Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    102s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 10:04

General

  • Target

    52af06d8b69b7428ec98ded0ef029397f0974de6a8424d53f0c645a65d9d6667.xlam

  • Size

    701KB

  • MD5

    0857a9fd10fecac6b8b5a4c8326bc21f

  • SHA1

    975e8d9502ca8f0a35c9399f8c4e9208a6b2894e

  • SHA256

    52af06d8b69b7428ec98ded0ef029397f0974de6a8424d53f0c645a65d9d6667

  • SHA512

    bcea750ec75bc500b649a124ea33551f4e13c05c075ee97b949d588a86f17b0acd21a4f48cf45a41ebc86d1e606348ec369a57c6bdad595c0241ec42572170ea

  • SSDEEP

    12288:L5kbOpJe9BYI20Dg2nT7gQs8WyMSgMYvx9Shuv5AlBstNa/s/byr0M4:9TeW00STTu3YYv6FBstU/Abyri

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\52af06d8b69b7428ec98ded0ef029397f0974de6a8424d53f0c645a65d9d6667.xlam"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    3KB

    MD5

    38977a0fda310afa4d0b8939134da36b

    SHA1

    10aeb59fa3dd463b7d31e75a1202c815448fb4fc

    SHA256

    ff97e1b16c8531d4d595880175c82bfb7988a0220a3745be51f1a6002c6c21a6

    SHA512

    283b839a0257d2794bb21342c31563e3d03665f8e02cec130c93f7c9e07a7c38dc1919df632ba7fd053f5f4deed4c1ec448d552941e1eb46ba67e708e8bf574f

  • memory/3624-15-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-56-0x00007FFD95470000-0x00007FFD95480000-memory.dmp

    Filesize

    64KB

  • memory/3624-2-0x00007FFD95470000-0x00007FFD95480000-memory.dmp

    Filesize

    64KB

  • memory/3624-5-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-6-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-7-0x00007FFD95470000-0x00007FFD95480000-memory.dmp

    Filesize

    64KB

  • memory/3624-4-0x00007FFD95470000-0x00007FFD95480000-memory.dmp

    Filesize

    64KB

  • memory/3624-8-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-10-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-9-0x00007FFD92F00000-0x00007FFD92F10000-memory.dmp

    Filesize

    64KB

  • memory/3624-12-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-14-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-3-0x00007FFD95470000-0x00007FFD95480000-memory.dmp

    Filesize

    64KB

  • memory/3624-17-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-16-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-13-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-11-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-18-0x00007FFD92F00000-0x00007FFD92F10000-memory.dmp

    Filesize

    64KB

  • memory/3624-28-0x00007FFDD548D000-0x00007FFDD548E000-memory.dmp

    Filesize

    4KB

  • memory/3624-29-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-30-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-0-0x00007FFDD548D000-0x00007FFDD548E000-memory.dmp

    Filesize

    4KB

  • memory/3624-58-0x00007FFD95470000-0x00007FFD95480000-memory.dmp

    Filesize

    64KB

  • memory/3624-57-0x00007FFD95470000-0x00007FFD95480000-memory.dmp

    Filesize

    64KB

  • memory/3624-1-0x00007FFD95470000-0x00007FFD95480000-memory.dmp

    Filesize

    64KB

  • memory/3624-55-0x00007FFD95470000-0x00007FFD95480000-memory.dmp

    Filesize

    64KB

  • memory/3624-59-0x00007FFDD53F0000-0x00007FFDD55E5000-memory.dmp

    Filesize

    2.0MB