Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 00:51
Behavioral task
behavioral1
Sample
490f59b6811ec8987f87b244200f6c5b377babdcf597181bbd71fa5d61301152.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
490f59b6811ec8987f87b244200f6c5b377babdcf597181bbd71fa5d61301152.xlsm
Resource
win10v2004-20241007-en
General
-
Target
490f59b6811ec8987f87b244200f6c5b377babdcf597181bbd71fa5d61301152.xlsm
-
Size
46KB
-
MD5
49a8bfaf36adce55366c3063f9682182
-
SHA1
1bd16833b90c27c08d0c2e2bf4584b6cb87a21ab
-
SHA256
490f59b6811ec8987f87b244200f6c5b377babdcf597181bbd71fa5d61301152
-
SHA512
b9a361117bf5cb9c06a9b2aa612964b19da05c7d3af6f87e0c51c749a06fa1fafdfeb02dee6e571c79074b76b6eb38a630003d416caa2e5f3c6bea56b9228904
-
SSDEEP
768:hGovDOevZCwrvtBtfzdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0VU2fUPZa:wovDztT5fTR4Lh1NisFYBc3cr+UqVU5c
Malware Config
Extracted
http://touqarrayan.com/wp-content/RoiB/
http://nayzaqaljanoob-iq.com/sapbush/tylhe1/
http://cabinet-bribech.com/wp/DyMNglRY5B4abPy1hH/
http://retailhpsinterview.com/cgi-bin/dJp9RYh/
https://lisalmcgee.com/images/xpl7i1ETzHPwaFd89HS/
https://collision-staging.com/wp-content/94PQ1/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3676 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3676 EXCEL.EXE 3676 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3676 EXCEL.EXE 3676 EXCEL.EXE 3676 EXCEL.EXE 3676 EXCEL.EXE 3676 EXCEL.EXE 3676 EXCEL.EXE 3676 EXCEL.EXE 3676 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\490f59b6811ec8987f87b244200f6c5b377babdcf597181bbd71fa5d61301152.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD546aa0aa816aec556edab5309f60c4359
SHA1e8d712e5f569cbf14ff134607a5c57f2ad352862
SHA25650456abbc4c19a56e1a37af494a3998efb0c302f512ff7bdd8e3e4a727f081e6
SHA512611c30b6ff12fce1b7314a7fb5aaece892e115f2a16372039cca905b01bd9a3998415780bf32d30d4638bc598b81c00128aa252d5f66bb75b5c9907214ec9073