Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
e0c0e9f81928e0390c8457c71981a6fd.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0c0e9f81928e0390c8457c71981a6fd.xlsm
Resource
win10v2004-20240226-en
General
-
Target
e0c0e9f81928e0390c8457c71981a6fd.xlsm
-
Size
41KB
-
MD5
e0c0e9f81928e0390c8457c71981a6fd
-
SHA1
eb01459a62308dda7d39752c70ea12b0e3e7ce2e
-
SHA256
cc10e21b406451f97601d55dedbc686852861b17cb162c70df995ca442964f95
-
SHA512
492edf85be4a5ba6f46a733fab4e8813ee564e1b33c6825245a8c5d66742dee23ab3087fba445fc57c71dc7edad57c0fc49e85febebcf1f464f05272de922aaf
-
SSDEEP
768:956Ebfx4CHVMrZN0DGCfkyX3eks4pSGn0Qic3qVX1zPBjGI+3:76evVWGzfPeUv02IlzpC
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1352 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1352 EXCEL.EXE 1352 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE 1352 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e0c0e9f81928e0390c8457c71981a6fd.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1352