Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
ca67156efa90ee91d28ffde2cced06142e79316704c5b3bafe74b980b806e031.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca67156efa90ee91d28ffde2cced06142e79316704c5b3bafe74b980b806e031.xlsm
Resource
win10v2004-20240802-en
General
-
Target
ca67156efa90ee91d28ffde2cced06142e79316704c5b3bafe74b980b806e031.xlsm
-
Size
42KB
-
MD5
c2f9809cf3145aad896839336e6c8870
-
SHA1
7a5558f20e60820a261f4ea4c86d7b7232520f07
-
SHA256
ca67156efa90ee91d28ffde2cced06142e79316704c5b3bafe74b980b806e031
-
SHA512
8fe02e9dee2a2a631b2c906bbf5625238dbdf079e47b839e784e076fd45fd1be6ab865af725986a51e9ea4aa31018eb1bcfd7e7dc5a8527bc01d667db28cfb77
-
SSDEEP
768:hEx/KgamErbZjfyS56agBDh8efxqVrEmzhRgEICHgSo5FNW3zuq:sCtW6efzi/OCASMNAt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4640 malcod.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\malcod.exe EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1920 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1920 EXCEL.EXE 1920 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE 1920 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1920 wrote to memory of 4640 1920 EXCEL.EXE 98 PID 1920 wrote to memory of 4640 1920 EXCEL.EXE 98
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ca67156efa90ee91d28ffde2cced06142e79316704c5b3bafe74b980b806e031.xlsm"1⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\WINDOWS\Tasks\malcod.exeC:\WINDOWS\Tasks\malcod.exe2⤵
- Executes dropped EXE
PID:4640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5abb5cf8392c9ee05644b943b36781e6c
SHA16fe7e1af4fd9cc65d8d70d4cecd2511793801570
SHA2569b04d02ff7b43eb6a4aa00cbb61ed24344fdcefeb77d84e6569e7684d5fcb210
SHA5121888b15ffa2f2cc29d1f0c20cc0e4960de2dfecb91385a14a015664ecc9d7761240957d2fd8cc7a48d932c97a38a821cef122ddbf5bcf8e56e950fbf16624a93
-
Filesize
11KB
MD577bfcca0a57983b380d6f732b2dd145c
SHA16d9b5261aac522192839d5e3310dafdb18f52ffa
SHA2568a98f8e6dd13660d8bb84a92a1aa852a077d932c483d2ef2ad03fddc88f173de
SHA512867d16035d233c6a0f72d4a8f36682de9b5ca17896f29fcf043c704ee4bbf57b605bc679f13feb7b391ff1668fbcd646ae61221365000834f3b817b5fec2e31c