Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Bootstrapper.exe
windows11-21h2-x64
10$TEMP/Bc.xll
windows11-21h2-x64
1$TEMP/Fat.xll
windows11-21h2-x64
1$TEMP/Maternity.xll
windows11-21h2-x64
1$TEMP/Pairs.xll
windows11-21h2-x64
1$TEMP/Picking.xll
windows11-21h2-x64
1FilenameDe...er.xll
windows11-21h2-x64
1FilenameDe...er.xll
windows11-21h2-x64
1FilenameDe...st.xll
windows11-21h2-x64
1FilenameDe...ce.xll
windows11-21h2-x64
1FilenameDe...sk.xll
windows11-21h2-x64
1FilenameDe...ee.xll
windows11-21h2-x64
1Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/03/2025, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win11-20250314-en
Behavioral task
behavioral2
Sample
$TEMP/Bc.xll
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
$TEMP/Fat.xll
Resource
win11-20250314-en
Behavioral task
behavioral4
Sample
$TEMP/Maternity.xll
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
$TEMP/Pairs.xll
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
$TEMP/Picking.xll
Resource
win11-20250314-en
Behavioral task
behavioral7
Sample
FilenameDesirable/Gather.xll
Resource
win11-20250313-en
Behavioral task
behavioral8
Sample
FilenameDesirable/Greater.xll
Resource
win11-20250313-en
Behavioral task
behavioral9
Sample
FilenameDesirable/Harvest.xll
Resource
win11-20250313-en
Behavioral task
behavioral10
Sample
FilenameDesirable/Hence.xll
Resource
win11-20250313-en
Behavioral task
behavioral11
Sample
FilenameDesirable/Mask.xll
Resource
win11-20250313-en
Behavioral task
behavioral12
Sample
FilenameDesirable/Subcommittee.xll
Resource
win11-20250314-en
General
-
Target
$TEMP/Maternity.xll
-
Size
30KB
-
MD5
fe2b47d95ebbbe6dbb215eb426999ccc
-
SHA1
7b9d70adcdc52ae63c3578d3479b6159cba3de5d
-
SHA256
8a832b996da79f08801ef99954e3f79ce01ab6dda8d80e0cf73b5db8ae74fd56
-
SHA512
ab414ac3516ee27f04301dde62f55da71468cc4f4cfbcbdc69e04e96f63e92236723a64fa62a816a7dc8eb8151e18c9bf7d071c806a45b5f48757f1f5955b88c
-
SSDEEP
768:4qZbZN2jYK2fjUkEwE1ejZ30FwXi7waQpsnHXPECVLY8n:4qDQYFPCmYQp2PdVL3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3476 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE 3476 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\$TEMP\Maternity.xll"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize667B
MD54cbd6b168130ee3a99831ad4aa1819ff
SHA17e040015f8135b929da91f3b85cca03b65c7dc04
SHA2569975a3003489771d727772867d9a431fcb031d87bddb0d0a359df89b04506647
SHA5128958a81afe93934f4e4d78b2a13711f9d7f6bc70c197556457bb4e0836204ab30dddbeab21528e6575480cd4753559062df79098890992a14ffc102c2f83a9e3