Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 21:15
Behavioral task
behavioral1
Sample
41c0a3cc941ebeccbdad89f7904e9b68711f7f270202b18c2912214d00f80132.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41c0a3cc941ebeccbdad89f7904e9b68711f7f270202b18c2912214d00f80132.xlsm
Resource
win10v2004-20240802-en
General
-
Target
41c0a3cc941ebeccbdad89f7904e9b68711f7f270202b18c2912214d00f80132.xlsm
-
Size
92KB
-
MD5
47f6818e6c4ceecafdc62aa22fb511b7
-
SHA1
a0357863915e629a57de19c57469a5963f23f5bb
-
SHA256
41c0a3cc941ebeccbdad89f7904e9b68711f7f270202b18c2912214d00f80132
-
SHA512
34b85bc186f8788f36d58de31346a076a679800ef7bed3df4d90df97c2c41817d9aa02342058e52eea16723d3e75cae9121eef1e08a4ca7d6fea2bc71fb2f801
-
SSDEEP
1536:CguZCa6S5khUIs1CJ12f4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIuuFx:CgugapkhloCJofaPjpM+d/Ms8ULavLcK
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5004 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE 5004 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\41c0a3cc941ebeccbdad89f7904e9b68711f7f270202b18c2912214d00f80132.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5a2845580bd51aae90ff22ea6daf57d71
SHA16cf908e50f1e7b6f34e7e6d65fc25561e2d058f4
SHA256a492e60dbc1ca6d1414912cefa83c09827551374b07b8d046a62910034e30985
SHA5122c6687cac70ffeea15a7ceb499df52ac94c2805d090ee5f31851e75ded78199df776ba5a4a9ca67870100ca94b2ee375e17e5210f5c089bc4cc788ddc5bf92b8