Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
200s -
max time network
216s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
294e85bd632ed56aef94657dedbe365b.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
294e85bd632ed56aef94657dedbe365b.doc
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
decrypted.xlsx
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
decrypted.xlsx
Resource
win10v2004-20231215-en
General
-
Target
decrypted.xlsx
-
Size
1.2MB
-
MD5
a2026adeec6d915616be9b71717ea049
-
SHA1
eb8e56bfa357d61a70b0738e7dfd7b66caa7eb39
-
SHA256
4c40d9209d559dc817aa5ab07d61380bf65f2f470e248e07e03b1786faaf0747
-
SHA512
2974720d5430dea94963432bf41461ecdb6e24a45c1734851735818fd6944d66b9503e99196fad905e2cab4b234411f740349cbb66c544d4d467033b16caec92
-
SSDEEP
24576:55MXuKNTQa+XYewyOGGGnG0GGG7jpP7OGGGTU5dUGGGyltXBH1Yd7aWbxLIAr8JF:/MfTQa+IewyOGGGnG0GGG7jpP7OGGGTR
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 756 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 756 EXCEL.EXE 756 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 756 EXCEL.EXE 756 EXCEL.EXE 756 EXCEL.EXE 756 EXCEL.EXE 756 EXCEL.EXE 756 EXCEL.EXE 756 EXCEL.EXE 756 EXCEL.EXE 756 EXCEL.EXE 756 EXCEL.EXE 756 EXCEL.EXE 756 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\decrypted.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:756