Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 11:33

General

  • Target

    DHL Shipment Doc.xls

  • Size

    684KB

  • MD5

    a064fe438f311ba1c878dd8128c21d2c

  • SHA1

    9c80a9b91e0bcdbfb5da53285c0ec521aefa100f

  • SHA256

    e3c29ec01ba1b41c8af9b4fc05dd4325069f4528cf7ca0c74713e6b0cc4aedc0

  • SHA512

    d47154b5f9127f6a023c87235034d1d2b804d8160fbb49c2ff4ec405c02da3e6bc5c154aa29254ff40325d41396d52aef1928f3fb8deae3c85348b55550f2243

  • SSDEEP

    12288:AuHbcbiFv+MIFx+tMiGSa7waxlvV43IGBHDSTLfim4++j4YKKTvWrHPqHIiB:pBFv+MIPyGSeMIEHGLfiz++dK+vWr4B

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Detected phishing page
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\DHL Shipment Doc.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\System32\mshta.exe
      C:\Windows\System32\mshta.exe -Embedding
      2⤵
      • Process spawned unexpected child process
      PID:3932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    2063697d7345a3b11a99d44d961ffac1

    SHA1

    b2086b685d94be64eb02c4485872e62d1d01d160

    SHA256

    4acd167284875d2b3e02764f41ea36cd3afdf10e03acb5983ebfccd94ed0d8d5

    SHA512

    05570c67c17d12476136b611d00b7aac018e66f68e4e751dd9555c8bcf38a36e6a57a1dbbb05d949ad1758c59d2bbc359cdb789342d581f32abe6af2154bec14

  • memory/3012-12-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-10-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-1-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/3012-5-0x00007FFBE4D2D000-0x00007FFBE4D2E000-memory.dmp

    Filesize

    4KB

  • memory/3012-4-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/3012-6-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-11-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-0-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/3012-16-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-13-0x00007FFBA2CB0000-0x00007FFBA2CC0000-memory.dmp

    Filesize

    64KB

  • memory/3012-8-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-14-0x00007FFBA2CB0000-0x00007FFBA2CC0000-memory.dmp

    Filesize

    64KB

  • memory/3012-7-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-15-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-2-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/3012-18-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-9-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-17-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-84-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-82-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/3012-83-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/3012-80-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/3012-81-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/3012-3-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/3012-52-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3932-51-0x00007FF64B540000-0x00007FF64B548000-memory.dmp

    Filesize

    32KB

  • memory/3932-54-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3932-40-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3932-41-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3932-43-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3932-44-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB

  • memory/3932-42-0x00007FFBE4C90000-0x00007FFBE4E85000-memory.dmp

    Filesize

    2.0MB