Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 21:34
Behavioral task
behavioral1
Sample
d6a32b4c3a38decfc3e3e7f8a11035ae4c518a904fc6b39486d6c7bba335e19e.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6a32b4c3a38decfc3e3e7f8a11035ae4c518a904fc6b39486d6c7bba335e19e.xlsm
Resource
win10v2004-20241007-en
General
-
Target
d6a32b4c3a38decfc3e3e7f8a11035ae4c518a904fc6b39486d6c7bba335e19e.xlsm
-
Size
173KB
-
MD5
8142b30f3a6c4da725bc74cb41914b2e
-
SHA1
6035b0307320ac027300dc1ff1091f8854ba099d
-
SHA256
d6a32b4c3a38decfc3e3e7f8a11035ae4c518a904fc6b39486d6c7bba335e19e
-
SHA512
f9c69a29ebf007985d55d20fa21a04dbeb95230fc4dc36c14d90dd4909cc830ea8d7cb656a7942eb3ca3ed16641352d23d30d6e365dbc6050c2b93357f1cdb57
-
SSDEEP
3072:F8UjKwtyfsBMtuqBqBqrhyqBqBqBqrhyqmBqenFZRmXANKXg7e79ElHIcp4Gg7SS:F8SKwtyfsBMtuqBqBqrhyqBqBqBqrhyk
Malware Config
Extracted
https://realitevirtuelleguadeloupe.com/warp-visa/xogkV/
https://nuugebeya.com/wp-content/LqCYYSBQ/
https://larassatistore.com/mail.tie-collection.my.id/SZZ0/
https://bimbeladzkia.com/1600-arrow/njvK9lEVwMfxQyw/
https://vendedoramigo.com.br/wp-admin/tfQwLyk4/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3324 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3324 EXCEL.EXE 3324 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3324 EXCEL.EXE 3324 EXCEL.EXE 3324 EXCEL.EXE 3324 EXCEL.EXE 3324 EXCEL.EXE 3324 EXCEL.EXE 3324 EXCEL.EXE 3324 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d6a32b4c3a38decfc3e3e7f8a11035ae4c518a904fc6b39486d6c7bba335e19e.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD559569e9ee510ab0fe5cfe84de92e0c4f
SHA1532e0e6bcb39c4c47255a9c6abeb00d16c2cca15
SHA256f2e2c9fb0cdcaed04cd39bd35bd15e6a75aa7a12b91c71b41973de74c1c48f61
SHA512bb57b2425bb547c1404278574281b2af6afd81c2a7ae9ff5357c9b1ad7ffc0ad9bc2bd8a3888b02b7ad0d44b7b8b666cbe60ef66dd8bce73bc2e1c6e5ac6e7cb