Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
fac014011c07df89dc855c1eb6007c209f5a97fadfd0ecec9258e5ec2ae8e93d.xlsx
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fac014011c07df89dc855c1eb6007c209f5a97fadfd0ecec9258e5ec2ae8e93d.xlsx
Resource
win10v2004-20240802-en
General
-
Target
fac014011c07df89dc855c1eb6007c209f5a97fadfd0ecec9258e5ec2ae8e93d.xlsx
-
Size
73KB
-
MD5
29db2fd6ec5f482d151818206b1a2cd8
-
SHA1
94bb422b363b19fad82bf3effcce9c1de6a29a98
-
SHA256
fac014011c07df89dc855c1eb6007c209f5a97fadfd0ecec9258e5ec2ae8e93d
-
SHA512
8e3e6ed8dc2ac305dcaec961a376c7a8cf6e043785c6769b6106938b377efc8f44cbc92d6232b6b4c9fa945a7a5f54c5d02dbc059fc76169f3de42f528630fdf
-
SSDEEP
1536:52AQ7TJ9wRlBc5XgYhObNfXxhShmBzVeFUuM:FQAUg0ItbSqoFUuM
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4640 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4640 EXCEL.EXE 4640 EXCEL.EXE 4640 EXCEL.EXE 4640 EXCEL.EXE 4640 EXCEL.EXE 4640 EXCEL.EXE 4640 EXCEL.EXE 4640 EXCEL.EXE 4640 EXCEL.EXE 4640 EXCEL.EXE 4640 EXCEL.EXE 4640 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\fac014011c07df89dc855c1eb6007c209f5a97fadfd0ecec9258e5ec2ae8e93d.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5dd83054ef217a091bfe66473ba3d20e1
SHA1d593266c9b19ef1f345c107092410d22aca79b30
SHA256dec2f07601bb7a091f77cc3a07a3e1598f95565ce2092c411aed169a789e0bd8
SHA512641f5194a4a11a6e034519a352c0a378d043fcce61bdba9b949b21d82de64adf4c2a8952af3e202d6920dc3a2bd2422110d989f56af43472f5a133a11ac748b7