Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    129s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15/03/2025, 20:55

General

  • Target

    FilenameDesirable/Harvest.xll

  • Size

    52KB

  • MD5

    7363de7605e5ff4c3e265dbe5f4ac73d

  • SHA1

    83cae618c50b7c3c5af42408be108a4b5b356bdf

  • SHA256

    3e76968c44a7283c0f4f62a778f69edc023402e2ced36f173305d3e3f693ff0e

  • SHA512

    a2c49016069acbb85bba9f8a46285b0a43a95ba8ee5c87b97894c5d8f1d48d4b81412f443948956fefcaba43f047b8e88053517b06226d2654c6737e0c4dc9f3

  • SSDEEP

    768:h0160wgXld4xIyts4sUzWFanTuUUHHzZC08jh68XN0iRGpH2cFdiqp3g6:mu+4IspsTFJUUH1CW2N0iMH2OdVg6

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\FilenameDesirable\Harvest.xll"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:5008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5008-0-0x00007FFC4ED90000-0x00007FFC4EDA0000-memory.dmp

    Filesize

    64KB

  • memory/5008-1-0x00007FFC8EDA3000-0x00007FFC8EDA4000-memory.dmp

    Filesize

    4KB

  • memory/5008-3-0x00007FFC4ED90000-0x00007FFC4EDA0000-memory.dmp

    Filesize

    64KB

  • memory/5008-2-0x00007FFC4ED90000-0x00007FFC4EDA0000-memory.dmp

    Filesize

    64KB

  • memory/5008-5-0x00007FFC8ED00000-0x00007FFC8EF09000-memory.dmp

    Filesize

    2.0MB

  • memory/5008-6-0x00007FFC8ED00000-0x00007FFC8EF09000-memory.dmp

    Filesize

    2.0MB

  • memory/5008-7-0x00007FFC4ED90000-0x00007FFC4EDA0000-memory.dmp

    Filesize

    64KB

  • memory/5008-10-0x00007FFC8ED00000-0x00007FFC8EF09000-memory.dmp

    Filesize

    2.0MB

  • memory/5008-9-0x00007FFC8ED00000-0x00007FFC8EF09000-memory.dmp

    Filesize

    2.0MB

  • memory/5008-11-0x00007FFC8ED00000-0x00007FFC8EF09000-memory.dmp

    Filesize

    2.0MB

  • memory/5008-8-0x00007FFC8ED00000-0x00007FFC8EF09000-memory.dmp

    Filesize

    2.0MB

  • memory/5008-12-0x00007FFC8ED00000-0x00007FFC8EF09000-memory.dmp

    Filesize

    2.0MB

  • memory/5008-13-0x00007FFC4C890000-0x00007FFC4C8A0000-memory.dmp

    Filesize

    64KB

  • memory/5008-4-0x00007FFC4ED90000-0x00007FFC4EDA0000-memory.dmp

    Filesize

    64KB

  • memory/5008-14-0x00007FFC8ED00000-0x00007FFC8EF09000-memory.dmp

    Filesize

    2.0MB

  • memory/5008-15-0x00007FFC8ED00000-0x00007FFC8EF09000-memory.dmp

    Filesize

    2.0MB

  • memory/5008-16-0x00007FFC4C890000-0x00007FFC4C8A0000-memory.dmp

    Filesize

    64KB

  • memory/5008-18-0x00007FFC8ED00000-0x00007FFC8EF09000-memory.dmp

    Filesize

    2.0MB

  • memory/5008-19-0x00007FFC8EDA3000-0x00007FFC8EDA4000-memory.dmp

    Filesize

    4KB

  • memory/5008-20-0x00007FFC8ED00000-0x00007FFC8EF09000-memory.dmp

    Filesize

    2.0MB