Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
5daccf2d036e313eacb7b0660c8f6c4b4eb48a7bf841f5f85a68eaf08b678553.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5daccf2d036e313eacb7b0660c8f6c4b4eb48a7bf841f5f85a68eaf08b678553.xls
Resource
win10v2004-20240802-en
General
-
Target
5daccf2d036e313eacb7b0660c8f6c4b4eb48a7bf841f5f85a68eaf08b678553.xls
-
Size
445KB
-
MD5
e07cfed85c1ddf5a98b21de6cb894a18
-
SHA1
092241ff646b40b753d18973ec61638a0f70fa98
-
SHA256
5daccf2d036e313eacb7b0660c8f6c4b4eb48a7bf841f5f85a68eaf08b678553
-
SHA512
0016dc6031bc7f82b7d85ccd6d93e7618eb56d4ff5fb08847c73996a61c7a5670786bb689fec14e3ab704070e472ab8f16ed25bd5f428b0ac104e827e712cf68
-
SSDEEP
12288:aWkD+1iATCUvwG3Dl6M+ntycfS8ZxGxJygH42DYqI9:dkD+1BCSDinTrZxK4mYqG
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4804 EXCEL.EXE 4840 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 4840 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4804 EXCEL.EXE 4804 EXCEL.EXE 4804 EXCEL.EXE 4804 EXCEL.EXE 4804 EXCEL.EXE 4804 EXCEL.EXE 4804 EXCEL.EXE 4804 EXCEL.EXE 4804 EXCEL.EXE 4804 EXCEL.EXE 4804 EXCEL.EXE 4804 EXCEL.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4840 wrote to memory of 4900 4840 WINWORD.EXE 94 PID 4840 wrote to memory of 4900 4840 WINWORD.EXE 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5daccf2d036e313eacb7b0660c8f6c4b4eb48a7bf841f5f85a68eaf08b678553.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4804
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4900
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD54fa224d2d0de7f9d614356b87ce9a8f9
SHA181340c1f9243f0d7d6b4718e633eeb0a936ff3b2
SHA2563de62a6199eec7f34c0255fb132f75448604cb47e4045c7a4c950186e6eb232d
SHA512a6cb63403f06627ad7be7c3924b95aac7e51ad49275eafdf6ac7b5e75544b5ac033a298c07660f7f9fa65c5cc0cef282552dfd0614e2febcc605f98c982842ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9
Filesize471B
MD584882f34acd3db3c74b4a8a97963f15b
SHA1698828bf3de66dc8ced308ef4f2f742f67db0421
SHA25660bf31dfbe03c1c484c166f239f5a69f0baf70245e00621c44ea997d79eaebe8
SHA512c7f07b6237894b906ddbfbbe06cfcef273cdfefe0679cace07746119b1e79c4936b1347f28fe4e72a1a82367b288ac2ea064f05ed2a95484b47a4579118c2f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD5ce4501df6cb9aaad28410d1145801280
SHA1d6c923df3e955eb2b9a50fe28a8394c756c9c2db
SHA256727e754466067c094e61834eb7d7e45ef4de3002028cac0194f0704014f40f42
SHA51252d8db480c0afd3a3543eaf5062f347f2018ba689856a96bccbbdf9e94a908cd7f96187258faf9c36cfc4264a11b15e42fa039c8591bc5db0e36fc152f4b1df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9
Filesize420B
MD5335418d62f466b2cbec40a98ab69d3cd
SHA1f564a72d7c820ab55225778b7f5bfb671ca7fdc4
SHA2565066308256bcd4d6a505a4642f77ba5bd2f1d6c7323f3d214d5025e78bad66e7
SHA5122f1946f052eb83c66fdfc95d675cab230659c248896dbd6af16cfb07728c0d1f4c301b4ff7013db6f333df40b00485001ed595296a8b749d0420af5b89eb463d
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\032CF1A4-298F-4E92-9F8D-B9AEEEC756AE
Filesize170KB
MD5848ec64367a2f6bd32f424a06931195e
SHA100fb2bbbe594168b6d0710fdf9dc734c255e9335
SHA25627583baa07577028bb52dbc5542daa12a674928890c4c83b42f62e15563df5cd
SHA512e446c765b8f2bf62d591280d19732c7946765a3ce775e81622727a71e3d707674625e12e9a21a5a296262db6fc6cbc581dfb0a5724c9f4d554bb219cdd6dc68b
-
Filesize
11KB
MD5917784bb6dbc6c29fd85f1cc76e756ef
SHA16067c5e4de355c737beca46c4c40a4f5fa16f7d6
SHA2565eb3347c6c3ad4dd35d6945e9dd122ecf775167283fa3abc51f34493433f8eb2
SHA5129441562cfb44e2e16144ff3c39fe99a2fe76de9cdfc42d3b58fc89638d3237f3a502c58f3dce6fd858aa19e032a95afcf91b193a1907e6dc5846ff7b132d7e6b
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5df7ee84a01fe4ad16d3f78f64d336e44
SHA150337392e32895e78d046be8c30a08e85067a55c
SHA2563ae010dd81b9422c265597496436dd59a69b27a6013f886027c59797c3660cd4
SHA512d68620ec4a5be009a2ef517827bb59e79e8b1dcde997ba2e29af596664a256f04c72b79f35a963e7d2db3cd1e38e1375f3c351f614b9a0743e2cd435ce8b6835
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5f6dac1f74ad0063bf1a705e51f4b741f
SHA1480747ebebd6868064d87885f32ddec45cc80ce2
SHA256a5719c5d72c78a9a413006124124c948d3d49868475fdbe9b189846cc45ad940
SHA512d835aa6c15c3804c99a26303b5e00bdab744df0f63b061748882176662400ef19539b74f45fc79bdf77dcf21f03c41980cc5d6aa6a98e2a5ddd9f54c9311905d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WLXU5DI6\seethesmoothofbutterburnwhichtasteofentirethingstounderrstnadwellthebuttersmoothchocolateburneatwellwith_______sweetandhotburn[1].doc
Filesize84KB
MD5d18067e4be9ca434241869dda26c5f8f
SHA1e3f3abcc32c87d48037d68577c3b625bb1c02636
SHA256f34155575606c4bb730c370e184b5581e724c35fa0161da93f37e5263d476650
SHA5121d7bf63a5235e5f9c0815ac50ead92775e1e6e1f72b3e53e3432b367f4b8504d411ac575085fea6028085b1790d780f669c80c7455ae9c6c0d89f044a3e053be
-
Filesize
244B
MD586a9d70ac6e8ceae1e1027c3d745bf16
SHA1397b35f4419a620b55c870be59ca2d2f331b479b
SHA25640ae977f9b29711701db47e097bb53f42c623f65120c3e1550ee84496854124d
SHA512e77cb8d8a7ce5fdea452757da02c9d6022431db479abb757816c091840bddd954bb51fd91e41f6d0714f6fbc15d3274cdd15aa575363573d751f1edfc62d9d5b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851223[[fn=iso690]].xsl
Filesize263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5af2ed3383c4ddefe0d9ee5e6188c62e0
SHA1f75134db92fe0380f4f9300f23966ba0c7673064
SHA256c8a28964cae24c6a9ace49908eaa546ad04254531084726d4f4b29c82df4ebf6
SHA512453dcae96725b15c73ffb1d4a3debeeec7702c1000924c194ec882b7a0cf9747bb55d3d6766df9ab65f1faec28fd8b8a820c598968f4382668e83b83cc2db694
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD56e0c046b126b6739ef356ca127b29c49
SHA1b4f4cd7e2896bb606f8511a320692a9c05335e9b
SHA256b175634cf7527c34f6de665ebe27d7babe5a2075ce3833b420d68fe5f4223ccf
SHA5125717fb4880169f2bc216cc8a8d0bb580740606c1852979d95c49bfd2bacc757d0ed562e15813efae0b4370c2efcdee6ba1575aa43bc6973381cfdfa1d5c0569b