Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13/11/2020, 10:08

General

  • Target

    Information.xlsb

  • Size

    20KB

  • MD5

    4dddb0320eac6050d6360c92c104d05c

  • SHA1

    816db7af62de3dc200b88357a5341c6ce184cc93

  • SHA256

    ae87b82d817d363b159e072be2e2017dfe0bcf7fd3bc6a7c9dee0ff885eefc5f

  • SHA512

    b177b5faa839aeead6c9c732b0182b928903dd34e02d968b95cd93b2f3f01c3b72043c9dafcb6a96a9d1eeb67e4e12abaf537f7ac32b3d166d7f82914844881d

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Ursnif RM3

    A heavily modified version of Ursnif discovered in the wild.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 115 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SetWindowsHookEx 57 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Information.xlsb
        2⤵
        • Enumerates system info in registry
        • Modifies Internet Explorer settings
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1900
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 -s C:\ProgramData\Dori.ocx
          3⤵
          • Process spawned unexpected child process
          • Loads dropped DLL
          PID:1496
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwASQBkAGUAbgB0AGkAdAB5AHcAbwByACcAKQAuAEQA & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1468
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwASQBkAGUAbgB0AGkAdAB5AHcAbwByACcAKQAuAEQA & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwASQBkAGUAbgB0AGkAdAB5AHcAbwByACcAKQAuAEQA & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1156
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwASQBkAGUAbgB0AGkAdAB5AHcAbwByACcAKQAuAEQA
              5⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1072
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lywpdnzj\lywpdnzj.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2624
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8160.tmp" "c:\Users\Admin\AppData\Local\Temp\lywpdnzj\CSC21B24D8A273C421894975F7AF478BCC.TMP"
                  7⤵
                    PID:2620
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fxyyuihv\fxyyuihv.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1744
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES81BD.tmp" "c:\Users\Admin\AppData\Local\Temp\fxyyuihv\CSC53CB4AAE35A242B09F72A2EFED2E6A0.TMP"
                    7⤵
                      PID:2780
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C timeout /t 5 && del "C:\ProgramData\Dori.ocx"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2856
            • C:\Windows\system32\timeout.exe
              timeout /t 5
              3⤵
              • Delays execution with timeout.exe
              PID:2880
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1096
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1096 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1580
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2248
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2300
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2464
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2512
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:3748869 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2640

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/316-0-0x000007FEF5BC0000-0x000007FEF5E3A000-memory.dmp

          Filesize

          2.5MB

        • memory/1072-156-0x0000000002000000-0x0000000002001000-memory.dmp

          Filesize

          4KB

        • memory/1072-144-0x000000001AB90000-0x000000001AB91000-memory.dmp

          Filesize

          4KB

        • memory/1072-142-0x000007FEF4D30000-0x000007FEF571C000-memory.dmp

          Filesize

          9.9MB

        • memory/1072-164-0x0000000002530000-0x0000000002531000-memory.dmp

          Filesize

          4KB

        • memory/1072-143-0x0000000001FC0000-0x0000000001FC1000-memory.dmp

          Filesize

          4KB

        • memory/1072-166-0x00000000026E0000-0x00000000026F8000-memory.dmp

          Filesize

          96KB

        • memory/1072-145-0x0000000002500000-0x0000000002501000-memory.dmp

          Filesize

          4KB

        • memory/1072-146-0x0000000001EB0000-0x0000000001EB1000-memory.dmp

          Filesize

          4KB

        • memory/1072-148-0x000000001C3E0000-0x000000001C3E1000-memory.dmp

          Filesize

          4KB

        • memory/1072-147-0x000000001B950000-0x000000001B951000-memory.dmp

          Filesize

          4KB

        • memory/1496-4-0x00000000001D0000-0x00000000001E2000-memory.dmp

          Filesize

          72KB

        • memory/2512-16-0x0000000002E70000-0x0000000002E71000-memory.dmp

          Filesize

          4KB

        • memory/2512-46-0x0000000002E90000-0x0000000002E91000-memory.dmp

          Filesize

          4KB

        • memory/2512-137-0x0000000006E10000-0x0000000006E33000-memory.dmp

          Filesize

          140KB

        • memory/2512-135-0x0000000002E90000-0x0000000002E91000-memory.dmp

          Filesize

          4KB

        • memory/2512-101-0x0000000003740000-0x0000000003741000-memory.dmp

          Filesize

          4KB

        • memory/2512-106-0x0000000003740000-0x0000000003741000-memory.dmp

          Filesize

          4KB

        • memory/2512-111-0x0000000003740000-0x0000000003741000-memory.dmp

          Filesize

          4KB

        • memory/2512-53-0x00000000034E0000-0x00000000034E2000-memory.dmp

          Filesize

          8KB

        • memory/2512-19-0x0000000002E70000-0x0000000002E71000-memory.dmp

          Filesize

          4KB

        • memory/2512-52-0x00000000034E0000-0x00000000034E2000-memory.dmp

          Filesize

          8KB

        • memory/2512-36-0x0000000002E90000-0x0000000002E91000-memory.dmp

          Filesize

          4KB

        • memory/2512-34-0x0000000002E90000-0x0000000002E91000-memory.dmp

          Filesize

          4KB

        • memory/2512-39-0x0000000002E90000-0x0000000002E91000-memory.dmp

          Filesize

          4KB

        • memory/2512-41-0x0000000002E90000-0x0000000002E91000-memory.dmp

          Filesize

          4KB

        • memory/2512-44-0x0000000002E90000-0x0000000002E91000-memory.dmp

          Filesize

          4KB

        • memory/2512-136-0x0000000002E70000-0x0000000002E71000-memory.dmp

          Filesize

          4KB

        • memory/2512-17-0x0000000002E70000-0x0000000002E71000-memory.dmp

          Filesize

          4KB

        • memory/2512-27-0x0000000002E70000-0x0000000002E71000-memory.dmp

          Filesize

          4KB