Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
36s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2024, 03:41
Behavioral task
behavioral1
Sample
0c6a192dcefd394741e0730d48a090ba34e017d09b7efa64bb8cf59bd6fe6a0f.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0c6a192dcefd394741e0730d48a090ba34e017d09b7efa64bb8cf59bd6fe6a0f.xls
Resource
win10v2004-20240802-en
General
-
Target
0c6a192dcefd394741e0730d48a090ba34e017d09b7efa64bb8cf59bd6fe6a0f.xls
-
Size
694KB
-
MD5
e5118f1d55c3c8eee0280780284b5103
-
SHA1
cd1926317871bfdd18ff892a3f068a243eba1c97
-
SHA256
0c6a192dcefd394741e0730d48a090ba34e017d09b7efa64bb8cf59bd6fe6a0f
-
SHA512
996873d995ad078ced78c56b636312cc64970bc193bbc018fe77165d86e5ada2d9ac700d1de3601d21d98f1b4292be29216f33e9932f8431c50ce518d9b461bf
-
SSDEEP
6144:rk3hOdsylKlgryzc4bNhZF+E+W4LgldAunyFDE6XsQk4qAiPVXh/NyC21/IvdEAb:ZJgbP5RNN2BIvdRFq8Rl
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4908 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4908 EXCEL.EXE 4908 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4908 EXCEL.EXE 4908 EXCEL.EXE 4908 EXCEL.EXE 4908 EXCEL.EXE 4908 EXCEL.EXE 4908 EXCEL.EXE 4908 EXCEL.EXE 4908 EXCEL.EXE 4908 EXCEL.EXE 4908 EXCEL.EXE 4908 EXCEL.EXE 4908 EXCEL.EXE 4908 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0c6a192dcefd394741e0730d48a090ba34e017d09b7efa64bb8cf59bd6fe6a0f.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD527a35fc401bbf58412fad44b3404c8bf
SHA19da68448b81ff984664426feee646f11c95bd0bb
SHA256b45f5c9c5a44d439f1d81edd22fcc52510fa9a94b0aac44478fd41c5fa21c7c6
SHA51201e97bbc5e974391f67dab638691909908110df2f981565d78a61a62d7f158c6d642b202cc07817371699f9feae1364fe984bdac379c795f6ca2a6cad2db6d77