Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
solicitud de cotizaci�n909#.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
solicitud de cotizaci�n909#.xls
Resource
win10v2004-20240221-en
General
-
Target
solicitud de cotizaci�n909#.xls
-
Size
374KB
-
MD5
fa3267601e7ae603efa62bae7e8e5ab5
-
SHA1
5d16d6cf76984e6f228aa737ade7a0194e19dcb1
-
SHA256
bd1d2e0fc5a13b960fc305b05497e9c0d6e31137ed831a0d7523cea5cdaa50d3
-
SHA512
8f3f9c2453f3a8e2c94d2a4cf7cf5619c9ecdb669c4543a7ebdc5b88ccc5e84819ce31608ce4bef29369cbb3dfb94a995c36dba4a48fea47c0cef8bf543adfb6
-
SSDEEP
6144:PC5zvCp4sJgtouzdDHBMixiMK6G+ZFrTgT1WWnJaFBxe+PREJqE2QxxGl74:PC5bCfgtomdjpozwjT2kWcPc+PEqEj
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3648 EXCEL.EXE 4232 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 4232 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3648 EXCEL.EXE 3648 EXCEL.EXE 3648 EXCEL.EXE 3648 EXCEL.EXE 3648 EXCEL.EXE 3648 EXCEL.EXE 3648 EXCEL.EXE 3648 EXCEL.EXE 4232 WINWORD.EXE 4232 WINWORD.EXE 4232 WINWORD.EXE 4232 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4676 4232 WINWORD.EXE 96 PID 4232 wrote to memory of 4676 4232 WINWORD.EXE 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\solicitud de cotizaci�n909#.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3648
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5c759c2be632ad5d62f455ccaba0cafe2
SHA17379c7b105e8d3c30fe2cd156302be43033d1c80
SHA25626a3fb2cbb7fc57f40f35769d8b074f523806a5d11d196d692090f2c7d9dbff9
SHA512cc258302d4f7589530c2bb3640fbbbe9e19bbc4cf7b059dee02128d3db663503143dba632802a3953a270657d20da5928c80a41bb73da6098a8f309796af5922
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD585eae61dc837906c49c6cc99115553f3
SHA139da539bb48e0bfd7593c88b961de3579d216f7e
SHA2566f6beaa34042a42e6c278bb5129bde8872c5d090a033583c3469607fe4117624
SHA51210b7c64e1921c0dc659deaac6f57142bbc356bf5e8ad82a1de599333dd5baa59a0b507eb8b4d2c465cdfb2189db1a2182471eae349f22cc0e444343bbb479cc9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\AYZZE35H\afterhergafteroldfuckupbysomeonetointernationalloverfailuretounderstandhowfasterthenbeforetoundrser[1].doc
Filesize67KB
MD5c4701f6b6cb718b6eb6a7e17ad33824b
SHA1a5e8f793dc6cff3243395b231bec53fe74812bb7
SHA256dd12871d16f6295e4d41da4b96a12e0c4e9b63a9faf9627520ef04070bce7c92
SHA512ed7b205584e374b24331959409fb35c4875ac6334d3e2931e4984d203f1c00ed69fb8103796e4b19b75fa13cd9bb7ea53dce341872ecbddda56ec84c7f30e3a7