Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
5Dropped Ma...2f.exe
windows11-21h2-x64
Dropped Malware/1.exe
windows11-21h2-x64
Dropped Ma...29.exe
windows11-21h2-x64
10Dropped Ma...89.xls
windows11-21h2-x64
1Dropped Ma...df.exe
windows11-21h2-x64
8Dropped Ma...er.exe
windows11-21h2-x64
10Dropped Ma...df.exe
windows11-21h2-x64
8Dropped Ma...00.exe
windows11-21h2-x64
7Dropped Ma...DF.bat
windows11-21h2-x64
8Dropped Ma...61.exe
windows11-21h2-x64
10Dropped Ma...df.exe
windows11-21h2-x64
10Dropped Ma...89.xls
windows11-21h2-x64
1Dropped Ma...df.exe
windows11-21h2-x64
8Dropped Ma...df.exe
windows11-21h2-x64
5Dropped Ma...00.vbs
windows11-21h2-x64
8Dropped Ma...df.exe
windows11-21h2-x64
8Dropped Ma...B).vbs
windows11-21h2-x64
10Dropped Ma...df.exe
windows11-21h2-x64
3Analysis
-
max time kernel
244s -
max time network
280s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/07/2024, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
Dropped Malware/01622664c6bf1a51484157d73fb4a42f.exe
Resource
win11-20240611-en
Behavioral task
behavioral2
Sample
Dropped Malware/1.exe
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
Dropped Malware/BNP DOC 12578945329763-7633562829.exe
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
Dropped Malware/Comprobante de pago_978989689.xls
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
Dropped Malware/Document BT24·pdf.exe
Resource
win11-20240611-en
Behavioral task
behavioral6
Sample
Dropped Malware/Jailkeeper.exe
Resource
win11-20240419-en
Behavioral task
behavioral7
Sample
Dropped Malware/LHDNM TAKSIRAN 2023·pdf.exe
Resource
win11-20240611-en
Behavioral task
behavioral8
Sample
Dropped Malware/Order 000293884849900.exe
Resource
win11-20240508-en
Behavioral task
behavioral9
Sample
Dropped Malware/PO 903886563 PDF.bat
Resource
win11-20240611-en
Behavioral task
behavioral10
Sample
Dropped Malware/PO2024-0961.exe
Resource
win11-20240508-en
Behavioral task
behavioral11
Sample
Dropped Malware/PRODUCTS LIST pdf.exe
Resource
win11-20240508-en
Behavioral task
behavioral12
Sample
Dropped Malware/Product Inquiry466789.xls
Resource
win11-20240611-en
Behavioral task
behavioral13
Sample
Dropped Malware/Quote Request (Tupy S.A.) 523AM - 924BR·pdf.exe
Resource
win11-20240508-en
Behavioral task
behavioral14
Sample
Dropped Malware/REQUEST FOR QUOTATION_pdf.exe
Resource
win11-20240419-en
Behavioral task
behavioral15
Sample
Dropped Malware/Transaction_Execution_Confirmation_000000.vbs
Resource
win11-20240508-en
Behavioral task
behavioral16
Sample
Dropped Malware/faktura_7171503997·pdf.exe
Resource
win11-20240611-en
Behavioral task
behavioral17
Sample
Dropped Malware/ups_awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbs
Resource
win11-20240611-en
Behavioral task
behavioral18
Sample
Dropped Malware/帳單發票_200548224648·pdf.exe
Resource
win11-20240611-en
General
-
Target
Dropped Malware/Comprobante de pago_978989689.xls
-
Size
170KB
-
MD5
d0055b08c9a93f662b3a234a984ceb2f
-
SHA1
8c6df2ae8820912744ce8b717604399bbde46a66
-
SHA256
7203e2e674817c3cc2080d810a2e09323100163a1bd8f8d4ffbf5b9b1729b9c1
-
SHA512
d01d458aeac1c9d027b05af24e51984004d3800d658af7e77798e8352059db2c22377775c7cadf94940b8c4622f501181c40006193d7bf96f97dceb041d1b88d
-
SSDEEP
3072:y8tq3KR9pLmLX6MOXG0A6OM1Qr6tjtmTgY3A1bPjbw2wB5bFJvqNX:y6NCLX6b2ctjtmT5uE2wB5vv4
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2888 EXCEL.EXE 1664 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 1664 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE 1664 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1664 wrote to memory of 5100 1664 WINWORD.EXE 79 PID 1664 wrote to memory of 5100 1664 WINWORD.EXE 79 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Dropped Malware\Comprobante de pago_978989689.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2888
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:5100
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5848aac0cb4e72e82edc44095735ce8ee
SHA1461e0897b86390f46de0a5dc29d6a41a4d8e9f73
SHA2564a8a08914890cf55e09ea295540e3a13a7ef791fe21d4612b200c3d8ef0fdf59
SHA512c3219a01d23fdb270df47c78d5ece4197822af4fb1a244644edd7133f5b55f85909a392d9e73880b22907009da27a9f06439ee0610e48c78a5b664b5d36a5138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize471B
MD504879e8dfcf79c5cc5ed73c335436218
SHA1e84947196eae7740d3443f3da14999a1728dc388
SHA2566acb978484b40cec1fccf32637df7fa84b6be25d3381da6c0d85a56103cea713
SHA5124c972effb33bd0f597d5469308de6f3acb1e7ddab7efae2a353578814463c44b86fc2251e5474195450fd5b500eb183a72a2b01ca6dc219230dd99a14b484d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5f0eed1be35d611395912262babdc157f
SHA18e72f37403cf55a9828d4441262c978dbcb35f21
SHA2565468288890d249ef2f1163897dd817b0fe78aa48569e69e27b1315fce7a6339f
SHA51298c7cd5730a62fe810d200a23f0d7b47fb1c538304174baeae0c2d8856bfab926d698779234451b48b459fb9e3f1ffdbe7947f7b2897236039b4dcddee72438a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5efbeb9cd5afd1ba5a11c64c64a49e960
SHA1882c48c768841f6ba4a22a00d56a52f3d7bcb5d2
SHA2565ce9d9f79641a063e622d92be9ffb9c98ce337d1f8a60fc7629b3370554addc7
SHA512d40e6ce86bad72b56e08ffc65141a7bffdced12188ba6731303f8a94068564e32cda2623f9ea1f9a1134fc86f8020fe9ac35497f94b8ca921b417d7aa0675b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize412B
MD587c3a956a1f806ff3e5ca8fe6eebe3ce
SHA15e7fdee0b920e00727224ffc9b58f2d2384b82a2
SHA256d88079d0745c348ed66f133f5c879504b5c500f2c866f339e0226e848d6ce6a8
SHA512401da2bacd64e0473acf91711fda15dc08ed853013a8cc377096c50885bc2565e11a3127b8a8a861422baa2fabc2d3cb63ef5cada04962a1870e77128629a41b
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\357607E8-6FB3-4357-8EC3-C160C437B6DF
Filesize168KB
MD55b467e7e2b2289ac1ec2c5968eb660f8
SHA1929d43dcec8ecb5ab4d6a6228a84bf66036cd97b
SHA25695f86bc4e4b947d245a261a10bf6205740303ff527865150f2ec6ebdd6e2deca
SHA512b9f0dd2730e8c0ccb29ae8171e60ea5afa9536141239d4b9509e02e417afeb5302d24fc90b4309a6f8acebb8c01032f16256e9365c0dc917660e506e6c6fc483
-
Filesize
21KB
MD557cccf80caef59bf8d515eb04135f946
SHA134c93806f34b15f06a029629d338fcd648d8ae0a
SHA2567fe7b380df9a6549e7baed9158c2ce0fb933f9e1d0857236eaf3b85a1cbd5ce5
SHA512789eb352bafdf319b59d75ebf5d85e549fcfb7519480880e677b5af9cd7a63de1028f3e244e6b4182a796d448da1a20559fd095d2abf78abbf3e10a2b473c971
-
Filesize
171KB
MD580e1ba7b421fd01f5319de00cf5420f7
SHA1d63b993303e677d7bacd6ab4a11b03530ee1528e
SHA2562ea7cb9bbd0fcad641bf6a0469f23c51786e1c0264b769a8ba0d5c5ff614b7ba
SHA512e6ae787adba0ba690170f54d7977703487381028223428810393e63221c0700bf567651ff8833ffdd98762190d4fddada6586941ec39cf00e042a7071ab6fc7e
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
230B
MD54c9f19c57163c1ac57320d616a5c1680
SHA13027bcb042499de0f6328ac238c5da5e774c725b
SHA256f15421695df5cbe3b60a1879a7a2151d759cdced91e6be372d53b705ae11e6b9
SHA512a18bfe2eb943bec4e45aaf5270d6ba9564e78316c9ed40e12b687fecb9ab9fa3389768d2f75b0c8ee42b4806a420679b604635de1f23dbde75119414b3652cd3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize5KB
MD5e08f51d3b3342317719385cfb092e5ce
SHA1bd920cdea09b7305f10c5902ebb1e4c3b5d40056
SHA256cbed71e21bfa52c42a65223bb2388ec93d62d261443f0640188979dc357e9287
SHA512b629c41ce6ee8fdffef1e06d712c971cfdd7a589b559971b89a66072ab0932bf02005c0fddb652c81aaeaba65db65200d2eafc9c7cf3b3dad3660c9ff9a7dce4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5228eeb603c2edf5b219c2eab80ebbbbf
SHA1c0370ac73fa38a1d08927725a1128053376f392f
SHA2564a99eccb1783be9ecc2c56503ddbd0eb741864d1984750303ecfdff43093c8fc
SHA512126a17406954bedeca106f6cc3a432f9dea765f1fe2011c703e0237704221efcd8e6322c91589fb5efcca0bd8a7cceaeb80b62835bfe19aca47cba35a9d1c7d9