Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/11/2022, 21:07

221103-zyn6safbg6 10

03/11/2022, 21:01

221103-ztzfyshccm 10

03/11/2022, 15:09

221103-sjnhdabfg4 10

Analysis

  • max time kernel
    145s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/11/2022, 15:09

General

  • Target

    ef2ce641a4e9f270eea626e8e4800b0b97b4a436c40e7af30aeb6f02566b809c.xls

  • Size

    216KB

  • MD5

    2486374800299563ab8934122234242a

  • SHA1

    47bfe94aa96ef43231890f04ccd286b0888e10c8

  • SHA256

    ef2ce641a4e9f270eea626e8e4800b0b97b4a436c40e7af30aeb6f02566b809c

  • SHA512

    74e52e1e1317908447340cbba32949321ed435f17a524224af80236ecdf67187c83908cca514e82a49b9abe9495125ba741e01ed8f30663124c13fce339c63e5

  • SSDEEP

    6144:bKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgAyY+TAQXTHGUMEyP5p6f5jQmK:GbGUMVWlbK

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://audioselec.com/about/dDw5ggtyMojggTqhc/

xlm40.dropper

https://geringer-muehle.de/wp-admin/G/

xlm40.dropper

http://intolove.co.uk/wp-admin/FbGhiWtrEzrQ/

xlm40.dropper

http://isc.net.ua/themes/3rU/

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ef2ce641a4e9f270eea626e8e4800b0b97b4a436c40e7af30aeb6f02566b809c.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5016
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\oxnv1.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\LQPPmuf\aaClzaTrhna.dll"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:924
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\oxnv2.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5088
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MziIaSfZQClPQpp\lwyFTKzYW.dll"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:3864
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\oxnv3.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\UUGILVMr\vnuOPbuWO.dll"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:2112
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\oxnv4.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AxsMKxbOpizAKyrxC\KIgCBYMFgh.dll"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:5028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\oxnv1.ooccxx

    Filesize

    814KB

    MD5

    12a81d42416771d412f249e318088d24

    SHA1

    b7d865bd7c3479c6efcf05c4a53cb442ab6eaa7b

    SHA256

    49f40a56dee471071d04545612cafc909f029a8c147b7591706c6831b2d16c02

    SHA512

    13e711d4255d33b948d5e97b0f0b27adec2be9ccc3e71158b8badac9b5268ff0a6cea5533cad8c7f4795b0ad42a85ea401c63f3f3f341bb1eafe070de1c37015

  • C:\Users\Admin\oxnv1.ooccxx

    Filesize

    814KB

    MD5

    12a81d42416771d412f249e318088d24

    SHA1

    b7d865bd7c3479c6efcf05c4a53cb442ab6eaa7b

    SHA256

    49f40a56dee471071d04545612cafc909f029a8c147b7591706c6831b2d16c02

    SHA512

    13e711d4255d33b948d5e97b0f0b27adec2be9ccc3e71158b8badac9b5268ff0a6cea5533cad8c7f4795b0ad42a85ea401c63f3f3f341bb1eafe070de1c37015

  • C:\Users\Admin\oxnv2.ooccxx

    Filesize

    814KB

    MD5

    ae115e4046c9d2ce5a6a079022ca6310

    SHA1

    8c246a79f9c7ff3c471312f405e6ac136fa499ad

    SHA256

    65247664f4eae69e1116be787f334fffe2bad6c537bcbe64a745696e94a0240a

    SHA512

    2a89b59421d9cd3438b669621521ad849b45d681e902081179f53cd3fce9b93afbcb6e93f8c613487192b482821ef68de3597e0d3d3067000bd69d7b3590d7d1

  • C:\Users\Admin\oxnv2.ooccxx

    Filesize

    814KB

    MD5

    ae115e4046c9d2ce5a6a079022ca6310

    SHA1

    8c246a79f9c7ff3c471312f405e6ac136fa499ad

    SHA256

    65247664f4eae69e1116be787f334fffe2bad6c537bcbe64a745696e94a0240a

    SHA512

    2a89b59421d9cd3438b669621521ad849b45d681e902081179f53cd3fce9b93afbcb6e93f8c613487192b482821ef68de3597e0d3d3067000bd69d7b3590d7d1

  • C:\Users\Admin\oxnv3.ooccxx

    Filesize

    814KB

    MD5

    4bda16479818d2ffd47417c24753aed4

    SHA1

    3ee06f7717755ab7fa658c32b068bda22cf56335

    SHA256

    9916457a0db1d62de30d9625ccad91b872962eb24001613a835a0e04e3ff97d6

    SHA512

    6edb5cf6294df6bd2e8f3fbe95fb877c15f225a5615079a73ea83ac45e00af13b6d1bb24a47dae85d00a2453643f6b2879d1d1bef43c46b4f67cefb0abe81bd0

  • C:\Users\Admin\oxnv3.ooccxx

    Filesize

    814KB

    MD5

    4bda16479818d2ffd47417c24753aed4

    SHA1

    3ee06f7717755ab7fa658c32b068bda22cf56335

    SHA256

    9916457a0db1d62de30d9625ccad91b872962eb24001613a835a0e04e3ff97d6

    SHA512

    6edb5cf6294df6bd2e8f3fbe95fb877c15f225a5615079a73ea83ac45e00af13b6d1bb24a47dae85d00a2453643f6b2879d1d1bef43c46b4f67cefb0abe81bd0

  • C:\Users\Admin\oxnv4.ooccxx

    Filesize

    814KB

    MD5

    e42bdf6ad74b4731b93dfd50d848f806

    SHA1

    60201206aeef299a08279257cc8ee24a528d8fb1

    SHA256

    bf0a768afa812263e1d7cae61c5c4f6bb1c1ad8e902fff0a35e1f5014b01302f

    SHA512

    0190eb9d3f21b1b10a29b490ecf293b7376902f7f0b78c699499887a9bb2cc8e28f44d9258fae983ae2c44b2e61c5629437ab379e17b42370fbcaab30623d9c2

  • C:\Users\Admin\oxnv4.ooccxx

    Filesize

    814KB

    MD5

    e42bdf6ad74b4731b93dfd50d848f806

    SHA1

    60201206aeef299a08279257cc8ee24a528d8fb1

    SHA256

    bf0a768afa812263e1d7cae61c5c4f6bb1c1ad8e902fff0a35e1f5014b01302f

    SHA512

    0190eb9d3f21b1b10a29b490ecf293b7376902f7f0b78c699499887a9bb2cc8e28f44d9258fae983ae2c44b2e61c5629437ab379e17b42370fbcaab30623d9c2

  • C:\Windows\System32\AxsMKxbOpizAKyrxC\KIgCBYMFgh.dll

    Filesize

    814KB

    MD5

    e42bdf6ad74b4731b93dfd50d848f806

    SHA1

    60201206aeef299a08279257cc8ee24a528d8fb1

    SHA256

    bf0a768afa812263e1d7cae61c5c4f6bb1c1ad8e902fff0a35e1f5014b01302f

    SHA512

    0190eb9d3f21b1b10a29b490ecf293b7376902f7f0b78c699499887a9bb2cc8e28f44d9258fae983ae2c44b2e61c5629437ab379e17b42370fbcaab30623d9c2

  • C:\Windows\System32\LQPPmuf\aaClzaTrhna.dll

    Filesize

    814KB

    MD5

    12a81d42416771d412f249e318088d24

    SHA1

    b7d865bd7c3479c6efcf05c4a53cb442ab6eaa7b

    SHA256

    49f40a56dee471071d04545612cafc909f029a8c147b7591706c6831b2d16c02

    SHA512

    13e711d4255d33b948d5e97b0f0b27adec2be9ccc3e71158b8badac9b5268ff0a6cea5533cad8c7f4795b0ad42a85ea401c63f3f3f341bb1eafe070de1c37015

  • C:\Windows\System32\MziIaSfZQClPQpp\lwyFTKzYW.dll

    Filesize

    814KB

    MD5

    ae115e4046c9d2ce5a6a079022ca6310

    SHA1

    8c246a79f9c7ff3c471312f405e6ac136fa499ad

    SHA256

    65247664f4eae69e1116be787f334fffe2bad6c537bcbe64a745696e94a0240a

    SHA512

    2a89b59421d9cd3438b669621521ad849b45d681e902081179f53cd3fce9b93afbcb6e93f8c613487192b482821ef68de3597e0d3d3067000bd69d7b3590d7d1

  • C:\Windows\System32\UUGILVMr\vnuOPbuWO.dll

    Filesize

    814KB

    MD5

    4bda16479818d2ffd47417c24753aed4

    SHA1

    3ee06f7717755ab7fa658c32b068bda22cf56335

    SHA256

    9916457a0db1d62de30d9625ccad91b872962eb24001613a835a0e04e3ff97d6

    SHA512

    6edb5cf6294df6bd2e8f3fbe95fb877c15f225a5615079a73ea83ac45e00af13b6d1bb24a47dae85d00a2453643f6b2879d1d1bef43c46b4f67cefb0abe81bd0

  • memory/1232-142-0x0000000180000000-0x000000018002F000-memory.dmp

    Filesize

    188KB

  • memory/5016-138-0x00007FF7C4B50000-0x00007FF7C4B60000-memory.dmp

    Filesize

    64KB

  • memory/5016-137-0x00007FF7C4B50000-0x00007FF7C4B60000-memory.dmp

    Filesize

    64KB

  • memory/5016-132-0x00007FF7C7010000-0x00007FF7C7020000-memory.dmp

    Filesize

    64KB

  • memory/5016-136-0x00007FF7C7010000-0x00007FF7C7020000-memory.dmp

    Filesize

    64KB

  • memory/5016-135-0x00007FF7C7010000-0x00007FF7C7020000-memory.dmp

    Filesize

    64KB

  • memory/5016-134-0x00007FF7C7010000-0x00007FF7C7020000-memory.dmp

    Filesize

    64KB

  • memory/5016-133-0x00007FF7C7010000-0x00007FF7C7020000-memory.dmp

    Filesize

    64KB