Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Bootstrapper.exe
windows11-21h2-x64
10$TEMP/Bc.xll
windows11-21h2-x64
1$TEMP/Fat.xll
windows11-21h2-x64
1$TEMP/Maternity.xll
windows11-21h2-x64
1$TEMP/Pairs.xll
windows11-21h2-x64
1$TEMP/Picking.xll
windows11-21h2-x64
1FilenameDe...er.xll
windows11-21h2-x64
1FilenameDe...er.xll
windows11-21h2-x64
1FilenameDe...st.xll
windows11-21h2-x64
1FilenameDe...ce.xll
windows11-21h2-x64
1FilenameDe...sk.xll
windows11-21h2-x64
1FilenameDe...ee.xll
windows11-21h2-x64
1Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/03/2025, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win11-20250314-en
Behavioral task
behavioral2
Sample
$TEMP/Bc.xll
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
$TEMP/Fat.xll
Resource
win11-20250314-en
Behavioral task
behavioral4
Sample
$TEMP/Maternity.xll
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
$TEMP/Pairs.xll
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
$TEMP/Picking.xll
Resource
win11-20250314-en
Behavioral task
behavioral7
Sample
FilenameDesirable/Gather.xll
Resource
win11-20250313-en
Behavioral task
behavioral8
Sample
FilenameDesirable/Greater.xll
Resource
win11-20250313-en
Behavioral task
behavioral9
Sample
FilenameDesirable/Harvest.xll
Resource
win11-20250313-en
Behavioral task
behavioral10
Sample
FilenameDesirable/Hence.xll
Resource
win11-20250313-en
Behavioral task
behavioral11
Sample
FilenameDesirable/Mask.xll
Resource
win11-20250313-en
Behavioral task
behavioral12
Sample
FilenameDesirable/Subcommittee.xll
Resource
win11-20250314-en
General
-
Target
FilenameDesirable/Greater.xll
-
Size
70KB
-
MD5
f1fd84ea9b8e52d3c74b3a2205d704f1
-
SHA1
f08981533c68337da0fc57093b5f7ca34e8fae1d
-
SHA256
9b73986db9c06e3c4338546f7e270f8b6c28c376d7b6aa7b626eb966553420a2
-
SHA512
40e9be86035d27ddfad030f49269ac12c661252731d86276950337337685ba49db5715c2fd4b1c4dfc315f912b805e2efd73554e898a1048a9bbaf3d9e0bbcd7
-
SSDEEP
1536:tqOkORDUUFFs2TT3dErYwOCt+vLJBlRmYrzaGmyz+mHqvI6kSqlL:t3kbUs+Kz9ETmYq9I+ZSSqlL
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4260 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\FilenameDesirable\Greater.xll"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD56c4cc55bee3849ac333ec011c2a010c0
SHA1aca85597a0970660c07e81127673c5d15c595d56
SHA256d029e0e3de138a72efc1e445e57cc071d7f3cb6e7f46dfa98ca8f81196e6a306
SHA512c57c9653eeecc65538a9734579c4df493870255a490528c3bd1817553e3b19f84278c66a83a08e774cce5a2d1b37f3385a46a956aaf66c9e879b5d51c1f779e0