Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 21:54
Behavioral task
behavioral1
Sample
598d4c63b2257f4df09c50b6a88abee298fc3c729e57d5933c4dbbfea9d31001.xlsm
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
598d4c63b2257f4df09c50b6a88abee298fc3c729e57d5933c4dbbfea9d31001.xlsm
Resource
win10v2004-20240802-en
General
-
Target
598d4c63b2257f4df09c50b6a88abee298fc3c729e57d5933c4dbbfea9d31001.xlsm
-
Size
92KB
-
MD5
54835ae0fab001f6581ab125a7a4c071
-
SHA1
3a32dc4df306bbc04bde6940936fadc31cfd5605
-
SHA256
598d4c63b2257f4df09c50b6a88abee298fc3c729e57d5933c4dbbfea9d31001
-
SHA512
99f595a201182161313897310ae3f4d922366175b111a587cded172b63b18b184d70f35bc0d2a3410514cb41e4f99fc05942def925bb9b001c5a03dc32a4a15c
-
SSDEEP
1536:CguZCa6S5khUID/SaWN9c4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIINF3:CgugapkhlD/SpqaPjpM+d/Ms8ULavLcG
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3108 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE 3108 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\598d4c63b2257f4df09c50b6a88abee298fc3c729e57d5933c4dbbfea9d31001.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5c2dd222da2477ad1feb537bd1718b2cb
SHA13f295697ee82246badf7b2de2a547837a7151675
SHA2566f4d73f82f11c878117bfc27f981fa2cbc9f5e87f4eca37d37f6f1663a1301fc
SHA51294687b9ef0c86cb9227abf45df705ca56016e7364f7737b99825aa9983e1abee2fd956bd1380461f84b1187b7377545a3466681cf344d0ac26a1819fe6c4a1a7