Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2022, 13:41
Behavioral task
behavioral1
Sample
0311.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0311.xls
Resource
win10v2004-20220812-en
General
-
Target
0311.xls
-
Size
217KB
-
MD5
f6895e2267fc5ef1a31fd5dd4495fd5b
-
SHA1
ea86e973131a134c64150bb2a61440926f6e32a8
-
SHA256
5e885180e31c3690ed6761b181919f985140bd173e35a444ea67450ce587dc15
-
SHA512
97fd3bd4dfb31f75a5c4dfdc28dfcb7ed394d1b653153a69f0f73c50aec4aa866721ad48425665081c2cbde28be7014d6619a1ab360db8362545dcedfe153dcf
-
SSDEEP
6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgIyY+TAQXTHGUMEyP5p6f5jQmL:bbGUMVWlbL
Malware Config
Extracted
https://aprendeconmireia.com/images/wBu/
http://updailymail.com/cgi-bin/gBYmfqRi2utIS2n/
https://akuntansi.itny.ac.id/asset/9aVFvYeaSKOhGBSLx/
http://swiftwebbox.com/cgi-bin/vNqoMtQilpysJYRwtGu/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1544 3724 regsvr32.exe 80 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4508 3724 regsvr32.exe 80 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4568 3724 regsvr32.exe 80 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 860 3724 regsvr32.exe 80 -
Downloads MZ/PE file
-
Loads dropped DLL 8 IoCs
pid Process 1544 regsvr32.exe 3768 regsvr32.exe 4508 regsvr32.exe 4456 regsvr32.exe 4568 regsvr32.exe 3248 regsvr32.exe 860 regsvr32.exe 3500 regsvr32.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rTYUgAaJwJtO.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\PfZUD\\rTYUgAaJwJtO.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aSotNhPtFzH.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\XwhDwJ\\aSotNhPtFzH.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WrvjYLUIpUhjzITj.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\JIkmKyfKKkBDI\\WrvjYLUIpUhjzITj.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3724 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1544 regsvr32.exe 1544 regsvr32.exe 3768 regsvr32.exe 3768 regsvr32.exe 3768 regsvr32.exe 3768 regsvr32.exe 4508 regsvr32.exe 4508 regsvr32.exe 4456 regsvr32.exe 4456 regsvr32.exe 4456 regsvr32.exe 4456 regsvr32.exe 4568 regsvr32.exe 4568 regsvr32.exe 3248 regsvr32.exe 3248 regsvr32.exe 3248 regsvr32.exe 3248 regsvr32.exe 860 regsvr32.exe 860 regsvr32.exe 3500 regsvr32.exe 3500 regsvr32.exe 3500 regsvr32.exe 3500 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3724 EXCEL.EXE 3724 EXCEL.EXE 3724 EXCEL.EXE 3724 EXCEL.EXE 3724 EXCEL.EXE 3724 EXCEL.EXE 3724 EXCEL.EXE 3724 EXCEL.EXE 3724 EXCEL.EXE 3724 EXCEL.EXE 3724 EXCEL.EXE 3724 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3724 wrote to memory of 1544 3724 EXCEL.EXE 86 PID 3724 wrote to memory of 1544 3724 EXCEL.EXE 86 PID 1544 wrote to memory of 3768 1544 regsvr32.exe 88 PID 1544 wrote to memory of 3768 1544 regsvr32.exe 88 PID 3724 wrote to memory of 4508 3724 EXCEL.EXE 89 PID 3724 wrote to memory of 4508 3724 EXCEL.EXE 89 PID 4508 wrote to memory of 4456 4508 regsvr32.exe 91 PID 4508 wrote to memory of 4456 4508 regsvr32.exe 91 PID 3724 wrote to memory of 4568 3724 EXCEL.EXE 93 PID 3724 wrote to memory of 4568 3724 EXCEL.EXE 93 PID 4568 wrote to memory of 3248 4568 regsvr32.exe 94 PID 4568 wrote to memory of 3248 4568 regsvr32.exe 94 PID 3724 wrote to memory of 860 3724 EXCEL.EXE 95 PID 3724 wrote to memory of 860 3724 EXCEL.EXE 95 PID 860 wrote to memory of 3500 860 regsvr32.exe 96 PID 860 wrote to memory of 3500 860 regsvr32.exe 96
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0311.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\JIkmKyfKKkBDI\WrvjYLUIpUhjzITj.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\DgDmWVUbYz\UNhFvTWLN.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\PfZUD\rTYUgAaJwJtO.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\XwhDwJ\aSotNhPtFzH.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
818KB
MD5d9fd8f201f796ab318f478fd9c76804c
SHA1788d4ef141339b72381717c35ef8b6349841dae9
SHA2565363f23d42383a390bf5dc39e6f34e1f5febdaaa6e8fb1c5a38a7fa03a5ea0a8
SHA5125e0891c04f0db03d34364c6cbc2703cb18e64e2f52b571458b348c055c6692600422868546d71119a6607f3c9949441a949cde171aa20b732048c4b051b10985
-
Filesize
818KB
MD5d9fd8f201f796ab318f478fd9c76804c
SHA1788d4ef141339b72381717c35ef8b6349841dae9
SHA2565363f23d42383a390bf5dc39e6f34e1f5febdaaa6e8fb1c5a38a7fa03a5ea0a8
SHA5125e0891c04f0db03d34364c6cbc2703cb18e64e2f52b571458b348c055c6692600422868546d71119a6607f3c9949441a949cde171aa20b732048c4b051b10985
-
Filesize
818KB
MD51e0fbed0c0dec7ce52035d57038b3630
SHA11015353dc5d1c0c2f4ce6678131ab087615b2b87
SHA256eb0da63e432d154ee120b7afb3d8bf83564ad7fc7bf4719cb8d73e3c1b60145a
SHA5129696c18bfe4763c7d99def3c8f3ca077da11e87663ac345aa790f7f3ae007d77c6b99a119f7f8860e22672ab0015b6fba599c29909990083ceca974db242c3a4
-
Filesize
818KB
MD51e0fbed0c0dec7ce52035d57038b3630
SHA11015353dc5d1c0c2f4ce6678131ab087615b2b87
SHA256eb0da63e432d154ee120b7afb3d8bf83564ad7fc7bf4719cb8d73e3c1b60145a
SHA5129696c18bfe4763c7d99def3c8f3ca077da11e87663ac345aa790f7f3ae007d77c6b99a119f7f8860e22672ab0015b6fba599c29909990083ceca974db242c3a4
-
Filesize
818KB
MD5031911e41da16f6ff2fab0a2611d12e5
SHA1fc0885a7661041dad5ba76121db972ec3b7cb851
SHA256f545897f6677b7f0d205c08ff6a38e807e495c89d51f588f6b13d427df90992d
SHA51204ae8d4cf27c165288ddc4151c8d6649780cd9e5f68b900949325c65a8f9e8f08e7b8d558ebf3b08eaf18af90e1c5b725c48383830c68e082827d24af24f33e0
-
Filesize
818KB
MD5031911e41da16f6ff2fab0a2611d12e5
SHA1fc0885a7661041dad5ba76121db972ec3b7cb851
SHA256f545897f6677b7f0d205c08ff6a38e807e495c89d51f588f6b13d427df90992d
SHA51204ae8d4cf27c165288ddc4151c8d6649780cd9e5f68b900949325c65a8f9e8f08e7b8d558ebf3b08eaf18af90e1c5b725c48383830c68e082827d24af24f33e0
-
Filesize
818KB
MD549b1abbc6a8660d5dcee74f53f9f64b2
SHA1748cde3a1a4c9df6c1ab06bc1670eae1eaac9268
SHA256c5a61d7a8b47c419e36d49caad1930fb769dbad81c00dbbb073a1779d6f658ec
SHA512b6c6546abbb3bf7cd328687b70069df633f603d6a031111ae65385303e61002e4e00543119bef0e450963e775c873beda1a7574bbd7e63c872d261da02d4dbc0
-
Filesize
818KB
MD549b1abbc6a8660d5dcee74f53f9f64b2
SHA1748cde3a1a4c9df6c1ab06bc1670eae1eaac9268
SHA256c5a61d7a8b47c419e36d49caad1930fb769dbad81c00dbbb073a1779d6f658ec
SHA512b6c6546abbb3bf7cd328687b70069df633f603d6a031111ae65385303e61002e4e00543119bef0e450963e775c873beda1a7574bbd7e63c872d261da02d4dbc0
-
Filesize
818KB
MD51e0fbed0c0dec7ce52035d57038b3630
SHA11015353dc5d1c0c2f4ce6678131ab087615b2b87
SHA256eb0da63e432d154ee120b7afb3d8bf83564ad7fc7bf4719cb8d73e3c1b60145a
SHA5129696c18bfe4763c7d99def3c8f3ca077da11e87663ac345aa790f7f3ae007d77c6b99a119f7f8860e22672ab0015b6fba599c29909990083ceca974db242c3a4
-
Filesize
818KB
MD5d9fd8f201f796ab318f478fd9c76804c
SHA1788d4ef141339b72381717c35ef8b6349841dae9
SHA2565363f23d42383a390bf5dc39e6f34e1f5febdaaa6e8fb1c5a38a7fa03a5ea0a8
SHA5125e0891c04f0db03d34364c6cbc2703cb18e64e2f52b571458b348c055c6692600422868546d71119a6607f3c9949441a949cde171aa20b732048c4b051b10985
-
Filesize
818KB
MD5031911e41da16f6ff2fab0a2611d12e5
SHA1fc0885a7661041dad5ba76121db972ec3b7cb851
SHA256f545897f6677b7f0d205c08ff6a38e807e495c89d51f588f6b13d427df90992d
SHA51204ae8d4cf27c165288ddc4151c8d6649780cd9e5f68b900949325c65a8f9e8f08e7b8d558ebf3b08eaf18af90e1c5b725c48383830c68e082827d24af24f33e0
-
Filesize
818KB
MD549b1abbc6a8660d5dcee74f53f9f64b2
SHA1748cde3a1a4c9df6c1ab06bc1670eae1eaac9268
SHA256c5a61d7a8b47c419e36d49caad1930fb769dbad81c00dbbb073a1779d6f658ec
SHA512b6c6546abbb3bf7cd328687b70069df633f603d6a031111ae65385303e61002e4e00543119bef0e450963e775c873beda1a7574bbd7e63c872d261da02d4dbc0