Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
e83bd8944d543a41ffb5c576c9ca2ff55c6ca7ceea55dcf30aa35a46f7375ea7.xlsm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e83bd8944d543a41ffb5c576c9ca2ff55c6ca7ceea55dcf30aa35a46f7375ea7.xlsm
Resource
win10v2004-20240802-en
General
-
Target
e83bd8944d543a41ffb5c576c9ca2ff55c6ca7ceea55dcf30aa35a46f7375ea7.xlsm
-
Size
21KB
-
MD5
559e5b1de9c8221b658b74a335df207a
-
SHA1
c2ff82c8e2bab89716d2802656b65891bf70f265
-
SHA256
e83bd8944d543a41ffb5c576c9ca2ff55c6ca7ceea55dcf30aa35a46f7375ea7
-
SHA512
378554177bf11cdfc9ac4d54c710681b20592ab72d6e55e8e2054c79306f786479830f6030fdc9f44f49ba295d5b3b7ca5c69cc3cbbd33e7ada869248de1e0a3
-
SSDEEP
384:EtJBIzedLaAtdRTNmtXD6fozmY841lVK3nO+/53e/tuAzr5u:5zCaeNwXufMmd43VinOOc/tBzrE
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4296 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4296 EXCEL.EXE 4296 EXCEL.EXE 4296 EXCEL.EXE 4296 EXCEL.EXE 4296 EXCEL.EXE 4296 EXCEL.EXE 4296 EXCEL.EXE 4296 EXCEL.EXE 4296 EXCEL.EXE 4296 EXCEL.EXE 4296 EXCEL.EXE 4296 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e83bd8944d543a41ffb5c576c9ca2ff55c6ca7ceea55dcf30aa35a46f7375ea7.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5245b4e075c14348268ddd1719c54ab45
SHA1b75a556ee42fb76c238c6bf7d39071459a95f905
SHA256616996f214579a6e9ae6ccab9d2218f2be753e62ac0cb192458e5189437830ba
SHA5128319a41725e6c2ec15e2f4ae58268dfa7b8f267a3da9800632660e6e8c42530d8260567387b5fc603e77113036346b5b58841218bd26d00dd4c44f2fa798c1b7