Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 02:25
Behavioral task
behavioral1
Sample
cf84c9220caad5746478bade0a27870c3d753721241e2736b093dd059e9eacb3.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cf84c9220caad5746478bade0a27870c3d753721241e2736b093dd059e9eacb3.xls
Resource
win10v2004-20240508-en
General
-
Target
cf84c9220caad5746478bade0a27870c3d753721241e2736b093dd059e9eacb3.xls
-
Size
479KB
-
MD5
67989de980871bfe78c8c61af170b0b1
-
SHA1
25deb6caa6a7016316bc44a9a0cb35de9e2ec505
-
SHA256
cf84c9220caad5746478bade0a27870c3d753721241e2736b093dd059e9eacb3
-
SHA512
5706f344ef2a43521f265cb62743d7fcb81fef34fef1f184b778ddf3668098fde2b3fc721d86453a8a21e8839235dfb619f5bee879e763c3d548b5eed2e24d1c
-
SSDEEP
6144:+xEtjPOtioVjDGUU1qfDlavx+/YIxARsbPTusun5laaZ2tfP40aYPFTuY6YzF:kbbusu592tKW
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4352 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4352 EXCEL.EXE 4352 EXCEL.EXE 4352 EXCEL.EXE 4352 EXCEL.EXE 4352 EXCEL.EXE 4352 EXCEL.EXE 4352 EXCEL.EXE 4352 EXCEL.EXE 4352 EXCEL.EXE 4352 EXCEL.EXE 4352 EXCEL.EXE 4352 EXCEL.EXE 4352 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4352 wrote to memory of 2404 4352 EXCEL.EXE 87 PID 4352 wrote to memory of 2404 4352 EXCEL.EXE 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cf84c9220caad5746478bade0a27870c3d753721241e2736b093dd059e9eacb3.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2404
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD520e23f2f2a59f26505a98644e1ad076e
SHA1e5d1416e9978f6cd2a7cfc9857d313382e44013d
SHA256e214ba9750748d016ca2aa620f3b5a77779659e700af236830e528c8c915fbb5
SHA512a0a9129bf22599c21578bc879439eaa0ea1344b9257a5c9b4e55b8617652c8ec3f58f3d6af1015393496a785e7cbb3398f87536248ca799129d3b0a688db4b5b
-
Filesize
256B
MD5c6b1a5f0fabb13661274b6680a92fb51
SHA1fb4f7039b2ebec3cb4437d95d522525294cadccc
SHA2563187033c928e0b968eba0b2ade93ae172fe40093bb6f99ac4b3f8a0d5fd506d1
SHA51225138c9e45282406b41ed01d2dc97da4be0db6cb254b8bac28244990065264390c6514d163f95e32993d91d9c77366de8de26440f51ac873da7ac97feff0d221