Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 22:21
Behavioral task
behavioral1
Sample
696bbe3653d19b6f850bcf0dd8cc2aca5804456df58da5d03aef6b940f90f788.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
696bbe3653d19b6f850bcf0dd8cc2aca5804456df58da5d03aef6b940f90f788.xls
Resource
win10v2004-20241007-en
General
-
Target
696bbe3653d19b6f850bcf0dd8cc2aca5804456df58da5d03aef6b940f90f788.xls
-
Size
153KB
-
MD5
4f2ff2e071ef56762a31c2cb3de10e77
-
SHA1
61faf2f4879ca071f96e85f5e42fde820709d1e9
-
SHA256
696bbe3653d19b6f850bcf0dd8cc2aca5804456df58da5d03aef6b940f90f788
-
SHA512
47baba83eb0b3653096d8d550620a9799f1bd3d0862ed85e593439bfb77462012e949dc4c0606f01f9c1f1bd5a52ffeda517f8e9a3eb1d88ff874e7d65330248
-
SSDEEP
3072:3g8rmjPOtyoVjDGL61EfDlaGGx+cLYIEc/Y1x7E+yqW1xH1xI491x:Q8rmjPOtyoVjDGL61EfDlavx+WYIEc/n
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2920 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2920 wrote to memory of 640 2920 EXCEL.EXE 88 PID 2920 wrote to memory of 640 2920 EXCEL.EXE 88
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\696bbe3653d19b6f850bcf0dd8cc2aca5804456df58da5d03aef6b940f90f788.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:640
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f