Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 03:29
Behavioral task
behavioral1
Sample
310769d7aff0d696f15df14ca130026b692322102c5e0214acc4b00c637ef88e.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
310769d7aff0d696f15df14ca130026b692322102c5e0214acc4b00c637ef88e.xls
Resource
win10v2004-20240508-en
General
-
Target
310769d7aff0d696f15df14ca130026b692322102c5e0214acc4b00c637ef88e.xls
-
Size
983KB
-
MD5
3e8e58ac35e7a3d6ca0dbfe6b2b9052d
-
SHA1
381c3301965abea5ce44171c42f844ceab36664e
-
SHA256
310769d7aff0d696f15df14ca130026b692322102c5e0214acc4b00c637ef88e
-
SHA512
4aa7fa96e6b238c1aa5d0593bc1329eb11b4fdfd56e7879c16306b3f5df86ef88ca3cd6840bdaa2da63b5ea4163beffae34c26bcb58b71caef36efd06239d5c6
-
SSDEEP
6144:Kk3hOdsylKlgryzc4bNhZF+E+EPUwKYA2/0Hd3f2BLyiBqNKVvPj+aCZilt9E5s4:Av2FTQNKh3C+qqxyt2Kp
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2564 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2564 EXCEL.EXE 2564 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\310769d7aff0d696f15df14ca130026b692322102c5e0214acc4b00c637ef88e.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e05ebac52c6762adeea53330c244f454
SHA181711d55c2e686bf3f4dc089dcbd275ca8cd98f4
SHA25656003f714076e0cd175069d874625536af4f7991e5bd02022e95831bef783ace
SHA512519979333b0bdea8d833191feeaf5a75035204e70aa9f538f4fcc363629af86a03b13610aa36e8d9dc4092f64a8d4fe41069ca883960de4f1f08f6e35b19fd91
-
Filesize
256B
MD5c6b1a5f0fabb13661274b6680a92fb51
SHA1fb4f7039b2ebec3cb4437d95d522525294cadccc
SHA2563187033c928e0b968eba0b2ade93ae172fe40093bb6f99ac4b3f8a0d5fd506d1
SHA51225138c9e45282406b41ed01d2dc97da4be0db6cb254b8bac28244990065264390c6514d163f95e32993d91d9c77366de8de26440f51ac873da7ac97feff0d221