Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    48s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2024, 21:08

General

  • Target

    7378bf2a728a732c27f3ffe41b2e2f8f24a5a1af3281cebdc901e6e4420c2bec.xlsm

  • Size

    92KB

  • MD5

    6328998f02547483569236542d19d20e

  • SHA1

    09e760d656af727bdfd9e38b38fe748395368925

  • SHA256

    7378bf2a728a732c27f3ffe41b2e2f8f24a5a1af3281cebdc901e6e4420c2bec

  • SHA512

    ba2476d7230196fb90d4e698808bfd87fd4ef5d9db12764a82b6ba084f6b0c306c046eb25821040d52198e050ab17d23458aa7dbccbf12a58979985f474dd4e7

  • SSDEEP

    1536:CguZCa6S5khUI6xaCPQ4znOSjhLqxMUH9Ga/M1NIpPkUlB7583fjncFYIIYzFQ:Cgugapkhl6xdIaPjpqxvD/Ms8ULavLc2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7378bf2a728a732c27f3ffe41b2e2f8f24a5a1af3281cebdc901e6e4420c2bec.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    7b81e2282d675ef34d92958b160e60a2

    SHA1

    8c555b52e54b55d302c305a19afe5b963b83c542

    SHA256

    17b3f5c06d72166efd05f20e82d9c436efd31ccdefc45477fa100244ba43d12f

    SHA512

    8ce3c4c3889991f48a5c0ab93cdcc2820cde6b15d5e0d532d6ca49687f684617a46be61374967b8389941b83ccfece64ec42df4b265cd9673e0af5a8d68eb138

  • memory/3364-10-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/3364-4-0x00007FF93E410000-0x00007FF93E420000-memory.dmp

    Filesize

    64KB

  • memory/3364-0-0x00007FF93E410000-0x00007FF93E420000-memory.dmp

    Filesize

    64KB

  • memory/3364-2-0x00007FF93E410000-0x00007FF93E420000-memory.dmp

    Filesize

    64KB

  • memory/3364-5-0x00007FF97E42D000-0x00007FF97E42E000-memory.dmp

    Filesize

    4KB

  • memory/3364-9-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/3364-8-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/3364-7-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/3364-3-0x00007FF93E410000-0x00007FF93E420000-memory.dmp

    Filesize

    64KB

  • memory/3364-6-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/3364-15-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/3364-16-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/3364-11-0x00007FF93BCB0000-0x00007FF93BCC0000-memory.dmp

    Filesize

    64KB

  • memory/3364-14-0x00007FF93BCB0000-0x00007FF93BCC0000-memory.dmp

    Filesize

    64KB

  • memory/3364-13-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/3364-12-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/3364-61-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/3364-1-0x00007FF93E410000-0x00007FF93E420000-memory.dmp

    Filesize

    64KB

  • memory/3364-148-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB

  • memory/3364-149-0x00007FF97E390000-0x00007FF97E585000-memory.dmp

    Filesize

    2.0MB