Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 12:48
Static task
static1
Behavioral task
behavioral1
Sample
DEXHOME_1720989146883.csv
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
DEXHOME_1720989146883.csv
Resource
win10v2004-20240802-en
General
-
Target
DEXHOME_1720989146883.csv
-
Size
33KB
-
MD5
0ff8cc58429bd639a312ef510ecfffbd
-
SHA1
ee679c5e100c82bfd23fec1ee3904907cd71479d
-
SHA256
b76430951a8f0a1239d2e9b1566d6dea3ac51794e74eaa7a799400eddf22e68e
-
SHA512
0c4d4458f89fe9a22f52ffb76ec76935b4659b5f225348a600e70b862e95e08175f9f25641b9297dec11afc99e94042529a6ee10ac428cc5c78bc9083ae28e89
-
SSDEEP
768:K48wlYyZRcCHdTj2Y6Bj4zRi2OLjSvMao6s+VFiOo+jOFtB/u866HVzC:7NkEi/LYiOo+jOFH/l1zC
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3300 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3300 EXCEL.EXE 3300 EXCEL.EXE 3300 EXCEL.EXE 3300 EXCEL.EXE 3300 EXCEL.EXE 3300 EXCEL.EXE 3300 EXCEL.EXE 3300 EXCEL.EXE 3300 EXCEL.EXE 3300 EXCEL.EXE 3300 EXCEL.EXE 3300 EXCEL.EXE 3300 EXCEL.EXE 3300 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\DEXHOME_1720989146883.csv"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD52a03d6da1ed40a97405d91677b4a49f8
SHA1c9f5754f9ed63615ffb560c7536ea1bdd5e999f4
SHA256574033eaeb8176a44ff46862493f391fb4fafa251f8a2b22cbf7d6644b604e14
SHA5127f667c396b8543282d1d95bcdea67a4b8c8befdb3e84d7a4ebdb114f2bec19652cd3eda04e4aae2e94a386e5fd028f2d44529f118ad27f0138d9898e670a1c14