Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 11:23
Behavioral task
behavioral1
Sample
db94c81ce747e08363197908f003d14e.xls
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
db94c81ce747e08363197908f003d14e.xls
Resource
win10v2004-20231215-en
General
-
Target
db94c81ce747e08363197908f003d14e.xls
-
Size
36KB
-
MD5
db94c81ce747e08363197908f003d14e
-
SHA1
864314c47e0463a732e57ce48b45db55649b4157
-
SHA256
6ad9fb724c2f46ef5c9399fd2472417e966430c9a654af0fb7441cfdc9ecd118
-
SHA512
3939a2c49de7f6cff8e2a0f213f690241d1ee1707b061337944d709ff148948109daaf30b7d943e2c285842206228b76cf58b846be09627b1371515fb3f82607
-
SSDEEP
768:RPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJGJoXZTrglU8o21b:Zok3hbdlylKsgqopeJBWhZFGkE+cL2N7
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2996 4448 explorer.exe 52 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4448 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4448 EXCEL.EXE 4448 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\db94c81ce747e08363197908f003d14e.xls"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4448 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Public\Documents\REOz.vbs2⤵
- Process spawned unexpected child process
PID:2996
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:916
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\REOz.vbs"2⤵PID:5052
-