Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
59s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 05:38
Behavioral task
behavioral1
Sample
4fbbd4c9591ac023cd7da6c9e9dd10e173c1e8db7302c424b401b5516ea09588.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4fbbd4c9591ac023cd7da6c9e9dd10e173c1e8db7302c424b401b5516ea09588.xls
Resource
win10v2004-20240802-en
General
-
Target
4fbbd4c9591ac023cd7da6c9e9dd10e173c1e8db7302c424b401b5516ea09588.xls
-
Size
44KB
-
MD5
d597c69135c764796ccc916a9ed97d8f
-
SHA1
25bdf2dffd2df9435578eecd4ec560be5ede5678
-
SHA256
4fbbd4c9591ac023cd7da6c9e9dd10e173c1e8db7302c424b401b5516ea09588
-
SHA512
51220484fe348f5f99157882799f38e48948dce7bd648cd9913483d3a3a72ca9202628e0fdbf3a4bb24c273c07a3a3b6c9f49972a8a184591d8c2dc280fb4c58
-
SSDEEP
768:oPXk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJWL6uShYUQgcUcwWNvW1Tpl3ZeT:EXk3hbdlylKsgqopeJBWhZFGkE+cL2Nf
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3744 3464 explorer.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 440 3464 explorer.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3464 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3464 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3464 wrote to memory of 3744 3464 EXCEL.EXE 89 PID 3464 wrote to memory of 3744 3464 EXCEL.EXE 89 PID 2224 wrote to memory of 2136 2224 explorer.exe 91 PID 2224 wrote to memory of 2136 2224 explorer.exe 91 PID 3464 wrote to memory of 440 3464 EXCEL.EXE 93 PID 3464 wrote to memory of 440 3464 EXCEL.EXE 93 PID 1884 wrote to memory of 3212 1884 explorer.exe 95 PID 1884 wrote to memory of 3212 1884 explorer.exe 95
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4fbbd4c9591ac023cd7da6c9e9dd10e173c1e8db7302c424b401b5516ea09588.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Public\xAo26p.vbs2⤵
- Process spawned unexpected child process
PID:3744
-
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Public\xAo26p.vbs2⤵
- Process spawned unexpected child process
PID:440
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\xAo26p.vbs"2⤵PID:2136
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\xAo26p.vbs"2⤵PID:3212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365B
MD5586146af62044d054a54e6291ef51427
SHA1339647bbdc4c0fc34984f5a7ad4d3b909c83b176
SHA256571c451f89da319606bfad8fdff3c589954ca8ac52e4f1280cf3e3b67a1f2b5b
SHA5129168ec7bb0d38a6ad0822ba42b0a38a895b7733644be6432cecf4cc4a4fc1b474d7acfb200a644c89564c209141337a11427274826dc61150cd711385ff19bc4
-
Filesize
631B
MD5c3722cb0f305f5f13f4b083920948014
SHA15c5e9710b6176e22cb3c36215130fdb3a5df592f
SHA256034c223fec355a561797ae9703d837a4ef60a7bec72267d0d314187b5d225214
SHA512eaf3b86029914f1c19dd5922cd015a1f94b39f43ab2ca44e58caa7250308a5bd11399b3f862423a2399255e7937a0a5c4e38048706145eb0094c114aeefe9d75