Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
cc90a2bd7fcacc78bd4d14c8574567d3a54ef4aea27575423426c6befd5ecc2c.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
cc90a2bd7fcacc78bd4d14c8574567d3a54ef4aea27575423426c6befd5ecc2c.xls
Resource
win10v2004-20240426-en
General
-
Target
cc90a2bd7fcacc78bd4d14c8574567d3a54ef4aea27575423426c6befd5ecc2c.xls
-
Size
307KB
-
MD5
b88bbc239676958a8066807a2705fe5a
-
SHA1
b58f1b4a83d0cebca98c7f9694de76ab0fc53989
-
SHA256
cc90a2bd7fcacc78bd4d14c8574567d3a54ef4aea27575423426c6befd5ecc2c
-
SHA512
1f5fd542d365ffba428e351f27233f1fb21cf288b5688c8cfbc7346be36ac1eb64ed710b990b21bc80ff9f7d8ce0c1bb357f947d4985ac890a07ba47aab924d7
-
SSDEEP
6144:NKyDakQwbp6Idi8bbynw0moK+BQllrkmxp5zWOa6pb6t0UvIG+zY:JJD16Isw0s+BQllrkmxp5O6EeLk
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 772 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cc90a2bd7fcacc78bd4d14c8574567d3a54ef4aea27575423426c6befd5ecc2c.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:772