Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.pdf
Resource
win10v2004-20241007-en
General
-
Target
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.xlsx
-
Size
47KB
-
MD5
9771389bc57978ea304b3c7be7454c06
-
SHA1
c3a1673b6531e2c3b5cbe243290ef94452ef5309
-
SHA256
98b91485a57c5dab66e341b6f00fd876578e041055874a92281479aeb3adf3b8
-
SHA512
7ef525b11fe447a09d4c112da981b2246dfbf690a15d54344369241967a1e14b9b2d48dac23911273a7ef3cad3c1b7bd9bd0ddf6f6a7479d0e3681702b52a65f
-
SSDEEP
768:EtV2Yf6H3JdHH02JD3PUb1ztZNuC8EIqoCk+W7hiOvQOQOJX8+/oybLCkLlD/hza:EtV2Yf6XJdn0WgxNuC86oCO/zp1nPVS1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2304 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2304 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.xlsx1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2304