Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2025, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
13441db4f2c8574a8d90d1b5167b1f4b81bbdcd77a1e0ba44517017874d02618.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13441db4f2c8574a8d90d1b5167b1f4b81bbdcd77a1e0ba44517017874d02618.xlsx
Resource
win10v2004-20241007-en
General
-
Target
13441db4f2c8574a8d90d1b5167b1f4b81bbdcd77a1e0ba44517017874d02618.xlsx
-
Size
1.3MB
-
MD5
0d5d79a8b715e13a26e6579f1d47c0d7
-
SHA1
408402dcc517ab7be7957ff867b7464cc1465334
-
SHA256
13441db4f2c8574a8d90d1b5167b1f4b81bbdcd77a1e0ba44517017874d02618
-
SHA512
d2642be20a3f7114ee1caec6253caebdb213709590ba14051391eb72f0f10018fa634db5ff735a88e9ff2aefdf5af208bd3cadb5b2dec070bee8bbd7decded05
-
SSDEEP
24576:KngpIDsJ34JbFQ4YBolrs08Qt/horbWgMhSpA6+jzfievtzAQSX1:KnYmscQ4goBsmYBMkuNjm4tuX1
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1764 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1764 EXCEL.EXE 1764 EXCEL.EXE 1764 EXCEL.EXE 1764 EXCEL.EXE 1764 EXCEL.EXE 1764 EXCEL.EXE 1764 EXCEL.EXE 1764 EXCEL.EXE 1764 EXCEL.EXE 1764 EXCEL.EXE 1764 EXCEL.EXE 1764 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\13441db4f2c8574a8d90d1b5167b1f4b81bbdcd77a1e0ba44517017874d02618.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5c128f34adf0361e9e6b71782129b2633
SHA195364b89f96926b87a03e01726bcfc16c2ce3a74
SHA256222f730c211509229d01d90166dcfb58cf04395a31151c63b19b1af9fb54c731
SHA512fc1b6e3ee5721ffbd1dcadf36fc9ec7b5d03eb5c533356dbe01b2e8defed3c21e12dac8b76e871775ae620f02c65e61298ba89ce98608bef5590f42778a21b9e