Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 10:59

General

  • Target

    PO-014842-2.xls

  • Size

    555KB

  • MD5

    0eca5068b23513d7d20d9f05b5a33cde

  • SHA1

    b11da160460403bacb257d4832ca617fcf8c9840

  • SHA256

    b171b5e7c7abd247edcc25f1c00301e89f1e9715ed6d98f03f4b6a6674c5834b

  • SHA512

    2b16f2c208573a9361b646e34b6ac627fb3d9b80fb0ff7a09cf3d0e5bfeefb2d09ad482e428a5effe80a3da1267df4c07f08728f589ea6b01324ef6adb102d16

  • SSDEEP

    12288:++M2PYL9XdP7MqOZzCSbxuKuw+9WompCHYCFxi7Ehh7wYf:+cPYLpdwZdMK3ewCHTqo0Y

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PO-014842-2.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Windows\System32\mshta.exe
      C:\Windows\System32\mshta.exe -Embedding
      2⤵
      • Process spawned unexpected child process
      PID:4736
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=3792 /prefetch:8
    1⤵
      PID:4744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

      Filesize

      2KB

      MD5

      5bdcc76a93dd695f2e24fd442134a395

      SHA1

      fcae6e8d16accd2a540699cbd1293dcd8c48ef25

      SHA256

      b8a910938f0920c50c3acca17f99288ae0c95c010e75f42c6d2eb7db82a46033

      SHA512

      b5b2f9e1b0522c410e7ec513531221ec68093b6f1738ffcffb7f2bb1e73a778d4b46249a3f6d530033a369b957a399655278cb75d5333c4247ae3367d797ffa2

    • memory/1408-18-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-15-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-5-0x00007FF8161F0000-0x00007FF816200000-memory.dmp

      Filesize

      64KB

    • memory/1408-6-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-4-0x00007FF8161F0000-0x00007FF816200000-memory.dmp

      Filesize

      64KB

    • memory/1408-9-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-8-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-12-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-13-0x00007FF813C60000-0x00007FF813C70000-memory.dmp

      Filesize

      64KB

    • memory/1408-11-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-10-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-16-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-19-0x00007FF813C60000-0x00007FF813C70000-memory.dmp

      Filesize

      64KB

    • memory/1408-21-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-20-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-0-0x00007FF8161F0000-0x00007FF816200000-memory.dmp

      Filesize

      64KB

    • memory/1408-2-0x00007FF8161F0000-0x00007FF816200000-memory.dmp

      Filesize

      64KB

    • memory/1408-14-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-17-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-7-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-3-0x00007FF8161F0000-0x00007FF816200000-memory.dmp

      Filesize

      64KB

    • memory/1408-88-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-84-0x00007FF8161F0000-0x00007FF816200000-memory.dmp

      Filesize

      64KB

    • memory/1408-46-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/1408-47-0x00007FF85620D000-0x00007FF85620E000-memory.dmp

      Filesize

      4KB

    • memory/1408-87-0x00007FF8161F0000-0x00007FF816200000-memory.dmp

      Filesize

      64KB

    • memory/1408-85-0x00007FF8161F0000-0x00007FF816200000-memory.dmp

      Filesize

      64KB

    • memory/1408-1-0x00007FF85620D000-0x00007FF85620E000-memory.dmp

      Filesize

      4KB

    • memory/1408-86-0x00007FF8161F0000-0x00007FF816200000-memory.dmp

      Filesize

      64KB

    • memory/4736-52-0x00007FF72C490000-0x00007FF72C498000-memory.dmp

      Filesize

      32KB

    • memory/4736-51-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/4736-44-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB

    • memory/4736-38-0x00007FF856170000-0x00007FF856365000-memory.dmp

      Filesize

      2.0MB