Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 02:28

General

  • Target

    a866e37b241cd75fa676a44850bc5cede4860a73e8ec3613e50f05f6bc6e3b63.xls

  • Size

    47KB

  • MD5

    2c027af9d0afec6805996f188243b6da

  • SHA1

    74a216a6f4e5812c532bd07e48def8ed4ccbe891

  • SHA256

    a866e37b241cd75fa676a44850bc5cede4860a73e8ec3613e50f05f6bc6e3b63

  • SHA512

    0c803e87405771f1e09398bc85fa89c71dd750ae7424023efde0ec7ba42520eb017fd7453638da398a8a3e3e908b690b2f81c9c6f8fc6cfd8c92645144f53886

  • SSDEEP

    768:9yBP0xlAYB5uiHUSq9iS/+eGywKfZAvHk3+J9cpRA6k:968T1BsszS/+ewKf2J+pRAv

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a866e37b241cd75fa676a44850bc5cede4860a73e8ec3613e50f05f6bc6e3b63.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4492-0-0x00007FFA139F0000-0x00007FFA13A00000-memory.dmp

    Filesize

    64KB

  • memory/4492-3-0x00007FFA53970000-0x00007FFA53B65000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-4-0x00007FFA53970000-0x00007FFA53B65000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-5-0x00007FFA139F0000-0x00007FFA13A00000-memory.dmp

    Filesize

    64KB

  • memory/4492-6-0x00007FFA53970000-0x00007FFA53B65000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-7-0x00007FFA139F0000-0x00007FFA13A00000-memory.dmp

    Filesize

    64KB

  • memory/4492-2-0x00007FFA139F0000-0x00007FFA13A00000-memory.dmp

    Filesize

    64KB

  • memory/4492-8-0x00007FFA53970000-0x00007FFA53B65000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-1-0x00007FFA139F0000-0x00007FFA13A00000-memory.dmp

    Filesize

    64KB

  • memory/4492-9-0x00007FFA53970000-0x00007FFA53B65000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-10-0x00007FFA11220000-0x00007FFA11230000-memory.dmp

    Filesize

    64KB

  • memory/4492-11-0x00007FFA11220000-0x00007FFA11230000-memory.dmp

    Filesize

    64KB

  • memory/4492-33-0x00007FFA53970000-0x00007FFA53B65000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-34-0x00007FFA53970000-0x00007FFA53B65000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-50-0x00007FFA139F0000-0x00007FFA13A00000-memory.dmp

    Filesize

    64KB

  • memory/4492-51-0x00007FFA139F0000-0x00007FFA13A00000-memory.dmp

    Filesize

    64KB

  • memory/4492-53-0x00007FFA139F0000-0x00007FFA13A00000-memory.dmp

    Filesize

    64KB

  • memory/4492-52-0x00007FFA139F0000-0x00007FFA13A00000-memory.dmp

    Filesize

    64KB

  • memory/4492-54-0x00007FFA53970000-0x00007FFA53B65000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-55-0x00007FFA53970000-0x00007FFA53B65000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-56-0x00007FFA53970000-0x00007FFA53B65000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-57-0x00007FFA53970000-0x00007FFA53B65000-memory.dmp

    Filesize

    2.0MB