0
-
SHA512
3df9b3d0e0fa9889a5d55f22c8ec15eb69cb21a458e4925d15c5574c6062f9653a4162a904225ebae3dc59d5b8f0691284deb8317ec438c1005b74abe0f87e86
-
SSDEEP
192:wc8mVRVlxb3UcFX6lPf8WuorDCsrxsjtmp:wc3R3tV6ZQoPCAxsjtmp
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4752 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4752 EXCEL.EXE 4752 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\AppData\excel_to_qr.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4752