Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 22:05
Behavioral task
behavioral1
Sample
f328e311053cbc9b37a8bd9aec0e64e118eda7ea510b63e48b68f7acc4a9f6cb.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f328e311053cbc9b37a8bd9aec0e64e118eda7ea510b63e48b68f7acc4a9f6cb.xlsm
Resource
win10v2004-20240802-en
General
-
Target
f328e311053cbc9b37a8bd9aec0e64e118eda7ea510b63e48b68f7acc4a9f6cb.xlsm
-
Size
92KB
-
MD5
6ae1537f7300927aa2d8b25147afe099
-
SHA1
cca1dcabac3dc3dd490405b8a037864ba11ac8b7
-
SHA256
f328e311053cbc9b37a8bd9aec0e64e118eda7ea510b63e48b68f7acc4a9f6cb
-
SHA512
bc3eb78d113b19da0056de85f58b384e3d80f5f5a3b50ffeecfb0a6fc54ad62d10338d62cd126365d1e77edc4cc1c49d03481b2466d8076c440304f5409fdb50
-
SSDEEP
1536:CguZCa6S5khUI1JBjvyB5o4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIXLF+:Cgugapkhln185oaPjpM+d/Ms8ULavLcd
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1912 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1912 EXCEL.EXE 1912 EXCEL.EXE 1912 EXCEL.EXE 1912 EXCEL.EXE 1912 EXCEL.EXE 1912 EXCEL.EXE 1912 EXCEL.EXE 1912 EXCEL.EXE 1912 EXCEL.EXE 1912 EXCEL.EXE 1912 EXCEL.EXE 1912 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f328e311053cbc9b37a8bd9aec0e64e118eda7ea510b63e48b68f7acc4a9f6cb.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD568ca2262615dea8b5dcc2591e3b1762b
SHA1263190851b29b36923ecb919eb7b322d7ef0ddb2
SHA25695280994ba42f2ba44087f2fa3f5e4c065aa6d9aaa26369d717d6f608a66fd93
SHA512ae504470e7ea26cc62acadd5d28564319c2f859bdd95af612410c8521ebff3c9ad9990e41f32ca4e4861e3a5739e1022c5e4c0f97de4d1a690aa71ae7be2db07