Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2024, 14:55

General

  • Target

    1561073.xls

  • Size

    280KB

  • MD5

    f9e7fc5d4ec23e40355b3dc5cc56bfc8

  • SHA1

    bea7dd0814fc2698f0a223257f54b5e85e013337

  • SHA256

    e10773ee1226f0dc4b6b9d8a1e41bbf1375d9df12333b316a9dcff3f26107497

  • SHA512

    2b073e1ea57893c56553b13c1ebc86efc76735f298260e1b6ef4cd170750abfef1031daa65b5cae2412fab31984dcb559c42c68780773b27bd5dd8d6a9ca2282

  • SSDEEP

    6144:UqFzL5LIT47Hi8kEBF5OkUwueWdEMIW4LCCNU:UqFzu4Li8kEBjbXWQW7U

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\1561073.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4868
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1520
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:4656

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

        Filesize

        471B

        MD5

        9a33e47e7aebd693196b8bf9792cbb90

        SHA1

        1d394b6bfcc38c07e8089af395db97fee2ff4be8

        SHA256

        527457f8675abf811fbd82504158906fad839fa1d973222c0187e5383dc81729

        SHA512

        2ea7d90b8f6fb8ef64d6e3a36f4af478d53186887616d558653af6a37e4b56e1f02884dc0833b216b2b21e3dae0f6e12ada04bcbb628f0147b6158d0a5108e6c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

        Filesize

        420B

        MD5

        924b268cef78d57c1e0574d1d6587f0d

        SHA1

        5432ae7274c043426f5fdadcd68c91b4e874e7de

        SHA256

        d1ed0577a382449f740f00f47ecbdfaf3c6d5cdad9188d338ce9b0726e5e0c26

        SHA512

        df6d522c7b32b42933635bdc7f9f496660b08fa0ef920f300a28f98fcd6ec875d16e2a8b0b941db6a618b845dca613f8c07df9407348d07ea7fe704363fd36c1

      • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\FAB79460-E6FF-4FA1-9C38-B379C6B08F05

        Filesize

        161KB

        MD5

        c526ab06fa6aad239b0242ced31f6dab

        SHA1

        95b41e1105edddf865dbda4156077ee271ba1b02

        SHA256

        df33aa873fb20eaac1fed0304a2df560268822938128c64e00ecd34bc5a7b05a

        SHA512

        85028b1bdf1b256091cff4c3b9dde8b679ce19f07a02518907987dfac3f91e9d1e7197170c8285b82dd578d3dd8dd62adba5baab74268a7a73215b725c3b0d6a

      • C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\mip\logs\mip_sdk.miplog

        Filesize

        21KB

        MD5

        56925507b61b2dc6e4ed601a3a0db017

        SHA1

        68b33daca5fa7e93fcb9304035711f1fdd8ba08b

        SHA256

        716ad4e4d1a47ef86fe804d302f73c842865fac35e1aee426e9a47728bcff8b6

        SHA512

        5260b93937f5513fe52c19a2cad4d71b56245047f2ad1db5435f7d30e4f3ee22d8dd65e200795d30d283dc231a17b29762533e1f67dcf277beaed35dbd666401

      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

        Filesize

        2KB

        MD5

        a6e8139f63b95e929dce7e4d68f2d5f5

        SHA1

        605ffbd337f4f571866a6cdd88236d92396d992e

        SHA256

        cd29fe6ca5f7a4bd87d10e34ad83d139d4283ece111822a89e1133c97bfac773

        SHA512

        9851b1eb5f9f4eb17f08b75581039f82de9472d7358943830da75d8cb617db700c42f8bb0b487ca0b26b371d723e4405f18033273582be8190c2f60f3ad34447

      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

        Filesize

        2KB

        MD5

        91c701fbdbd290727d1af8e1e409ee57

        SHA1

        02b7563f9f532166bc3ed0e2b168042dc45fe954

        SHA256

        ef398d3630142b3afa2bdd6d6d2f23fdcbd019936c7ad26ffea26a21cbf8afe1

        SHA512

        f2c5f1b9cf1987c1b3d85987e9f55e3d78ac948c54d72029de523be492b920c380168b4f9f2aaddc95f57c8978d3468798bab33674e958584186bc7db4389935

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2IX84YPE\lionsarekingofthejunglewhotrulywanttogetbackwithentirethingsgogreattotheforestwhichahdnlingentirethingstounderstand__lionsisthekingofjungle[1].doc

        Filesize

        39KB

        MD5

        c5af2617421f885a9772a4b51b80cb2a

        SHA1

        7e5b7ccfbfe3fac37bfd204d116050153a1736a6

        SHA256

        6cebb118dffe733c6f4001741eed2c2f58995c94e4a8eade0757d0bd07fcecd7

        SHA512

        4bc31df72497bc263a6d6f34d404653bc688d44539655424407c40f72aaa9c0a2074312ef797f666545cdcd37bebfd1c44591bcbb433860c20561921aaa20630

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        231B

        MD5

        f1afacfb7b080e5ae0f28c74b27c1336

        SHA1

        1b829f9fe003d1cae149677fd959d79f0b7966b0

        SHA256

        5d69523829848e2791b51fce5a283f131757bdae6d4c918d2d72417095422c59

        SHA512

        dc1d89278aba75b66bcb9e45544a8c9cfe9ec67bab1c5e34f75b896ab24901f5a6dde93128648b9748c383244b0a929ad5110b137f7ff1b51170722ce61d5bd9

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851227[[fn=sist02]].xsl

        Filesize

        245KB

        MD5

        f883b260a8d67082ea895c14bf56dd56

        SHA1

        7954565c1f243d46ad3b1e2f1baf3281451fc14b

        SHA256

        ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

        SHA512

        d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

        Filesize

        3KB

        MD5

        86bdbcf45b35435a2784c0f08fd0dfae

        SHA1

        d7abb9a2c3791c1c0d780eb96a7e0c91f940c02a

        SHA256

        158dc38dd39b737ffde2ffd4d1dc2abf70c14d0ba699e72715f6d71be0f5c16d

        SHA512

        d51fcc162493a100a3050258f7fc88066e44175ad4fc117c76177270863f06b937be174483c31e731851f8ee78152ba26e12a9e631bbfcde233803597297b581

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

        Filesize

        5KB

        MD5

        e11b36010599b22c11c2a157ef99a79e

        SHA1

        62f1599914383fa6d8bad6800c4b180ddaa41fd6

        SHA256

        eeae6b114d5c5b441f0ac2f7c8dd127f2267a16c0f64018612a7836c1f4845c6

        SHA512

        d8fc91bc85a0acece260ecac65e94d222978daa8098613441068c818580fe821e232cf8195e1418b8dc1cc665ca60d1fea73deae7826a22f550b39ff18ce20d0

      • memory/3604-38-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3604-567-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3604-43-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3604-44-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3604-42-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3604-41-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3604-40-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-1-0x00007FFF98550000-0x00007FFF98560000-memory.dmp

        Filesize

        64KB

      • memory/4868-12-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-20-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-18-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-17-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-14-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-22-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-23-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-19-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-16-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-15-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-13-0x00007FFF96100000-0x00007FFF96110000-memory.dmp

        Filesize

        64KB

      • memory/4868-11-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-21-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-0-0x00007FFF98550000-0x00007FFF98560000-memory.dmp

        Filesize

        64KB

      • memory/4868-6-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-7-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-5-0x00007FFFD856D000-0x00007FFFD856E000-memory.dmp

        Filesize

        4KB

      • memory/4868-8-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-9-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-10-0x00007FFF96100000-0x00007FFF96110000-memory.dmp

        Filesize

        64KB

      • memory/4868-3-0x00007FFF98550000-0x00007FFF98560000-memory.dmp

        Filesize

        64KB

      • memory/4868-87-0x00007FFFD84D0000-0x00007FFFD86C5000-memory.dmp

        Filesize

        2.0MB

      • memory/4868-2-0x00007FFF98550000-0x00007FFF98560000-memory.dmp

        Filesize

        64KB

      • memory/4868-4-0x00007FFF98550000-0x00007FFF98560000-memory.dmp

        Filesize

        64KB