Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 22:02
Behavioral task
behavioral1
Sample
3d2a081981951720387fcb3ff6e5292ecf3b7257f9de8597257dae2a3fa5713d.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d2a081981951720387fcb3ff6e5292ecf3b7257f9de8597257dae2a3fa5713d.xls
Resource
win10v2004-20240802-en
General
-
Target
3d2a081981951720387fcb3ff6e5292ecf3b7257f9de8597257dae2a3fa5713d.xls
-
Size
189KB
-
MD5
b6a52d089775c780a21a347b7db79671
-
SHA1
bb2aea4a8da0d8cf4a4b6e9f6db9b242715b3f51
-
SHA256
3d2a081981951720387fcb3ff6e5292ecf3b7257f9de8597257dae2a3fa5713d
-
SHA512
3bbf899b4a6914351a0eb477acaa68d0987485b9720b00081afeb020c7c8dbe990d7301b228924ea63f0fbb08e2c2e6d1218186cd247a609a517f6e6d6891392
-
SSDEEP
3072:MJe6O9qbVNcryn4c5tmDV0Ak3hOdsylKlgxopeiBNhZFGzE+cL4LglnA+3o6BVqs:oe6O9GVNcrynbtmDVbk3hOdsylKlgxoc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1868 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1868 EXCEL.EXE 1868 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\3d2a081981951720387fcb3ff6e5292ecf3b7257f9de8597257dae2a3fa5713d.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1868