Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 21:30
Behavioral task
behavioral1
Sample
6d276507dd892c8da37be040e222b700b1dd02f920f656779109669e89eceae8.xlsm
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6d276507dd892c8da37be040e222b700b1dd02f920f656779109669e89eceae8.xlsm
Resource
win10v2004-20240802-en
General
-
Target
6d276507dd892c8da37be040e222b700b1dd02f920f656779109669e89eceae8.xlsm
-
Size
92KB
-
MD5
5519337c9a9586c972d9163b0c625e79
-
SHA1
73452f23e830587ae643e75cf78b856744a18b53
-
SHA256
6d276507dd892c8da37be040e222b700b1dd02f920f656779109669e89eceae8
-
SHA512
fffeeb4f5243979436b04616fb9d1fd3e725c5a4fa980e0ba028363609e870eba3e0f023a66135fa76f6b634993693ee433f8c34cf9b227bf5c9f1b31f960107
-
SSDEEP
1536:CguZCa6S5khUItU1o8K4znOSjhLqxMUH9Ga/M1NIpPkUlB7583fjncFYIIANFn:CgugapkhlJ8KaPjpqxvD/Ms8ULavLcP
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4320 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4320 EXCEL.EXE 4320 EXCEL.EXE 4320 EXCEL.EXE 4320 EXCEL.EXE 4320 EXCEL.EXE 4320 EXCEL.EXE 4320 EXCEL.EXE 4320 EXCEL.EXE 4320 EXCEL.EXE 4320 EXCEL.EXE 4320 EXCEL.EXE 4320 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\6d276507dd892c8da37be040e222b700b1dd02f920f656779109669e89eceae8.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5d6f9769c6ed9b28430b360e9ed0ef8e6
SHA13da10556ed5d22f67283dadeb3355e64e53c057c
SHA256a206bf925e62240f19b5d0f4c316cbf8ad63399d9b599051d3d9ef057eb3a5a3
SHA5126e2e49cef055053dd766c6bd20850f31465397092ed2f90699196ef0efbc3184eec574c51ba8c018254081a5533cd8fbfdab474d12f47ec838c5dc8963fbe978