Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3nokia s40/Micat.jad
windows7-x64
3nokia s40/Micat.jad
windows10-2004-x64
3nokia s40/Micat.jad
windows7-x64
3nokia s40/Micat.jad
windows10-2004-x64
3nokia s40/...��.url
windows7-x64
1nokia s40/...��.url
windows10-2004-x64
1000Micat.exe
windows7-x64
3000Micat.exe
windows10-2004-x64
7000Micat.exe
windows7-x64
3000Micat.exe
windows10-2004-x64
7咪客适�...��.xls
windows7-x64
1咪客适�...��.xls
windows10-2004-x64
1索爱k750...at.jad
windows7-x64
3索爱k750...at.jad
windows10-2004-x64
3索爱k750...at.jad
windows7-x64
3索爱k750...at.jad
windows10-2004-x64
3索爱k790...at.jad
windows7-x64
3索爱k790...at.jad
windows10-2004-x64
3索爱k790...at.jad
windows7-x64
3索爱k790...at.jad
windows10-2004-x64
3Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
nokia s40/Micat.jad
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
nokia s40/Micat.jad
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
nokia s40/Micat.jad
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
nokia s40/Micat.jad
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
nokia s40/新云软件.url
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
nokia s40/新云软件.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
000Micat.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
000Micat.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
000Micat.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
000Micat.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
咪客适配机型表2008年4月21日.xls
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
咪客适配机型表2008年4月21日.xls
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
索爱k750系列/Micat.jad
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
索爱k750系列/Micat.jad
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
索爱k750系列/Micat.jad
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
索爱k750系列/Micat.jad
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
索爱k790系列/Micat.jad
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
索爱k790系列/Micat.jad
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
索爱k790系列/Micat.jad
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
索爱k790系列/Micat.jad
Resource
win10v2004-20240611-en
General
-
Target
咪客适配机型表2008年4月21日.xls
-
Size
81KB
-
MD5
ac0f6b9119b6b778eea375fea517d9d0
-
SHA1
aedaa0b6398d226a9a9a6a4c87d5e3ea025db002
-
SHA256
d184a68e90344aca9c94b2a058e146bb0dd41fd3710234fc2cddb909cddc08ba
-
SHA512
2d5c6624f621f04a4fb1a6a565d4e5f88a2b93b5b52134853e8d4a0e478787d711df5c00a9365e160212268c8a7a0aabdc2ac6744b29fd60bb101dc7a64243fc
-
SSDEEP
1536:gAAAAsqWC1NUAuFSO04FZRciTrMBIZa4ROr3H7j+YvxtDBy/1DgqQ8Wh57w0:nZa4ROr3H7j+Yptty/1DgqQVh57w0
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3624 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3624 EXCEL.EXE 3624 EXCEL.EXE 3624 EXCEL.EXE 3624 EXCEL.EXE 3624 EXCEL.EXE 3624 EXCEL.EXE 3624 EXCEL.EXE 3624 EXCEL.EXE 3624 EXCEL.EXE 3624 EXCEL.EXE 3624 EXCEL.EXE 3624 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\咪客适配机型表2008年4月21日.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3624