Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 21:36 UTC
Behavioral task
behavioral1
Sample
750af99d7e32b373a0ea0a9eabbddec20980687542f8e95e22fc9a3f0f832c1b.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
750af99d7e32b373a0ea0a9eabbddec20980687542f8e95e22fc9a3f0f832c1b.xls
Resource
win10v2004-20240802-en
General
-
Target
750af99d7e32b373a0ea0a9eabbddec20980687542f8e95e22fc9a3f0f832c1b.xls
-
Size
181KB
-
MD5
b3427b8b5250687f10c139f15ee2194e
-
SHA1
9a5515de022838f225588d29d5043298d2fec8e4
-
SHA256
750af99d7e32b373a0ea0a9eabbddec20980687542f8e95e22fc9a3f0f832c1b
-
SHA512
a1dfccab7254607ce4e415781cdb454617f2cf229685b6559cc3c22d28a79ea711c8b87e657a9040a0a86c8599e83d2050ddc033ab2e9ffeaaeb9c11b433a616
-
SSDEEP
3072:Epk3hbdlylKsgqopeJBWhZFGkE+cdPUZKaAV+YcIM6/+uF9KCOs+hMvlfynb5afc:Sk3hbdlylKsgqopeJBWhZFVE+UPUZKaC
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3168 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\750af99d7e32b373a0ea0a9eabbddec20980687542f8e95e22fc9a3f0f832c1b.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3168
Network
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestroaming.officeapps.live.comIN AResponseroaming.officeapps.live.comIN CNAMEprod.roaming1.live.com.akadns.netprod.roaming1.live.com.akadns.netIN CNAMEeur.roaming1.live.com.akadns.neteur.roaming1.live.com.akadns.netIN CNAMEfrc-azsc-000.roaming.officeapps.live.comfrc-azsc-000.roaming.officeapps.live.comIN CNAMEosiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.comosiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.comIN A52.109.68.129
-
Remote address:52.109.68.129:443RequestPOST /rs/RoamingSoapService.svc HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: text/xml; charset=utf-8
User-Agent: MS-WebServices/1.0
SOAPAction: "http://tempuri.org/IRoamingSettingsService/GetConfig"
Content-Length: 511
Host: roaming.officeapps.live.com
ResponseHTTP/1.1 200 OK
Content-Type: text/xml; charset=utf-8
Server: Microsoft-IIS/10.0
X-OfficeFE: RoamingFE_IN_491
X-OfficeVersion: 16.0.18122.30576
X-OfficeCluster: frc-000.roaming.officeapps.live.com
X-CorrelationId: 11ecc1eb-8f0b-4d9a-b776-df38729f3f98
X-Powered-By: ASP.NET
Date: Tue, 01 Oct 2024 21:36:09 GMT
Content-Length: 654
-
Remote address:8.8.8.8:53Request46.28.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request129.68.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request68.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.173.189.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTRResponse
-
1.9kB 7.7kB 12 10
HTTP Request
POST https://roaming.officeapps.live.com/rs/RoamingSoapService.svcHTTP Response
200
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
73 B 250 B 1 1
DNS Request
roaming.officeapps.live.com
DNS Response
52.109.68.129
-
71 B 145 B 1 1
DNS Request
46.28.109.52.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
129.68.109.52.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
68.32.126.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.173.189.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
56.163.245.4.in-addr.arpa