Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
discovery_UDP&persistance_ssh(1).xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
discovery_UDP&persistance_ssh(1).xls
Resource
win10v2004-20240802-en
General
-
Target
discovery_UDP&persistance_ssh(1).xls
-
Size
72KB
-
MD5
c9b8bf66f0fe8719bea195f39fa4e326
-
SHA1
1e9ab72fd9eaf1f77c9bccca6efbd35786fd548f
-
SHA256
3ea40aed7aa116bb3f817be11a879793838323cf38319190e39729f5997c6bb6
-
SHA512
bee483be35ad0e640e8d0b894a4a6e5d9ecf289b0c22800b022d4b993f2a239bf7ed68379068d518b57c471a0396415b361eb6427fc76813cb8ac2f7b22aea9d
-
SSDEEP
1536:750P2hrXiVKyVkgi/954kkGfnld+AbrKE47NsE8USnf3vH/YsKRi+LXWGlRvORBa:750P2hrXiVKyVkgi/954kkGfnld+Abro
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4928 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4928 EXCEL.EXE 4928 EXCEL.EXE 4928 EXCEL.EXE 4928 EXCEL.EXE 4928 EXCEL.EXE 4928 EXCEL.EXE 4928 EXCEL.EXE 4928 EXCEL.EXE 4928 EXCEL.EXE 4928 EXCEL.EXE 4928 EXCEL.EXE 4928 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\discovery_UDP&persistance_ssh(1).xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5a583168695e7bfce52f3fd6170d4ab05
SHA1cc5518615f7086b24f08e8bd127c9f001cec792b
SHA256b0a919a990b442d8d0f441870aae56f336ef9f6b2b94d3a82a93246c17cac5ec
SHA512527ab5f20f77f5c876a97a54308e408660c3d9abe0d2c364bf99e5965cc914c306894e0a7ac0feb5ce85d9787f4959f323bd8ef5585958f306fd4630c273f679