Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 00:51

General

  • Target

    490f59b6811ec8987f87b244200f6c5b377babdcf597181bbd71fa5d61301152.xlsm

  • Size

    46KB

  • MD5

    49a8bfaf36adce55366c3063f9682182

  • SHA1

    1bd16833b90c27c08d0c2e2bf4584b6cb87a21ab

  • SHA256

    490f59b6811ec8987f87b244200f6c5b377babdcf597181bbd71fa5d61301152

  • SHA512

    b9a361117bf5cb9c06a9b2aa612964b19da05c7d3af6f87e0c51c749a06fa1fafdfeb02dee6e571c79074b76b6eb38a630003d416caa2e5f3c6bea56b9228904

  • SSDEEP

    768:hGovDOevZCwrvtBtfzdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0VU2fUPZa:wovDztT5fTR4Lh1NisFYBc3cr+UqVU5c

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://touqarrayan.com/wp-content/RoiB/

xlm40.dropper

http://nayzaqaljanoob-iq.com/sapbush/tylhe1/

xlm40.dropper

http://cabinet-bribech.com/wp/DyMNglRY5B4abPy1hH/

xlm40.dropper

http://retailhpsinterview.com/cgi-bin/dJp9RYh/

xlm40.dropper

https://lisalmcgee.com/images/xpl7i1ETzHPwaFd89HS/

xlm40.dropper

https://collision-staging.com/wp-content/94PQ1/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\490f59b6811ec8987f87b244200f6c5b377babdcf597181bbd71fa5d61301152.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    46aa0aa816aec556edab5309f60c4359

    SHA1

    e8d712e5f569cbf14ff134607a5c57f2ad352862

    SHA256

    50456abbc4c19a56e1a37af494a3998efb0c302f512ff7bdd8e3e4a727f081e6

    SHA512

    611c30b6ff12fce1b7314a7fb5aaece892e115f2a16372039cca905b01bd9a3998415780bf32d30d4638bc598b81c00128aa252d5f66bb75b5c9907214ec9073

  • memory/3676-13-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-9-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-4-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/3676-0-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/3676-5-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/3676-11-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-12-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-10-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-14-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-1-0x00007FFC9E28D000-0x00007FFC9E28E000-memory.dmp

    Filesize

    4KB

  • memory/3676-3-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/3676-8-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-15-0x00007FFC5B910000-0x00007FFC5B920000-memory.dmp

    Filesize

    64KB

  • memory/3676-7-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-6-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-16-0x00007FFC5B910000-0x00007FFC5B920000-memory.dmp

    Filesize

    64KB

  • memory/3676-29-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-30-0x00007FFC9E28D000-0x00007FFC9E28E000-memory.dmp

    Filesize

    4KB

  • memory/3676-31-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-32-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3676-2-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB