Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 17:30
Behavioral task
behavioral1
Sample
99c8783f15781e4de935d723623cfd67f8bc234839a9e5de6f6349b6391bb61b.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
99c8783f15781e4de935d723623cfd67f8bc234839a9e5de6f6349b6391bb61b.xls
Resource
win10v2004-20241007-en
General
-
Target
99c8783f15781e4de935d723623cfd67f8bc234839a9e5de6f6349b6391bb61b.xls
-
Size
113KB
-
MD5
c6be0239047101a84830f57e6e295004
-
SHA1
db8e4d9096d991ec4ed1838ae507746dbe749bb9
-
SHA256
99c8783f15781e4de935d723623cfd67f8bc234839a9e5de6f6349b6391bb61b
-
SHA512
a74dc12055f22c882c651aad5c51052e596151334d7d80040ecb8a3a400d2683823cbf98e8b9dd07dc3a21d3ddfe3d6dce1196f8f6e49ff69e2b55b074080db2
-
SSDEEP
3072:yKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgQCyVEdBU6hubsll6UQjvx2:yKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgbb
Malware Config
Extracted
http://gaidov.bg/wp-includes/Ug/
http://studiokrishnaproduction.com/wp-includes/3mJ/
http://goodmarketinggroup.com/live_site/Y9cEk9QNlDUeg/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3452 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3452 EXCEL.EXE 3452 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3452 EXCEL.EXE 3452 EXCEL.EXE 3452 EXCEL.EXE 3452 EXCEL.EXE 3452 EXCEL.EXE 3452 EXCEL.EXE 3452 EXCEL.EXE 3452 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\99c8783f15781e4de935d723623cfd67f8bc234839a9e5de6f6349b6391bb61b.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD567b0ed6449e974daf4ba52d05b04cf2f
SHA17744e7e768ac9f3619faa8677b7d94b1575a0443
SHA25646aeadc0408d5b1ae6f566bcf6c2458f74446fbda8db3fc769eddd4aa456558b
SHA5125dd28435c4e0f9a99cfc03ffc29ff8e950f39e87afc56bfdd301189246e9d89981faefe694d05bf0ade03f4beb06971db747f42c6bcdadc112a59a939eb2a05c