Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 22:04
Behavioral task
behavioral1
Sample
f63d40d6138f8402595ac66d1d7ee0b75b9ad3bb9341cd0915244196085b04a6.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f63d40d6138f8402595ac66d1d7ee0b75b9ad3bb9341cd0915244196085b04a6.xls
Resource
win10v2004-20241007-en
General
-
Target
f63d40d6138f8402595ac66d1d7ee0b75b9ad3bb9341cd0915244196085b04a6.xls
-
Size
70KB
-
MD5
46229e8c71216f7d7dea253ab15c86b0
-
SHA1
0f6422303dc22782986359d8b65f44abc00ce28c
-
SHA256
f63d40d6138f8402595ac66d1d7ee0b75b9ad3bb9341cd0915244196085b04a6
-
SHA512
119f77bdc42368241cd683be7bbe41f7876faa4250cfce14ff808b5d37a895e1ecfd4748e756ff899d72e82d1e73bb24ebc59a5954d29b11245bba2103bb87ae
-
SSDEEP
1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+KJ+hDcnTLiQrRTZws8Eo:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM2
Malware Config
Extracted
https://sacvasanth.com/public/lyP2lh1hlJr/
https://webguruindia.com/theme/wTbEyLVvMNB3j/
http://stockmorehouse.com/Casa_Grande/AS4VPkTsOqWDGGO/
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2448 1068 regsvr32.exe 83 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4012 1068 regsvr32.exe 83 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4948 1068 regsvr32.exe 83 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1068 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1068 EXCEL.EXE 1068 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE 1068 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1068 wrote to memory of 2448 1068 EXCEL.EXE 88 PID 1068 wrote to memory of 2448 1068 EXCEL.EXE 88 PID 1068 wrote to memory of 4012 1068 EXCEL.EXE 89 PID 1068 wrote to memory of 4012 1068 EXCEL.EXE 89 PID 1068 wrote to memory of 4948 1068 EXCEL.EXE 90 PID 1068 wrote to memory of 4948 1068 EXCEL.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f63d40d6138f8402595ac66d1d7ee0b75b9ad3bb9341cd0915244196085b04a6.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa1.ocx2⤵
- Process spawned unexpected child process
PID:2448
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa2.ocx2⤵
- Process spawned unexpected child process
PID:4012
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\cusoa3.ocx2⤵
- Process spawned unexpected child process
PID:4948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD53f88e5fea5e5553eb8b452c2f566c885
SHA1a8987ced8e9a2c3ecf7b4f421b64fef757f52dcc
SHA2566fdfc3b5ce588c7f3d0163c6d03f61e13e1ffb81f794d957b72870229b6234cb
SHA51293e9ac96d998b34554fe04ea02ffbdd3306878900f08623cc2ad53c90ef0d27816450569db53c0f4588d3c0dc66b6cc2010ea0a8ec2493164ba9a8479057cfe8