Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    112s
  • max time network
    151s
  • resource
    win7v191014

General

  • Target

    65db17f10ed1bf55073c122c9f558f433686dc8897434dea89f0f7e2e3a5fc55

  • Sample

    191101-q36454pewa

  • SHA256

    65db17f10ed1bf55073c122c9f558f433686dc8897434dea89f0f7e2e3a5fc55

Score
N/A

Malware Config

Extracted

Family

emotet

C2

192.241.220.155:8080

167.99.105.223:7080

176.31.200.130:8080

212.129.24.79:8080

94.177.216.217:8080

46.105.131.87:80

133.167.80.63:7080

167.71.10.37:8080

87.106.139.101:8080

144.139.247.220:80

217.160.182.191:8080

200.71.148.138:8080

186.4.172.5:8080

95.128.43.213:8080

27.147.163.188:8080

209.141.41.136:8080

186.4.172.5:20

115.78.95.230:443

104.236.246.93:8080

31.12.67.62:7080

rsa_pubkey.plain

Signatures

  • Suspicious behavior: RenamesItself 1 IoCs
  • Drops file in system dir 4 IoCs
  • Modifies registry class 1 TTPs 28 IoCs
  • Emotet Sync 1 IoCs
  • Suspicious behavior: EmotetMutantsSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • emotet family

Processes

  • C:\Users\Admin\AppData\Local\Temp\65db17f10ed1bf55073c122c9f558f433686dc8897434dea89f0f7e2e3a5fc55.exe
    "C:\Users\Admin\AppData\Local\Temp\65db17f10ed1bf55073c122c9f558f433686dc8897434dea89f0f7e2e3a5fc55.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
  • C:\Windows\splwow64.exe
    C:\Windows\splwow64.exe 12288
    1⤵
    • Drops file in system dir
    PID:1996
  • C:\Users\Admin\AppData\Local\Temp\65db17f10ed1bf55073c122c9f558f433686dc8897434dea89f0f7e2e3a5fc55.exe
    --14ab4ccc
    1⤵
    • Suspicious behavior: RenamesItself
    • Drops file in system dir
    • Modifies registry class
    • Emotet Sync
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    PID:1984
  • C:\Windows\SysWOW64\cablereadand.exe
    "C:\Windows\SysWOW64\cablereadand.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1624
  • C:\Windows\SysWOW64\cablereadand.exe
    --aaf7bb56
    1⤵
    • Drops file in system dir
    • Modifies registry class
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:608

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/608-5-0x00000000003E0000-0x00000000003F7000-memory.dmp

    Filesize

    92KB

  • memory/608-6-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/1624-4-0x0000000000390000-0x00000000003A7000-memory.dmp

    Filesize

    92KB

  • memory/1792-0-0x00000000003D0000-0x00000000003E7000-memory.dmp

    Filesize

    92KB

  • memory/1984-2-0x0000000000270000-0x0000000000287000-memory.dmp

    Filesize

    92KB

  • memory/1984-3-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB