Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/11/2022, 19:07
Behavioral task
behavioral1
Sample
2ca25b70845560aa8fd2907d0e839dd995c8bf5565c36e24f36a11fdf97948f9.xls
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
2ca25b70845560aa8fd2907d0e839dd995c8bf5565c36e24f36a11fdf97948f9.xls
Resource
win10-20220812-en
General
-
Target
2ca25b70845560aa8fd2907d0e839dd995c8bf5565c36e24f36a11fdf97948f9.xls
-
Size
217KB
-
MD5
0e3f005b13daae068a990ee41c67830a
-
SHA1
cfb2f8e2cfcd8926b39f8a3d80d4b7a8431c393f
-
SHA256
2ca25b70845560aa8fd2907d0e839dd995c8bf5565c36e24f36a11fdf97948f9
-
SHA512
349d6073da01208cdca640612df4d8925ea55ba418412a693900f26b37a1f102d7e988ce4a985620dfdcd3827591cf62c1c49b739bcc38b5bd0a0c657876d6c9
-
SSDEEP
6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg8yY+TAQXTHGUMEyP5p6f5jQmN:nbGUMVWlbN
Malware Config
Extracted
http://kabaruntukrakyat.com/wp-content/B9oJ0jh/
http://coinkub.com/wp-content/WwrJvjumS/
https://aberractivity.hu/iqq/Dmtv/
https://anamafegarcia.es/css/HfFXMTXvc40t/
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4396 3144 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4572 3144 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1032 3144 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3268 3144 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 4 IoCs
pid Process 4396 regsvr32.exe 4572 regsvr32.exe 1032 regsvr32.exe 3268 regsvr32.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UruQISlyhSwszZQ.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\NVVOwCBSpuzAJr\\UruQISlyhSwszZQ.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HODtuI.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\PilqQC\\HODtuI.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fOxEUFjD.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\CTNiMRvqWVSKjEo\\fOxEUFjD.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sigilBKlrZcdyln.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\VZzwlEVxCUDLkPPsN\\sigilBKlrZcdyln.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3144 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4396 regsvr32.exe 4396 regsvr32.exe 4732 regsvr32.exe 4732 regsvr32.exe 4732 regsvr32.exe 4732 regsvr32.exe 4572 regsvr32.exe 4572 regsvr32.exe 1284 regsvr32.exe 1284 regsvr32.exe 1284 regsvr32.exe 1284 regsvr32.exe 1032 regsvr32.exe 1032 regsvr32.exe 744 regsvr32.exe 744 regsvr32.exe 744 regsvr32.exe 744 regsvr32.exe 3268 regsvr32.exe 3268 regsvr32.exe 2448 regsvr32.exe 2448 regsvr32.exe 2448 regsvr32.exe 2448 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3144 EXCEL.EXE 3144 EXCEL.EXE 3144 EXCEL.EXE 3144 EXCEL.EXE 3144 EXCEL.EXE 3144 EXCEL.EXE 3144 EXCEL.EXE 3144 EXCEL.EXE 3144 EXCEL.EXE 3144 EXCEL.EXE 3144 EXCEL.EXE 3144 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4396 3144 EXCEL.EXE 70 PID 3144 wrote to memory of 4396 3144 EXCEL.EXE 70 PID 4396 wrote to memory of 4732 4396 regsvr32.exe 73 PID 4396 wrote to memory of 4732 4396 regsvr32.exe 73 PID 3144 wrote to memory of 4572 3144 EXCEL.EXE 75 PID 3144 wrote to memory of 4572 3144 EXCEL.EXE 75 PID 4572 wrote to memory of 1284 4572 regsvr32.exe 77 PID 4572 wrote to memory of 1284 4572 regsvr32.exe 77 PID 3144 wrote to memory of 1032 3144 EXCEL.EXE 78 PID 3144 wrote to memory of 1032 3144 EXCEL.EXE 78 PID 1032 wrote to memory of 744 1032 regsvr32.exe 79 PID 1032 wrote to memory of 744 1032 regsvr32.exe 79 PID 3144 wrote to memory of 3268 3144 EXCEL.EXE 80 PID 3144 wrote to memory of 3268 3144 EXCEL.EXE 80 PID 3268 wrote to memory of 2448 3268 regsvr32.exe 81 PID 3268 wrote to memory of 2448 3268 regsvr32.exe 81
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2ca25b70845560aa8fd2907d0e839dd995c8bf5565c36e24f36a11fdf97948f9.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\PilqQC\HODtuI.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\CTNiMRvqWVSKjEo\fOxEUFjD.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1284
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\VZzwlEVxCUDLkPPsN\sigilBKlrZcdyln.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\NVVOwCBSpuzAJr\UruQISlyhSwszZQ.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD5fb3c34d6db39f878a49018cdf7fe29db
SHA1b121a63679c679c5809cb2ebf5bcd14f20c55ddf
SHA256d5826e9da98ed19b30645f319e076f11467e185075a0b73b4c8d113739544d56
SHA512631de43d7dc5828d015a015b40466b6c702d5cc3cf55bc570a18bb86dc4caa06185d4956a978adf8a603eac17dd7582d8afd30363387d054f12c5b2ee2855899
-
Filesize
712KB
MD54d6f2a0f467337ce9f7920f664cc9899
SHA100c8d3bd8568a979b5de018b7bd8643d285b0ff0
SHA256a5554ac26568b72e76edd7baad1cf7a9b71d437968a1a0dab7c8c3b5dd4fc361
SHA51202ae81cef10300df9816adb93a7b66c1116066c8b22eab7a8887670580397c93605ecf0253e31a3c7f1b7b2dd4a13547ebf79fa5683b6cfe8d31437b8ccc4d1d
-
Filesize
712KB
MD5c26b5ed1eeecd34c1f852a9b55addb8d
SHA13ac6291adea5a53e31a4373efd5ae697e79aa65a
SHA256ead8b6a03c078eb82db4e21d1c1c0d01ed4b38a48d5a3612b1f669afcd2c363a
SHA512aad07306618bb69f8193d77c663616014ab2196d3f1367da7787b0d63c9546914b6b94eef8afc431713001aad929a5403e770668450cb873543321a5e4c124d5
-
Filesize
712KB
MD5c0a541e779e914b17124c6e62519be13
SHA179134cbc83cfebcba063a48bb69cdd285c9cae44
SHA256ac2a3d0776c3a5c782da9fd1007c7afaa4e196efaf763a827f8df0ac4b4a24f2
SHA5123617dfcf85972aede78b5ffa7a51b44ac2f4b986e83d70fa58a74c9f9582a4c205e08bba18ec0bde757fcbd418598ffa6419cf7f93b04460c57dd641f17d26a6
-
Filesize
712KB
MD5fb3c34d6db39f878a49018cdf7fe29db
SHA1b121a63679c679c5809cb2ebf5bcd14f20c55ddf
SHA256d5826e9da98ed19b30645f319e076f11467e185075a0b73b4c8d113739544d56
SHA512631de43d7dc5828d015a015b40466b6c702d5cc3cf55bc570a18bb86dc4caa06185d4956a978adf8a603eac17dd7582d8afd30363387d054f12c5b2ee2855899
-
Filesize
712KB
MD54d6f2a0f467337ce9f7920f664cc9899
SHA100c8d3bd8568a979b5de018b7bd8643d285b0ff0
SHA256a5554ac26568b72e76edd7baad1cf7a9b71d437968a1a0dab7c8c3b5dd4fc361
SHA51202ae81cef10300df9816adb93a7b66c1116066c8b22eab7a8887670580397c93605ecf0253e31a3c7f1b7b2dd4a13547ebf79fa5683b6cfe8d31437b8ccc4d1d
-
Filesize
712KB
MD5c26b5ed1eeecd34c1f852a9b55addb8d
SHA13ac6291adea5a53e31a4373efd5ae697e79aa65a
SHA256ead8b6a03c078eb82db4e21d1c1c0d01ed4b38a48d5a3612b1f669afcd2c363a
SHA512aad07306618bb69f8193d77c663616014ab2196d3f1367da7787b0d63c9546914b6b94eef8afc431713001aad929a5403e770668450cb873543321a5e4c124d5
-
Filesize
712KB
MD5c0a541e779e914b17124c6e62519be13
SHA179134cbc83cfebcba063a48bb69cdd285c9cae44
SHA256ac2a3d0776c3a5c782da9fd1007c7afaa4e196efaf763a827f8df0ac4b4a24f2
SHA5123617dfcf85972aede78b5ffa7a51b44ac2f4b986e83d70fa58a74c9f9582a4c205e08bba18ec0bde757fcbd418598ffa6419cf7f93b04460c57dd641f17d26a6