Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
e882a1dd4b17dc254c6480775eacc7bc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
Inespresso.xlm
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
Inespresso.xlm
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Nemica.xlm
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
Nemica.xlm
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
Ora.xlm
Resource
win7-20240215-en
Behavioral task
behavioral7
Sample
Ora.xlm
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
Sara.xlm
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
Sara.xlm
Resource
win10v2004-20240226-en
General
-
Target
Ora.xlm
-
Size
456B
-
MD5
18b24f12fdd4bd6d5efb8cfbdb678913
-
SHA1
f5c907df748cce46ed713cae112c5db4a36ba040
-
SHA256
560533a9c03a9ec0befcfe79bbda4af6302b57a567eff87f0a8b74043b427340
-
SHA512
c2d019d4e6fbdf22809914d8cd15570f9ac64c0f5cb3bdcbcbb346fa3c1082a564926ceb058337f32c6897f0a620203f2d296bae65516a3dc5436cac2098781a
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1740 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1740 EXCEL.EXE 1740 EXCEL.EXE 1740 EXCEL.EXE 1740 EXCEL.EXE 1740 EXCEL.EXE 1740 EXCEL.EXE 1740 EXCEL.EXE 1740 EXCEL.EXE 1740 EXCEL.EXE 1740 EXCEL.EXE 1740 EXCEL.EXE 1740 EXCEL.EXE 1740 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Ora.xlm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1740