Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
85b455f61c679d481ff562b4454c78ac.xll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85b455f61c679d481ff562b4454c78ac.xll
Resource
win10v2004-20231222-en
General
-
Target
85b455f61c679d481ff562b4454c78ac.xll
-
Size
689KB
-
MD5
85b455f61c679d481ff562b4454c78ac
-
SHA1
419cf72cb631dafbc2a8e219e9e2d2d571d34b7d
-
SHA256
5f1ff93cf4eb1ec53402b5bb959a6fd1d4c94fed041606a39d7b334b699514ec
-
SHA512
f6473932d881fed692d1a973943c68a4e092fbce0dc61dd1894648e5bd99fedff5040c9182b91716f714e4ccfcb873faf3aeb48dad507ff5cdea6975e548e8e8
-
SSDEEP
12288:HHGqRJHO4pMetgC8bzbBSregUIVgFK/UqWgqUAS:HZRJHvkJX1IcLg5V
Malware Config
Extracted
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3852 EXCEL.EXE 3852 EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3852 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3852 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3852 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3852 EXCEL.EXE 3852 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3852 EXCEL.EXE 3852 EXCEL.EXE 3852 EXCEL.EXE 3852 EXCEL.EXE 3852 EXCEL.EXE 3852 EXCEL.EXE 3852 EXCEL.EXE 3852 EXCEL.EXE 3852 EXCEL.EXE 3852 EXCEL.EXE 3852 EXCEL.EXE 3852 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\85b455f61c679d481ff562b4454c78ac.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
689KB
MD585b455f61c679d481ff562b4454c78ac
SHA1419cf72cb631dafbc2a8e219e9e2d2d571d34b7d
SHA2565f1ff93cf4eb1ec53402b5bb959a6fd1d4c94fed041606a39d7b334b699514ec
SHA512f6473932d881fed692d1a973943c68a4e092fbce0dc61dd1894648e5bd99fedff5040c9182b91716f714e4ccfcb873faf3aeb48dad507ff5cdea6975e548e8e8
-
Filesize
27KB
MD5462dfb9040af4477048ace257a8f5242
SHA1034d884e2207640f862f2b75c6f7f801a58cdc59
SHA256057679178d5208fd2fa7e4f7acd124ac7ec3abd3855704150f0884d55dc0d855
SHA51261e194a61308462e80b87ef2d0064a0deaf97f99126fda3b91097c6598458408ff7e393f70f80b2f0daac282b573584a2ed69f5bce80f5d98762dc1975938b7a