Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2022, 01:04

General

  • Target

    SecuriteInfo.com.XLM.Trojan.Abracadabra.35.Gen.22399.31359.xls

  • Size

    280KB

  • MD5

    deeac3fe7fbebb90483ee76db1e2bf17

  • SHA1

    b77bb5abf1aa44778fa7038f3af467d968cc61ae

  • SHA256

    b377cb39d6c6b90ae6a7942c9c80992e636c5607b28b9e704fc77a5d68acc17c

  • SHA512

    f0919d08e1b429084037edde43377220096d267f98f125e673259148e7dba9d7cc9808b03e403002ddb4cdc1146864e9de45c06f26c23424ebee3a877ffa5f3f

  • SSDEEP

    6144:6cPiTQAVW/89BQnmlcGvgZ7rDjo8UOMzJK+tfq5I:5pO

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://deluciaspizza.com/netmouser.dll

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.XLM.Trojan.Abracadabra.35.Gen.22399.31359.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 ..\fndskfnds.dfm,StartW
      2⤵
      • Process spawned unexpected child process
      PID:900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fndskfnds.dfm

    Filesize

    1KB

    MD5

    de9e65f46f5fd4af5372d18c9a2ded71

    SHA1

    007f84064a5a490ca37d5b8b34562feca88d7dd0

    SHA256

    922431ec8da46c5fe04c8ce284d7bf4b67ae1f05ad99fb6e79db7ec5ea842c4a

    SHA512

    948fbba32029709c4d6b66af7bf1cfc37def353563c404a84f7a4dadf0cb09ade13ee86c7d03a14dcbf2689541f6233a60a5ffb52a69c810f67578f8ca99117b

  • memory/1056-54-0x000000002FC01000-0x000000002FC04000-memory.dmp

    Filesize

    12KB

  • memory/1056-55-0x0000000071AE1000-0x0000000071AE3000-memory.dmp

    Filesize

    8KB

  • memory/1056-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1056-57-0x0000000072ACD000-0x0000000072AD8000-memory.dmp

    Filesize

    44KB

  • memory/1056-58-0x0000000075A71000-0x0000000075A73000-memory.dmp

    Filesize

    8KB

  • memory/1056-62-0x0000000072ACD000-0x0000000072AD8000-memory.dmp

    Filesize

    44KB