Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 21:12
Behavioral task
behavioral1
Sample
f51badccaf19bf1a98e10c5ad86ef4e77b4a9777037c31982126676caec8a83d.xlsm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f51badccaf19bf1a98e10c5ad86ef4e77b4a9777037c31982126676caec8a83d.xlsm
Resource
win10v2004-20240730-en
General
-
Target
f51badccaf19bf1a98e10c5ad86ef4e77b4a9777037c31982126676caec8a83d.xlsm
-
Size
92KB
-
MD5
b4dc620504b67148e6fa45c79eb668b7
-
SHA1
436e68de54527b5f7b0d3aa10ae4df9cf79ccaee
-
SHA256
f51badccaf19bf1a98e10c5ad86ef4e77b4a9777037c31982126676caec8a83d
-
SHA512
bf67ea88d52aa026ac1ff41ecb96222cf400cbf9665bbf7a58673d1ff773be188ed800ef7bd9f10d69a77564e73fff5a38486e195565ae7219c43f2d9a4d3e76
-
SSDEEP
1536:CguZCa6S5khUIIo+pF1SAC4znOSjhLzVubGa/M1NIpPkUlB7583fjncFYII9Fp:CgugapkhlR+pvSaPjpzVw/Ms8ULavLc8
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4288 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4288 EXCEL.EXE 4288 EXCEL.EXE 4288 EXCEL.EXE 4288 EXCEL.EXE 4288 EXCEL.EXE 4288 EXCEL.EXE 4288 EXCEL.EXE 4288 EXCEL.EXE 4288 EXCEL.EXE 4288 EXCEL.EXE 4288 EXCEL.EXE 4288 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f51badccaf19bf1a98e10c5ad86ef4e77b4a9777037c31982126676caec8a83d.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4288