Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
134s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
03/11/2022, 23:15
Behavioral task
behavioral1
Sample
ea1be07a3131523fba4f72708cce8db9350711a4146f7b4765d12ee42d8e7f68.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
ea1be07a3131523fba4f72708cce8db9350711a4146f7b4765d12ee42d8e7f68.xls
Resource
win10-20220901-en
General
-
Target
ea1be07a3131523fba4f72708cce8db9350711a4146f7b4765d12ee42d8e7f68.xls
-
Size
217KB
-
MD5
ecd5e1711b9e049edde7b42824bfa60e
-
SHA1
559d90a1ab5227bcd56601b04e88e469edb9497d
-
SHA256
ea1be07a3131523fba4f72708cce8db9350711a4146f7b4765d12ee42d8e7f68
-
SHA512
a769a219cb1e8b003ce0422fa00db0400506451373f313ae45e29a595eb5f2c095765be1365471a379a325f99c1246d4faf9d89e880eefb2ff50402ecfa68e24
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgXyY+TAQXTHGUMEyP5p6f5jQm2:DbGUMVWlb2
Malware Config
Extracted
https://barkstage.es/wp-content/0E7NdYl7TZuHMJq7/
http://contactworks.nl/images_old/NuEAhfF0PCFhvv/
http://www.iam.ch/wp-content/cache/minify/O1OAjWnfen/
https://www.elaboro.pl/wp-admin/J0hwyIMsk9YFIi/
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1004 3064 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5096 3064 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5080 3064 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4712 3064 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
pid Process 1004 regsvr32.exe 5096 regsvr32.exe 4712 regsvr32.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DtFqYDrjjprSfiWY.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\NdMMrbUTGBHTJ\\DtFqYDrjjprSfiWY.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vRHK.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\GJBvgMcffJq\\vRHK.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cKzhDcWjwgBelT.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\NiSnhIjX\\cKzhDcWjwgBelT.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3064 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1004 regsvr32.exe 1004 regsvr32.exe 4312 regsvr32.exe 4312 regsvr32.exe 5096 regsvr32.exe 5096 regsvr32.exe 4312 regsvr32.exe 4312 regsvr32.exe 4708 regsvr32.exe 4708 regsvr32.exe 4708 regsvr32.exe 4708 regsvr32.exe 4712 regsvr32.exe 4712 regsvr32.exe 916 regsvr32.exe 916 regsvr32.exe 916 regsvr32.exe 916 regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3064 EXCEL.EXE 3064 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3064 EXCEL.EXE 3064 EXCEL.EXE 3064 EXCEL.EXE 3064 EXCEL.EXE 3064 EXCEL.EXE 3064 EXCEL.EXE 3064 EXCEL.EXE 3064 EXCEL.EXE 3064 EXCEL.EXE 3064 EXCEL.EXE 3064 EXCEL.EXE 3064 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1004 3064 EXCEL.EXE 68 PID 3064 wrote to memory of 1004 3064 EXCEL.EXE 68 PID 1004 wrote to memory of 4312 1004 regsvr32.exe 69 PID 1004 wrote to memory of 4312 1004 regsvr32.exe 69 PID 3064 wrote to memory of 5096 3064 EXCEL.EXE 71 PID 3064 wrote to memory of 5096 3064 EXCEL.EXE 71 PID 5096 wrote to memory of 4708 5096 regsvr32.exe 72 PID 5096 wrote to memory of 4708 5096 regsvr32.exe 72 PID 3064 wrote to memory of 5080 3064 EXCEL.EXE 73 PID 3064 wrote to memory of 5080 3064 EXCEL.EXE 73 PID 3064 wrote to memory of 4712 3064 EXCEL.EXE 74 PID 3064 wrote to memory of 4712 3064 EXCEL.EXE 74 PID 4712 wrote to memory of 916 4712 regsvr32.exe 75 PID 4712 wrote to memory of 916 4712 regsvr32.exe 75
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ea1be07a3131523fba4f72708cce8db9350711a4146f7b4765d12ee42d8e7f68.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\GJBvgMcffJq\vRHK.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\NiSnhIjX\cKzhDcWjwgBelT.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
PID:5080
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\NdMMrbUTGBHTJ\DtFqYDrjjprSfiWY.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD5b8bab63d796387bcbb6147c14273862a
SHA1aece699c3c6febd0fa54b5fc1f46ffd260e705df
SHA25650c5bcbb8a165ae1f901b48f66c85726faaa937e3434ceaad5d374c0a315e833
SHA5124c317806542bdfc75587e9864758f27c6abb59d8519f5486e1ff9a0b0473807cb55bf60391c7f193fcb72c0a3755105c9988b0847234ec1e86455e551f40cdca
-
Filesize
751KB
MD5acb4ede0b9bdf4ef57b8361be9b72e27
SHA1834566acd8a44d16da94f772b95397fcce66d235
SHA25640d50eaea22ca221493b9b645cc55cc8936faa91a6a3ed5672b30785953e343d
SHA5121002ded834d70d559cfe21f40c4c353354827f3781767d3a03fc0b3081005e5cfa230076e315d387cbbc9f06216da8e0df960bc8071a73bee71963d2812edfed
-
Filesize
751KB
MD578faba79482611449256a184a1acac17
SHA12f9000703c93c9890eefd0d94fd837ec34b6ed10
SHA25600b59166e9545d7ba9fcc63b5e464baa20b3e402cec18de64c1f792294ed0c0e
SHA5129d161fa21c7c320c8d0e928971bedef309282bfcef2fdd2cedd756c0c61cf01f4f7d4f5fe26790e56a623ca7032f6eb1c54409b68b296fbbf35409e68a4c5237
-
Filesize
751KB
MD5b8bab63d796387bcbb6147c14273862a
SHA1aece699c3c6febd0fa54b5fc1f46ffd260e705df
SHA25650c5bcbb8a165ae1f901b48f66c85726faaa937e3434ceaad5d374c0a315e833
SHA5124c317806542bdfc75587e9864758f27c6abb59d8519f5486e1ff9a0b0473807cb55bf60391c7f193fcb72c0a3755105c9988b0847234ec1e86455e551f40cdca
-
Filesize
751KB
MD5acb4ede0b9bdf4ef57b8361be9b72e27
SHA1834566acd8a44d16da94f772b95397fcce66d235
SHA25640d50eaea22ca221493b9b645cc55cc8936faa91a6a3ed5672b30785953e343d
SHA5121002ded834d70d559cfe21f40c4c353354827f3781767d3a03fc0b3081005e5cfa230076e315d387cbbc9f06216da8e0df960bc8071a73bee71963d2812edfed
-
Filesize
751KB
MD578faba79482611449256a184a1acac17
SHA12f9000703c93c9890eefd0d94fd837ec34b6ed10
SHA25600b59166e9545d7ba9fcc63b5e464baa20b3e402cec18de64c1f792294ed0c0e
SHA5129d161fa21c7c320c8d0e928971bedef309282bfcef2fdd2cedd756c0c61cf01f4f7d4f5fe26790e56a623ca7032f6eb1c54409b68b296fbbf35409e68a4c5237