Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 16:25

General

  • Target

    c912d74e5ac32f0e69fa9c7d861f1bf3.xlsm

  • Size

    41KB

  • MD5

    c912d74e5ac32f0e69fa9c7d861f1bf3

  • SHA1

    c0cee56c35682d725115c3262f9d265948ccc468

  • SHA256

    31c21879ce67978cbae9741fde86285a97e531f31b02bfac402f94ff5517f3b0

  • SHA512

    8a3b6a8194af0e434b9b90f2a33ffb96abdca608d9c553cddaebd19dbb7020fe67439df976eee988bf0aa0919cb281d9e41fa3cf38321edde2cef2063107ab40

  • SSDEEP

    768:B6Mbfx8kbgwmURgXVBa9z+nOUF+GrK92qmPnwpbRvHxqpXwJTFvH2yBM81ezpAO8:B6mXbjvRAa9zyQPMubo6zoHI

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c912d74e5ac32f0e69fa9c7d861f1bf3.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2288-0-0x00007FFCCC230000-0x00007FFCCC240000-memory.dmp

    Filesize

    64KB

  • memory/2288-1-0x00007FFCCC230000-0x00007FFCCC240000-memory.dmp

    Filesize

    64KB

  • memory/2288-2-0x00007FFD0C1B0000-0x00007FFD0C3A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-3-0x00007FFCCC230000-0x00007FFCCC240000-memory.dmp

    Filesize

    64KB

  • memory/2288-4-0x00007FFD0C1B0000-0x00007FFD0C3A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-5-0x00007FFCCC230000-0x00007FFCCC240000-memory.dmp

    Filesize

    64KB

  • memory/2288-6-0x00007FFCCC230000-0x00007FFCCC240000-memory.dmp

    Filesize

    64KB

  • memory/2288-7-0x00007FFD0C1B0000-0x00007FFD0C3A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-8-0x00007FFD0C1B0000-0x00007FFD0C3A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-9-0x00007FFCC9CA0000-0x00007FFCC9CB0000-memory.dmp

    Filesize

    64KB

  • memory/2288-10-0x00007FFCC9CA0000-0x00007FFCC9CB0000-memory.dmp

    Filesize

    64KB

  • memory/2288-21-0x00007FFD0C1B0000-0x00007FFD0C3A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-24-0x00007FFD0C1B0000-0x00007FFD0C3A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-40-0x00007FFCCC230000-0x00007FFCCC240000-memory.dmp

    Filesize

    64KB

  • memory/2288-41-0x00007FFCCC230000-0x00007FFCCC240000-memory.dmp

    Filesize

    64KB

  • memory/2288-43-0x00007FFCCC230000-0x00007FFCCC240000-memory.dmp

    Filesize

    64KB

  • memory/2288-42-0x00007FFCCC230000-0x00007FFCCC240000-memory.dmp

    Filesize

    64KB

  • memory/2288-44-0x00007FFD0C1B0000-0x00007FFD0C3A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-45-0x00007FFD0C1B0000-0x00007FFD0C3A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-46-0x00007FFD0C1B0000-0x00007FFD0C3A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2288-47-0x00007FFD0C1B0000-0x00007FFD0C3A5000-memory.dmp

    Filesize

    2.0MB