Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 21:02
Behavioral task
behavioral1
Sample
d644f5993c6ac824b6c38d2fea8dcd75dc9ec6dfd6f517e08b7f71feaa4c1acf.xlsm
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d644f5993c6ac824b6c38d2fea8dcd75dc9ec6dfd6f517e08b7f71feaa4c1acf.xlsm
Resource
win10v2004-20240802-en
General
-
Target
d644f5993c6ac824b6c38d2fea8dcd75dc9ec6dfd6f517e08b7f71feaa4c1acf.xlsm
-
Size
92KB
-
MD5
464ba88d28d5125b55f62d48cf2c93c0
-
SHA1
13b48acea1f9f5bba98f97e66008207a7500e660
-
SHA256
d644f5993c6ac824b6c38d2fea8dcd75dc9ec6dfd6f517e08b7f71feaa4c1acf
-
SHA512
6c827cb738c5bc6675488fe9f662e45535215bcc62797e01d9e36d41d7c81e80397d0dddbba4f85fe50e9c0f543157a4ad8d90d63694450e77f3311d0326d56f
-
SSDEEP
1536:CguZCa6S5khUIq8DIlzz924znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIXeFe:CgugapkhlJDSz8aPjpM+d/Ms8ULavLci
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3424 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3424 EXCEL.EXE 3424 EXCEL.EXE 3424 EXCEL.EXE 3424 EXCEL.EXE 3424 EXCEL.EXE 3424 EXCEL.EXE 3424 EXCEL.EXE 3424 EXCEL.EXE 3424 EXCEL.EXE 3424 EXCEL.EXE 3424 EXCEL.EXE 3424 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d644f5993c6ac824b6c38d2fea8dcd75dc9ec6dfd6f517e08b7f71feaa4c1acf.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\S68Q8CZENZNUUZ1AXRQ5.temp
Filesize1KB
MD51e923a2d5607635ff49bc8b1f538526a
SHA1376b9f0f54f72352e72c704919363decd828d9a8
SHA25646a065731985676b32a75e66511c721ecf0dc00236d1b260d3186826324e3933
SHA512e10660c4dca28e6bc7716715501219e0424824743f918bbab0de2a60bd037f5fbdb14b7fdc4401e3e738b9dce57026e3ccea0138f971bab02c3a5da41b520009