Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    39s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 02:25

General

  • Target

    cf84c9220caad5746478bade0a27870c3d753721241e2736b093dd059e9eacb3.xls

  • Size

    479KB

  • MD5

    67989de980871bfe78c8c61af170b0b1

  • SHA1

    25deb6caa6a7016316bc44a9a0cb35de9e2ec505

  • SHA256

    cf84c9220caad5746478bade0a27870c3d753721241e2736b093dd059e9eacb3

  • SHA512

    5706f344ef2a43521f265cb62743d7fcb81fef34fef1f184b778ddf3668098fde2b3fc721d86453a8a21e8839235dfb619f5bee879e763c3d548b5eed2e24d1c

  • SSDEEP

    6144:+xEtjPOtioVjDGUU1qfDlavx+/YIxARsbPTusun5laaZ2tfP40aYPFTuY6YzF:kbbusu592tKW

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cf84c9220caad5746478bade0a27870c3d753721241e2736b093dd059e9eacb3.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4352
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2404
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:4512

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\VB4D36.tmp

        Filesize

        1KB

        MD5

        20e23f2f2a59f26505a98644e1ad076e

        SHA1

        e5d1416e9978f6cd2a7cfc9857d313382e44013d

        SHA256

        e214ba9750748d016ca2aa620f3b5a77779659e700af236830e528c8c915fbb5

        SHA512

        a0a9129bf22599c21578bc879439eaa0ea1344b9257a5c9b4e55b8617652c8ec3f58f3d6af1015393496a785e7cbb3398f87536248ca799129d3b0a688db4b5b

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        256B

        MD5

        c6b1a5f0fabb13661274b6680a92fb51

        SHA1

        fb4f7039b2ebec3cb4437d95d522525294cadccc

        SHA256

        3187033c928e0b968eba0b2ade93ae172fe40093bb6f99ac4b3f8a0d5fd506d1

        SHA512

        25138c9e45282406b41ed01d2dc97da4be0db6cb254b8bac28244990065264390c6514d163f95e32993d91d9c77366de8de26440f51ac873da7ac97feff0d221

      • memory/4352-12-0x00007FFE336D0000-0x00007FFE336E0000-memory.dmp

        Filesize

        64KB

      • memory/4352-14-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-5-0x00007FFE35CB0000-0x00007FFE35CC0000-memory.dmp

        Filesize

        64KB

      • memory/4352-3-0x00007FFE75CCD000-0x00007FFE75CCE000-memory.dmp

        Filesize

        4KB

      • memory/4352-7-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-6-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-8-0x00007FFE336D0000-0x00007FFE336E0000-memory.dmp

        Filesize

        64KB

      • memory/4352-9-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-10-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-16-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-4-0x00007FFE35CB0000-0x00007FFE35CC0000-memory.dmp

        Filesize

        64KB

      • memory/4352-0-0x00007FFE35CB0000-0x00007FFE35CC0000-memory.dmp

        Filesize

        64KB

      • memory/4352-11-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-18-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-20-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-19-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-17-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-15-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-13-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-2-0x00007FFE35CB0000-0x00007FFE35CC0000-memory.dmp

        Filesize

        64KB

      • memory/4352-1-0x00007FFE35CB0000-0x00007FFE35CC0000-memory.dmp

        Filesize

        64KB

      • memory/4352-72-0x00007FFE75C30000-0x00007FFE75E25000-memory.dmp

        Filesize

        2.0MB