Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
72731ce1516...d4.apk
android-9-x86
102731ce1516...d4.apk
android-10-x64
102731ce1516...d4.apk
android-11-x64
10EmailTemplate.one
windows7-x64
1EmailTemplate.one
windows10-2004-x64
1addthis-angular.js
windows7-x64
1addthis-angular.js
windows10-2004-x64
1adform.js
windows7-x64
1adform.js
windows10-2004-x64
1adnexus-ast.js
windows7-x64
1adnexus-ast.js
windows10-2004-x64
1adnexus-prebid.js
windows7-x64
1adnexus-prebid.js
windows10-2004-x64
1adsafeprot...ima.js
windows7-x64
1adsafeprot...ima.js
windows10-2004-x64
1apstag.js
windows7-x64
1apstag.js
windows10-2004-x64
1blogger.js
windows7-x64
1blogger.js
windows10-2004-x64
1bloggerAccount.js
windows7-x64
1bloggerAccount.js
windows10-2004-x64
1bmauth.js
windows7-x64
1bmauth.js
windows10-2004-x64
1branch.js
windows7-x64
1branch.js
windows10-2004-x64
1chartbeat.js
windows7-x64
1chartbeat.js
windows10-2004-x64
1crave-ca.js
windows7-x64
1crave-ca.js
windows10-2004-x64
1criteo.js
windows7-x64
1criteo.js
windows10-2004-x64
1cxense.js
windows7-x64
1Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2023, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
2731ce15164f3117338ffaa0a5656c987449bca56f213db32b6269e20d133fd4.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
2731ce15164f3117338ffaa0a5656c987449bca56f213db32b6269e20d133fd4.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
2731ce15164f3117338ffaa0a5656c987449bca56f213db32b6269e20d133fd4.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
EmailTemplate.one
Resource
win7-20231023-en
Behavioral task
behavioral5
Sample
EmailTemplate.one
Resource
win10v2004-20231023-en
Behavioral task
behavioral6
Sample
addthis-angular.js
Resource
win7-20231023-en
Behavioral task
behavioral7
Sample
addthis-angular.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral8
Sample
adform.js
Resource
win7-20231020-en
Behavioral task
behavioral9
Sample
adform.js
Resource
win10v2004-20231025-en
Behavioral task
behavioral10
Sample
adnexus-ast.js
Resource
win7-20231020-en
Behavioral task
behavioral11
Sample
adnexus-ast.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral12
Sample
adnexus-prebid.js
Resource
win7-20231020-en
Behavioral task
behavioral13
Sample
adnexus-prebid.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral14
Sample
adsafeprotected-ima.js
Resource
win7-20231025-en
Behavioral task
behavioral15
Sample
adsafeprotected-ima.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral16
Sample
apstag.js
Resource
win7-20231023-en
Behavioral task
behavioral17
Sample
apstag.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral18
Sample
blogger.js
Resource
win7-20231023-en
Behavioral task
behavioral19
Sample
blogger.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral20
Sample
bloggerAccount.js
Resource
win7-20231023-en
Behavioral task
behavioral21
Sample
bloggerAccount.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral22
Sample
bmauth.js
Resource
win7-20231025-en
Behavioral task
behavioral23
Sample
bmauth.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral24
Sample
branch.js
Resource
win7-20231020-en
Behavioral task
behavioral25
Sample
branch.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral26
Sample
chartbeat.js
Resource
win7-20231023-en
Behavioral task
behavioral27
Sample
chartbeat.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral28
Sample
crave-ca.js
Resource
win7-20231023-en
Behavioral task
behavioral29
Sample
crave-ca.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral30
Sample
criteo.js
Resource
win7-20231020-en
Behavioral task
behavioral31
Sample
criteo.js
Resource
win10v2004-20231025-en
Behavioral task
behavioral32
Sample
cxense.js
Resource
win7-20231020-en
General
-
Target
EmailTemplate.one
-
Size
13KB
-
MD5
3c5691f650b4933195c33b9438ffd654
-
SHA1
876e3f9d586e83b5e46d2909c66196b737f37df6
-
SHA256
eacc312f8739991f01bede6d273635778425abfb9351d574503f41a24945d638
-
SHA512
264b0aeb411d7fff8e22fa9abd0caf817475a7ef8f48a306264f7a3a6300e826f9b53a769b0b35dfa02cca23a586e25e46cfa378c271f0e2e67c58457bb695b4
-
SSDEEP
192:NHxGl178KImBDFZ2Dp2v5N03KJhOAH0ejB:Kl/hFZMUR+3KIe1
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1904 ONENOTE.EXE 1904 ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1904 ONENOTE.EXE 1904 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 1904 ONENOTE.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE 1904 ONENOTE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE"C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE" "C:\Users\Admin\AppData\Local\Temp\EmailTemplate.one"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1904