Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0.xls
Resource
win10v2004-20240508-en
General
-
Target
1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0.xls
-
Size
420KB
-
MD5
65ae45789b58f1e03a4f8c3f178e6b30
-
SHA1
4eb87b3825da0d23d7f7091c2976e1e95cc40907
-
SHA256
1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0
-
SHA512
6d7da073e7280bf84612920a6371b19a1226fa50747587dbfe9fe10ed6bdf514ab8b171605d34a0a090d5f9ee3dbe4ec5e6fa379a73dc4675c8f4e46e359e864
-
SSDEEP
6144:NZ+RwPONXoRjDhIcp0fDlavx+W26nAHu8uniSHBMixiMK6G+ZFrTUvCp4sJgpQMD:31iQpozwjTqCfgdhd/+Z4uCz2BFmDiP
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2516 EXCEL.EXE 3984 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 3984 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2516 EXCEL.EXE 2516 EXCEL.EXE 2516 EXCEL.EXE 2516 EXCEL.EXE 2516 EXCEL.EXE 2516 EXCEL.EXE 2516 EXCEL.EXE 2516 EXCEL.EXE 2516 EXCEL.EXE 2516 EXCEL.EXE 2516 EXCEL.EXE 2516 EXCEL.EXE 3984 WINWORD.EXE 3984 WINWORD.EXE 3984 WINWORD.EXE 3984 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3984 wrote to memory of 1912 3984 WINWORD.EXE 90 PID 3984 wrote to memory of 1912 3984 WINWORD.EXE 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2516
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1912
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5e911d5250fd2c67530801b2c146e56ad
SHA1c5452baaee6e85d4129c0f35f5d4182fa3b225f8
SHA256c27edf2fc78bb8ea82d5bca8f2aa9a6ba9a7a62f8e75c9f1af92dec7bfcb229d
SHA5120eb3e6a4bffe7eca9f3c62e89c71f92b2e4527cd240cfd0743a5abf492e44f7c22128c402c02b34177f34ae83f06fa24cf22fbabab58ecc4fc4935e342f56b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5746100ab0a1dcd9927c49dfa99f2ceb8
SHA10235d8436fb96e3c93a4b126be352106c0652c4d
SHA256ed6ea5ca103d2465cc4ece749640e6dc04d0301968740747123cbedc619e7696
SHA512fb96521f750eec9fc18493d095d4d15645d346c0061866368dd5575a23a4a26e95e3a3385add0f7897226b989534dbdad46696579ab84377ab03511a56f438d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD579a17e9a5d9cc73d2f617501b2ab544f
SHA19a6437dd68319e9d42592e9a9a2deccec97e0c12
SHA2561373f769ac2ae17e884a2d224820318b67146ffb22d99d4e5a3dbedf6d8391f1
SHA5125180a568eb9cc962c599b25e23d31c9c17d65ea239788942fd776f657424bf227517087eb72a7e2674604604ee6a8b4e2c4b299af5c62b4d07156a1df45964d9
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\37AA3F0D-1B3A-4421-8D8E-E518CF1AE2C1
Filesize160KB
MD562f3afe6303cc356ceb369da4fefa0ec
SHA10e0cf390a93ad169567d4658e20d90d41e77f44f
SHA25601ae6284f05eeb4909898fc124e9b903e6ada8116bd6b181fab1b406431e7265
SHA5127fdee7a711d9c22e69655e0798eeabb46a32865c8e17bb8565f3303bd4a9c352405ec51a1c9a22a36965594758bf4d9b9c8de21dd599434fd4e58f67c42426fb
-
Filesize
21KB
MD55b4427f4c08c523e6315bf170845c636
SHA1d499ee9708cbea71c9a80f3824c4edc40f9eaec3
SHA256fb89df226c1f3a70415b90e8f02555296bfbfa740ec65caf9b2dde8e22e7e042
SHA51221a66587380ce86c4b79594cadeaad774234d0e5b983a7d63dc98c005a6918d2e82e451e3fd22e5fdb1912089430f126bc90a0a8805073d6b40801f22a7488c3
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD56955d597592f384c06f23758b8913b81
SHA1185d3e591d08b0a17c140cc83f8e6795de1e692a
SHA256758ae12bfa3792c019fca1ff323c71397e73398e830486f64b46ca04a12ed391
SHA512f986328fbbb5b1ab3b0cc6666dbdc014705cb0f8ce6a5cf07d0890690ba2d13ff0292305704b28d873ac849ddba37f86143cfb18d4da0f6801a40e21e3f5e7b8
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD578b438aca8db0555db01ce1710c040eb
SHA1fa5c57d045b86c2beb9ae0d87b29717236da74ab
SHA256ba233af5020fbad0ab067929e66291e2c916ebc7ee2d0d0bef5d62a54d645538
SHA512dbba7a8222e84d6dfa07f1bed80dedf5b2b8d9c6ad32e919a847d2c2406c8c871d3a9a25cfac565310ddb855de7d2dc6650d4bebadbf8ef919abfb00e364d048
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKWDYRX8\everythinggoingfineandgreatwithbeautiuflthingstounderstandhowmuchsheisbeautiufleverytimeiwanthatgirltobeonline___reallyamazingbeautiuflgirl[1].doc
Filesize62KB
MD592f0065ee050a8dcd89fc59eddb048c7
SHA17cba72ead525aa1bdfd345932c482d75c466c038
SHA256e68d3b5df02784a45bd0292c8526942e01c2817cb45dbbee9ef76face03e9830
SHA5129c930fb53ac1e2dc37d680eecc4777a66ce7016279a37afb097c886fac2031ace81065d06073208bb9f23c842661fb063c6fe2275bc9cfb0b5246f228336d20f
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
229B
MD5c644ce6bf3c01a51b615227a2d11d69d
SHA19c480b8330926e8ea6e0587a6a333674037d98bd
SHA25663a57c455db25d4e679932522cb15387b8c2cac23d83c13d34cbc4be1e3d1bcb
SHA5127fbe65e47c896ec7f2b0063ec1b01649c4334814ea6abfba4158e877939a17b795fee3608aaf440fedeef718e6649a719554fc96e0d83bec7d239a7c853e0a37
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD579716070347bb0b2ee2762c13f346bdb
SHA185232d777cd5072c8d785144cadc873670ae45cc
SHA25682afb217ee22011869838d41c35665cd83a4851f84d5dd3c7bf4821baaf656b0
SHA5122dd750624afe8a8d1719b44e41f6742318872c3486f682673e0f4818383b1fe128a2e533bf86d0d49e6faecb9c89f05d2d8ed541b9ed2be012cc73d1b68d87c7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize5KB
MD52301408fe53b22fe72bf0eff3228ee3e
SHA11b243ee34c65c71dd4732bf539b839980f44a535
SHA256d0908b70974ff5529c17175fc03dd26b3a482d51740f1afb2e5f6a4df6ea5f16
SHA512f9d908d4b060158c2060b57244088082049183a49319fb5add98fabca0fd3bb462942a6342039f5be2f4ca4b1c27a53818ebf5fee81232288fd89261dab5e509