Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Bootstrapper.exe
windows11-21h2-x64
10$TEMP/Bc.xll
windows11-21h2-x64
1$TEMP/Fat.xll
windows11-21h2-x64
1$TEMP/Maternity.xll
windows11-21h2-x64
1$TEMP/Pairs.xll
windows11-21h2-x64
1$TEMP/Picking.xll
windows11-21h2-x64
1FilenameDe...er.xll
windows11-21h2-x64
1FilenameDe...er.xll
windows11-21h2-x64
1FilenameDe...st.xll
windows11-21h2-x64
1FilenameDe...ce.xll
windows11-21h2-x64
1FilenameDe...sk.xll
windows11-21h2-x64
1FilenameDe...ee.xll
windows11-21h2-x64
1Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/03/2025, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win11-20250314-en
Behavioral task
behavioral2
Sample
$TEMP/Bc.xll
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
$TEMP/Fat.xll
Resource
win11-20250314-en
Behavioral task
behavioral4
Sample
$TEMP/Maternity.xll
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
$TEMP/Pairs.xll
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
$TEMP/Picking.xll
Resource
win11-20250314-en
Behavioral task
behavioral7
Sample
FilenameDesirable/Gather.xll
Resource
win11-20250313-en
Behavioral task
behavioral8
Sample
FilenameDesirable/Greater.xll
Resource
win11-20250313-en
Behavioral task
behavioral9
Sample
FilenameDesirable/Harvest.xll
Resource
win11-20250313-en
Behavioral task
behavioral10
Sample
FilenameDesirable/Hence.xll
Resource
win11-20250313-en
Behavioral task
behavioral11
Sample
FilenameDesirable/Mask.xll
Resource
win11-20250313-en
Behavioral task
behavioral12
Sample
FilenameDesirable/Subcommittee.xll
Resource
win11-20250314-en
General
-
Target
FilenameDesirable/Hence.xll
-
Size
98KB
-
MD5
e4fb974bb5837a2b5488bcca63d704cb
-
SHA1
a3be82b22ae0162f9b98c69dc9bb8e818b0a780e
-
SHA256
fd253c98c7fad4302fcf15d06c4d649e93c7efbe206a05c95bf55a1d5cbe4a68
-
SHA512
433b5236eab56aacf9cb020c3ccea858d03379a41f3cb9fd355e10ccf22ac458572949fbe44d1fcff4edecb0db373c0668d3e612c74017c1c8ae5088ea21d770
-
SSDEEP
3072:Xmd1TNcujYd5N3hgPcMfdI8QLgfgSGaWuPbY0:ETNcujYd5Nhkc2nQL0gSGaT
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5316 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 5316 EXCEL.EXE 5316 EXCEL.EXE 5316 EXCEL.EXE 5316 EXCEL.EXE 5316 EXCEL.EXE 5316 EXCEL.EXE 5316 EXCEL.EXE 5316 EXCEL.EXE 5316 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\FilenameDesirable\Hence.xll"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5316