Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/11/2022, 21:07

221103-zyn6safbg6 10

03/11/2022, 21:01

221103-ztzfyshccm 10

03/11/2022, 15:09

221103-sjnhdabfg4 10

Analysis

  • max time kernel
    597s
  • max time network
    600s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/11/2022, 21:07

General

  • Target

    ef2ce641a4e9f270eea626e8e4800b0b97b4a436c40e7af30aeb6f02566b809c.xls

  • Size

    216KB

  • MD5

    2486374800299563ab8934122234242a

  • SHA1

    47bfe94aa96ef43231890f04ccd286b0888e10c8

  • SHA256

    ef2ce641a4e9f270eea626e8e4800b0b97b4a436c40e7af30aeb6f02566b809c

  • SHA512

    74e52e1e1317908447340cbba32949321ed435f17a524224af80236ecdf67187c83908cca514e82a49b9abe9495125ba741e01ed8f30663124c13fce339c63e5

  • SSDEEP

    6144:bKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgAyY+TAQXTHGUMEyP5p6f5jQmK:GbGUMVWlbK

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://audioselec.com/about/dDw5ggtyMojggTqhc/

xlm40.dropper

https://geringer-muehle.de/wp-admin/G/

xlm40.dropper

http://intolove.co.uk/wp-admin/FbGhiWtrEzrQ/

xlm40.dropper

http://isc.net.ua/themes/3rU/

Extracted

Family

emotet

Botnet

Epoch4

C2

45.235.8.30:8080

94.23.45.86:4143

119.59.103.152:8080

169.60.181.70:8080

164.68.99.3:8080

172.105.226.75:8080

107.170.39.149:8080

206.189.28.199:8080

1.234.2.232:8080

188.44.20.25:443

186.194.240.217:443

103.43.75.120:443

149.28.143.92:443

159.89.202.34:443

209.97.163.214:443

183.111.227.137:8080

129.232.188.93:443

139.59.126.41:443

110.232.117.186:8080

139.59.56.73:8080

eck1.plain
ecs1.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 6 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\ef2ce641a4e9f270eea626e8e4800b0b97b4a436c40e7af30aeb6f02566b809c.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\oxnv1.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1492
      • C:\Windows\system32\regsvr32.exe
        ..\oxnv1.ooccxx
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1540
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WpkGyXXz\JFZPOATc.dll"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1368
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\oxnv2.ooccxx
      2⤵
      • Process spawned unexpected child process
      PID:820
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\oxnv3.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:332
      • C:\Windows\system32\regsvr32.exe
        ..\oxnv3.ooccxx
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZDqFMYMj\BndCCK.dll"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:960
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\System32\regsvr32.exe ..\oxnv4.ooccxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:932
      • C:\Windows\system32\regsvr32.exe
        ..\oxnv4.ooccxx
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\EnTqWdgCUnfql\exhLOVvTq.dll"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    96b4c5ead181fe2513171fa44f76377e

    SHA1

    5dee66202056f170a2c268b207119976bdb0a1a7

    SHA256

    c8b55f0c0f59098b480966b3136bd50eb605c2d656b3ddef94d57665c0b536b9

    SHA512

    da31bf76fd7280b0d5025f262ebdc7c354d17c54e5ab603c8c5f64cd609fefa0f19824ece7b7260404457b4089e986f4b998b3fdb85ae2c8dba9e7be11df7005

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0a748e197f251b051298b802a2141e1

    SHA1

    4f61bfcafb973ceb74acabe2d996d30b59ad5279

    SHA256

    d54e5e0b611116fcc6de22ee406e060b26bd3d7e51c9b15e45a0dc70704bd619

    SHA512

    6c76f025c8767fdd3f3c92014cbc3a557f9f2a19cdab8b04d24f884f8d1401af718f4eec833df543d72b30e77ba9f0bb238604092a45f33155b3bb8587ced98f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74fcba1f03eafb5d119b69abdda4d5ea

    SHA1

    9a797247877c71492b677839ecd6773bbfbb1d49

    SHA256

    c88287def6e2e19f56b70cc8ded4de5ea22c3a27329ee44d9b0d2d177f1527c1

    SHA512

    71194ededa7600fdf4005c9ce6f470325a8a836a73bdfbfcd6e27b78aa7b3d2ad9c7303823cc87e588008ace294cd5f3db5972b56a0dc923dbcbcab667fb2edf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    417b9e7e963438205f8a3d64daa02f44

    SHA1

    bc70607ce2b4ca9917731eafa1aa72d646777583

    SHA256

    265444f6cbeb3ed0ac65005f942da62c607af76c561a92fb4675554ea671555d

    SHA512

    56a9fce2fdbdbed2927773cead4630499af9e2c58ae258beb7ec5899196a0c152e6f988b9862627290f0e7fa241bbcca392dbf3a14ed50145ed8ac40a3407d3a

  • C:\Users\Admin\oxnv1.ooccxx

    Filesize

    708KB

    MD5

    6547ad5ca6f25c230f21abdc6917d520

    SHA1

    b75fc2c9b37d30b5fc3c0b35662d7287098c81bd

    SHA256

    76a41098ef49a464addd3af6c3f61ff097202e6a028a0a5bd87653938a4b04d5

    SHA512

    9770471abc9150e482a219d43b8bbe3a29d9e1da105159fd44cf56b03244005ea49184ddc80ac8ebac81f8f2b935b83aca12e5641204bfe4761949a305a97111

  • C:\Users\Admin\oxnv3.ooccxx

    Filesize

    708KB

    MD5

    f42e3e1e9805323bfb61813c4420e90c

    SHA1

    76735b1e8987ad0ffd7b544eac2ec21abd8d821a

    SHA256

    bbcbcc91afda17bcb8f40e1aab9d684ac9efb002f50e0bb6aecae4ad9156ed05

    SHA512

    5a80a2bd62c5dd4d5be380065107ea3f990db51d007fe4e0d7f40bea31935e236fafa64d8f2a9bba7ca34fbf4e3ee8f341a392a48702d7475ff7dc332ce96bdb

  • C:\Users\Admin\oxnv4.ooccxx

    Filesize

    708KB

    MD5

    1b0e974e4dc79923e28e1e4d0ee0d0ac

    SHA1

    11e7f1d5bf58c51a27a89233be9368bb67d0d8cf

    SHA256

    15c2f3333d4880b70888505de697bb84c6e62343f9ae9d90d99e7c280170b323

    SHA512

    5aae695851aa630de4792b3da41f1674fa3cb48193a4f1c45e5f3595d214f57c9977ea000f1e93dd897c50fb176fd86c363cca88d4e68d27debf51a1439166b4

  • \Users\Admin\oxnv1.ooccxx

    Filesize

    708KB

    MD5

    6547ad5ca6f25c230f21abdc6917d520

    SHA1

    b75fc2c9b37d30b5fc3c0b35662d7287098c81bd

    SHA256

    76a41098ef49a464addd3af6c3f61ff097202e6a028a0a5bd87653938a4b04d5

    SHA512

    9770471abc9150e482a219d43b8bbe3a29d9e1da105159fd44cf56b03244005ea49184ddc80ac8ebac81f8f2b935b83aca12e5641204bfe4761949a305a97111

  • \Users\Admin\oxnv1.ooccxx

    Filesize

    708KB

    MD5

    6547ad5ca6f25c230f21abdc6917d520

    SHA1

    b75fc2c9b37d30b5fc3c0b35662d7287098c81bd

    SHA256

    76a41098ef49a464addd3af6c3f61ff097202e6a028a0a5bd87653938a4b04d5

    SHA512

    9770471abc9150e482a219d43b8bbe3a29d9e1da105159fd44cf56b03244005ea49184ddc80ac8ebac81f8f2b935b83aca12e5641204bfe4761949a305a97111

  • \Users\Admin\oxnv3.ooccxx

    Filesize

    708KB

    MD5

    f42e3e1e9805323bfb61813c4420e90c

    SHA1

    76735b1e8987ad0ffd7b544eac2ec21abd8d821a

    SHA256

    bbcbcc91afda17bcb8f40e1aab9d684ac9efb002f50e0bb6aecae4ad9156ed05

    SHA512

    5a80a2bd62c5dd4d5be380065107ea3f990db51d007fe4e0d7f40bea31935e236fafa64d8f2a9bba7ca34fbf4e3ee8f341a392a48702d7475ff7dc332ce96bdb

  • \Users\Admin\oxnv3.ooccxx

    Filesize

    708KB

    MD5

    f42e3e1e9805323bfb61813c4420e90c

    SHA1

    76735b1e8987ad0ffd7b544eac2ec21abd8d821a

    SHA256

    bbcbcc91afda17bcb8f40e1aab9d684ac9efb002f50e0bb6aecae4ad9156ed05

    SHA512

    5a80a2bd62c5dd4d5be380065107ea3f990db51d007fe4e0d7f40bea31935e236fafa64d8f2a9bba7ca34fbf4e3ee8f341a392a48702d7475ff7dc332ce96bdb

  • \Users\Admin\oxnv4.ooccxx

    Filesize

    708KB

    MD5

    1b0e974e4dc79923e28e1e4d0ee0d0ac

    SHA1

    11e7f1d5bf58c51a27a89233be9368bb67d0d8cf

    SHA256

    15c2f3333d4880b70888505de697bb84c6e62343f9ae9d90d99e7c280170b323

    SHA512

    5aae695851aa630de4792b3da41f1674fa3cb48193a4f1c45e5f3595d214f57c9977ea000f1e93dd897c50fb176fd86c363cca88d4e68d27debf51a1439166b4

  • \Users\Admin\oxnv4.ooccxx

    Filesize

    708KB

    MD5

    1b0e974e4dc79923e28e1e4d0ee0d0ac

    SHA1

    11e7f1d5bf58c51a27a89233be9368bb67d0d8cf

    SHA256

    15c2f3333d4880b70888505de697bb84c6e62343f9ae9d90d99e7c280170b323

    SHA512

    5aae695851aa630de4792b3da41f1674fa3cb48193a4f1c45e5f3595d214f57c9977ea000f1e93dd897c50fb176fd86c363cca88d4e68d27debf51a1439166b4

  • memory/1540-66-0x0000000180000000-0x000000018002F000-memory.dmp

    Filesize

    188KB

  • memory/1540-64-0x000007FEFC421000-0x000007FEFC423000-memory.dmp

    Filesize

    8KB

  • memory/1784-69-0x0000000072BFD000-0x0000000072C08000-memory.dmp

    Filesize

    44KB

  • memory/1784-54-0x000000002F7E1000-0x000000002F7E4000-memory.dmp

    Filesize

    12KB

  • memory/1784-58-0x00000000762F1000-0x00000000762F3000-memory.dmp

    Filesize

    8KB

  • memory/1784-57-0x0000000072BFD000-0x0000000072C08000-memory.dmp

    Filesize

    44KB

  • memory/1784-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1784-55-0x0000000071C11000-0x0000000071C13000-memory.dmp

    Filesize

    8KB