Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
NovoNordiskPurchaseOrder.xll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
NovoNordiskPurchaseOrder.xll
Resource
win10v2004-20240802-en
General
-
Target
NovoNordiskPurchaseOrder.xll
-
Size
17KB
-
MD5
099ec9d4290253ab7de142d541185bcf
-
SHA1
c5453c57f22105fe28cdf3241c263b69644fc3e7
-
SHA256
c867a84298f16a3ee66b52ca6f6d28cad18bb12446b6cc68440e7ac50199ec14
-
SHA512
d65b21e7608113006acedfa2cf7d17abc5bcd14e07a8c04d67a6103fd7fb690b7bbbe5c93621ddd1bb47d6ab9ba285e362aca1926649be4d5ce3ac25b353b5a1
-
SSDEEP
192:i7hoPUWCW69EyKkgt1dIJ6G1EfeUIyzizkUNSPJfS2lX52E3fpAL:i7Vr0yngvHFfeDzk1PT1A
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4848 EXCEL.EXE 4848 EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4848 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\NovoNordiskPurchaseOrder.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD54bb1feff5789dcac539100af9dee5d74
SHA13f731b9e0969c6e67e9b8dc2de675e3d807eeb9c
SHA256d700f55e40e2e7a1790f3098fa67dfc53a4142c56d5f78991130b25310dacaa0
SHA5129592ef6d1739be6f94e701d0841849ed00b7336c39de3b58df44aa1f2782b60cc45ebedda4ace37c238617680f733d6bc18988622adb3b4c4647d90cfbe29449