Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Bootstrapper.exe
windows11-21h2-x64
10$TEMP/Bc.xll
windows11-21h2-x64
1$TEMP/Fat.xll
windows11-21h2-x64
1$TEMP/Maternity.xll
windows11-21h2-x64
1$TEMP/Pairs.xll
windows11-21h2-x64
1$TEMP/Picking.xll
windows11-21h2-x64
1FilenameDe...er.xll
windows11-21h2-x64
1FilenameDe...er.xll
windows11-21h2-x64
1FilenameDe...st.xll
windows11-21h2-x64
1FilenameDe...ce.xll
windows11-21h2-x64
1FilenameDe...sk.xll
windows11-21h2-x64
1FilenameDe...ee.xll
windows11-21h2-x64
1Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/03/2025, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win11-20250314-en
Behavioral task
behavioral2
Sample
$TEMP/Bc.xll
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
$TEMP/Fat.xll
Resource
win11-20250314-en
Behavioral task
behavioral4
Sample
$TEMP/Maternity.xll
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
$TEMP/Pairs.xll
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
$TEMP/Picking.xll
Resource
win11-20250314-en
Behavioral task
behavioral7
Sample
FilenameDesirable/Gather.xll
Resource
win11-20250313-en
Behavioral task
behavioral8
Sample
FilenameDesirable/Greater.xll
Resource
win11-20250313-en
Behavioral task
behavioral9
Sample
FilenameDesirable/Harvest.xll
Resource
win11-20250313-en
Behavioral task
behavioral10
Sample
FilenameDesirable/Hence.xll
Resource
win11-20250313-en
Behavioral task
behavioral11
Sample
FilenameDesirable/Mask.xll
Resource
win11-20250313-en
Behavioral task
behavioral12
Sample
FilenameDesirable/Subcommittee.xll
Resource
win11-20250314-en
General
-
Target
$TEMP/Bc.xll
-
Size
61KB
-
MD5
6ed41054372d0bb368d955d6a070a803
-
SHA1
f1a9621dbd245cabb08f3f4296569436a9474ac3
-
SHA256
598d42a7c5a106153b7ac405d6f2ad84724e1d135759b46d02bab971cf08f5b2
-
SHA512
e86e97f3c095acc6bbca870d0799e543e4d95fa9de9b26af9a9be47df06dc12c0d77f0e223a0068e191a2527bad804eb84e16a73763628befe7765b04f360903
-
SSDEEP
1536:5MDSgi+kgjTWLS7pTt+HdyWGtZMvIJpcdrgL6xg5AB7Clqk:5MDrkkWm1GGt6g2rgkJAAk
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3256 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\$TEMP\Bc.xll"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5074d6893d19be4e536f4f89068141f22
SHA1fbb976fc9ee665e85e6fdbb524bb32859df65f1e
SHA256d8dbbc3e77b2d6ad8f64c479345f9a4761f3c22a01de7600725f4edff25623d4
SHA512b05df5972f6e6faa0dd7aa74f9c606bfddc33cc3942f16d0fecae593ca05fadc517a388bd8ae9dd199b864e4fe7ac852170e24c8854d02d93899945ae9de447b