Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2024, 16:00 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Purchase_Specifications.xll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase_Specifications.xll
Resource
win10v2004-20241007-en
General
-
Target
Purchase_Specifications.xll
-
Size
89KB
-
MD5
bd3bc369b662a2a535dc0d2594cd5382
-
SHA1
4a7fc4e0d97e530c197dee293187b46d3a6545aa
-
SHA256
6a6694d8f20335031b678ac80057b40fc6b428e9c1eb5c6f013ee8673a3bdec2
-
SHA512
1f2b27b086650206e5d3d02fd44750d4ab94017a4de310e34134dbcfb48f7afc5b6b0161c05db128b80814156523846e20e4e3e76400c98b8185939006203003
-
SSDEEP
768:35WNN1P5o3lP+PCp9wDw7/4p8ZrlpDtBUIl3C:35cN3o3lP+PCp9wDherlpfUe
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2364 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2364 EXCEL.EXE 2364 EXCEL.EXE 2364 EXCEL.EXE 2364 EXCEL.EXE 2364 EXCEL.EXE 2364 EXCEL.EXE 2364 EXCEL.EXE 2364 EXCEL.EXE 2364 EXCEL.EXE 2364 EXCEL.EXE 2364 EXCEL.EXE 2364 EXCEL.EXE 2364 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Purchase_Specifications.xll"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2364
Network
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.210.23.2.in-addr.arpaIN PTRResponse88.210.23.2.in-addr.arpaIN PTRa2-23-210-88deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestroaming.officeapps.live.comIN AResponseroaming.officeapps.live.comIN CNAMEprod.roaming1.live.com.akadns.netprod.roaming1.live.com.akadns.netIN CNAMEeur.roaming1.live.com.akadns.neteur.roaming1.live.com.akadns.netIN CNAMEfrc-azsc-000.roaming.officeapps.live.comfrc-azsc-000.roaming.officeapps.live.comIN CNAMEosiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.comosiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.comIN A52.109.68.129
-
Remote address:52.109.68.129:443RequestPOST /rs/RoamingSoapService.svc HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: text/xml; charset=utf-8
User-Agent: MS-WebServices/1.0
SOAPAction: "http://tempuri.org/IRoamingSettingsService/GetConfig"
Content-Length: 511
Host: roaming.officeapps.live.com
ResponseHTTP/1.1 200 OK
Content-Type: text/xml; charset=utf-8
Server: Microsoft-IIS/10.0
X-OfficeFE: RoamingFE_IN_250
X-OfficeVersion: 16.0.18228.30578
X-OfficeCluster: frc-000.roaming.officeapps.live.com
X-CorrelationId: d513009d-9b46-4158-9b68-c59091cb6990
X-Powered-By: ASP.NET
Date: Tue, 12 Nov 2024 16:01:57 GMT
Content-Length: 654
-
Remote address:8.8.8.8:53Request97.32.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request74.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request74.32.126.40.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request129.68.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request129.68.109.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request93.65.42.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request72.209.201.84.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request79.239.69.13.in-addr.arpaIN PTRResponse
-
1.7kB 7.7kB 11 10
HTTP Request
POST https://roaming.officeapps.live.com/rs/RoamingSoapService.svcHTTP Response
200
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
88.210.23.2.in-addr.arpa
-
73 B 250 B 1 1
DNS Request
roaming.officeapps.live.com
DNS Response
52.109.68.129
-
71 B 145 B 1 1
DNS Request
97.32.109.52.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
74.32.126.40.in-addr.arpa
DNS Request
74.32.126.40.in-addr.arpa
-
144 B 146 B 2 1
DNS Request
129.68.109.52.in-addr.arpa
DNS Request
129.68.109.52.in-addr.arpa
-
146 B 144 B 2 1
DNS Request
95.221.229.192.in-addr.arpa
DNS Request
95.221.229.192.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
93.65.42.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
72 B 132 B 1 1
DNS Request
72.209.201.84.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
48.229.111.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
79.239.69.13.in-addr.arpa