Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 21:21

General

  • Target

    43a330d11b7a32d19a5b8ca05b3c742f42dc3d73a7b3b8c636352e9c5f2de198.xls

  • Size

    70KB

  • MD5

    bdefa842a8742c76c88ea8c3121ee982

  • SHA1

    dc92563797d174dfc79adab560b13d1bd13e6a8f

  • SHA256

    43a330d11b7a32d19a5b8ca05b3c742f42dc3d73a7b3b8c636352e9c5f2de198

  • SHA512

    f20646f9b99d8277e3c4225b9aec8373980bc655c6fad5a2a08ce78ce2da2d3cd4e2d8cf843a5d7b0fe901b522a1628210a6f626366eac794c0278d984709fb3

  • SSDEEP

    1536:tOKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+1YW/ESKQHS1yXJFa5etGv:AKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMF

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://congtycamvinh.com/plugins/jG3iqpQaTL1TXYMolH/

xlm40.dropper

http://ecube.com.mx/e2oCWBnC/6wp2K4sfQmVIRy6ZvdiH/

xlm40.dropper

http://dulichdichvu.net/libraries/6vhzwoZoNDSMtSC/

xlm40.dropper

http://gnif.org/administrator/G68HwUGlKNJNU2vh5cz/

xlm40.dropper

https://edoraseguros.com.br/cgi-bin/l7ZERv5deNsfzlZUZ/

xlm40.dropper

https://sanoma.allrent.nl/cgi-bin/KXbI5OhLJ/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\43a330d11b7a32d19a5b8ca05b3c742f42dc3d73a7b3b8c636352e9c5f2de198.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    7520b0bc13076b9e068f8161ecaf78fa

    SHA1

    e80b8dbe5d5cbeedf00e307c06261523fbc81c9e

    SHA256

    ba120535e624c44db6b72f9346e2e42e395e1a330e7520f9ac3cb6703c2ef5d0

    SHA512

    4c92467d75c80c6b9cce5e225684b73bd124c2618e4a10ae81a10f9d217c02f30383c6d5c3bdcf752cb5cf84011dbb3fc23ddeefc93d7806271e7761cc324ffa

  • memory/720-5-0x00007FFC838D0000-0x00007FFC838E0000-memory.dmp

    Filesize

    64KB

  • memory/720-12-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/720-3-0x00007FFC838D0000-0x00007FFC838E0000-memory.dmp

    Filesize

    64KB

  • memory/720-4-0x00007FFC838D0000-0x00007FFC838E0000-memory.dmp

    Filesize

    64KB

  • memory/720-8-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/720-7-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/720-6-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/720-1-0x00007FFCC38ED000-0x00007FFCC38EE000-memory.dmp

    Filesize

    4KB

  • memory/720-2-0x00007FFC838D0000-0x00007FFC838E0000-memory.dmp

    Filesize

    64KB

  • memory/720-10-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/720-9-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/720-11-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/720-13-0x00007FFC81480000-0x00007FFC81490000-memory.dmp

    Filesize

    64KB

  • memory/720-14-0x00007FFC81480000-0x00007FFC81490000-memory.dmp

    Filesize

    64KB

  • memory/720-31-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/720-32-0x00007FFCC38ED000-0x00007FFCC38EE000-memory.dmp

    Filesize

    4KB

  • memory/720-33-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/720-0-0x00007FFC838D0000-0x00007FFC838E0000-memory.dmp

    Filesize

    64KB