Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
128s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
04/11/2022, 03:02
Behavioral task
behavioral1
Sample
a676b61910e1205f39e50700f6162075bc3cd41df4a0d5f26d797469e376551c.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
a676b61910e1205f39e50700f6162075bc3cd41df4a0d5f26d797469e376551c.xls
Resource
win10-20220812-en
General
-
Target
a676b61910e1205f39e50700f6162075bc3cd41df4a0d5f26d797469e376551c.xls
-
Size
217KB
-
MD5
aac58dfb2c0812806ff01f29d59352e2
-
SHA1
a1f0158b128119acebda88993527af6d869a93be
-
SHA256
a676b61910e1205f39e50700f6162075bc3cd41df4a0d5f26d797469e376551c
-
SHA512
1b488962ce77dc0a53e79aff563727f3ef23cf0ead73cba9e23bf39d0fd445cbb4e1b6257552ef238ff22a8cef436b4edeb069e2220f21402bd39b1676f05529
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgXyY+TAQXTHGUMEyP5p6f5jQma:DbGUMVWlba
Malware Config
Extracted
https://barkstage.es/wp-content/0E7NdYl7TZuHMJq7/
http://contactworks.nl/images_old/NuEAhfF0PCFhvv/
http://www.iam.ch/wp-content/cache/minify/O1OAjWnfen/
https://www.elaboro.pl/wp-admin/J0hwyIMsk9YFIi/
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 416 4124 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1436 4124 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1304 4124 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3324 4124 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
pid Process 416 regsvr32.exe 1436 regsvr32.exe 3324 regsvr32.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voQNRrqQMjezVjBG.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\DumNytTNuYw\\voQNRrqQMjezVjBG.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VfnxtbTCeePh.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\CnpnpTduCLqO\\VfnxtbTCeePh.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kHGVIPqdiOjsGSf.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\THURxWYmfsEC\\kHGVIPqdiOjsGSf.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4124 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 416 regsvr32.exe 416 regsvr32.exe 4136 regsvr32.exe 4136 regsvr32.exe 1436 regsvr32.exe 1436 regsvr32.exe 4136 regsvr32.exe 4136 regsvr32.exe 1788 regsvr32.exe 1788 regsvr32.exe 1788 regsvr32.exe 1788 regsvr32.exe 3324 regsvr32.exe 3324 regsvr32.exe 2196 regsvr32.exe 2196 regsvr32.exe 2196 regsvr32.exe 2196 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4124 EXCEL.EXE 4124 EXCEL.EXE 4124 EXCEL.EXE 4124 EXCEL.EXE 4124 EXCEL.EXE 4124 EXCEL.EXE 4124 EXCEL.EXE 4124 EXCEL.EXE 4124 EXCEL.EXE 4124 EXCEL.EXE 4124 EXCEL.EXE 4124 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4124 wrote to memory of 416 4124 EXCEL.EXE 68 PID 4124 wrote to memory of 416 4124 EXCEL.EXE 68 PID 416 wrote to memory of 4136 416 regsvr32.exe 73 PID 416 wrote to memory of 4136 416 regsvr32.exe 73 PID 4124 wrote to memory of 1436 4124 EXCEL.EXE 74 PID 4124 wrote to memory of 1436 4124 EXCEL.EXE 74 PID 1436 wrote to memory of 1788 1436 regsvr32.exe 75 PID 1436 wrote to memory of 1788 1436 regsvr32.exe 75 PID 4124 wrote to memory of 1304 4124 EXCEL.EXE 78 PID 4124 wrote to memory of 1304 4124 EXCEL.EXE 78 PID 4124 wrote to memory of 3324 4124 EXCEL.EXE 79 PID 4124 wrote to memory of 3324 4124 EXCEL.EXE 79 PID 3324 wrote to memory of 2196 3324 regsvr32.exe 80 PID 3324 wrote to memory of 2196 3324 regsvr32.exe 80
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a676b61910e1205f39e50700f6162075bc3cd41df4a0d5f26d797469e376551c.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\THURxWYmfsEC\kHGVIPqdiOjsGSf.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\DumNytTNuYw\voQNRrqQMjezVjBG.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
PID:1304
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\CnpnpTduCLqO\VfnxtbTCeePh.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD5d70b27076b1ce35bcc69e7a6f725d6b1
SHA1dd86849dd8c9843c28fea946cda44bcbe5dbea78
SHA256d7f6fa7c4d8c90188ae811dc9fc8f0ce259fac2583cc1a2189cb720ba9812701
SHA512fcd183bec062defb66b198b21322657f0ce571847bb5711e17e454b00bf4f9672f6469895acbdef45f28ede31ea14e75d5ce707d44eca7f0e4908141daabe640
-
Filesize
751KB
MD54638bfd4497e8238d322b778200c7471
SHA124dde394d9c3de5490231a6ebd80ec424cb353d6
SHA256c955b5758048e79666928e7db82d41fd2d500607561ac03eda1dc2fb95ce2d62
SHA51280c2a081e6522e4e859f297ed858c15f69a73c41d4470e6c8ab477b98cc942d2622aadc1ff1a6793e8329240fbcea5c38dcf17550affce7e94610d947e1bf363
-
Filesize
751KB
MD55c9a7ffcbebaac55e6e8a55ad51b8723
SHA1d15289de24daabba19bc0e4ec076c1903ccf9e3c
SHA2563c323c26993ef95c35adb4b39a6e6109f428329d96ddbb609ae8ceb5c3637ee2
SHA512e37a90bccdabad319e560db2ed3bc3521cc49e3f52cc1538e17c27b9b59d758ef963ebc2946d2bb2f129bc14652772cc9584d2bc8dd8468e0b7b8d62652eda51
-
Filesize
751KB
MD5d70b27076b1ce35bcc69e7a6f725d6b1
SHA1dd86849dd8c9843c28fea946cda44bcbe5dbea78
SHA256d7f6fa7c4d8c90188ae811dc9fc8f0ce259fac2583cc1a2189cb720ba9812701
SHA512fcd183bec062defb66b198b21322657f0ce571847bb5711e17e454b00bf4f9672f6469895acbdef45f28ede31ea14e75d5ce707d44eca7f0e4908141daabe640
-
Filesize
751KB
MD54638bfd4497e8238d322b778200c7471
SHA124dde394d9c3de5490231a6ebd80ec424cb353d6
SHA256c955b5758048e79666928e7db82d41fd2d500607561ac03eda1dc2fb95ce2d62
SHA51280c2a081e6522e4e859f297ed858c15f69a73c41d4470e6c8ab477b98cc942d2622aadc1ff1a6793e8329240fbcea5c38dcf17550affce7e94610d947e1bf363
-
Filesize
751KB
MD55c9a7ffcbebaac55e6e8a55ad51b8723
SHA1d15289de24daabba19bc0e4ec076c1903ccf9e3c
SHA2563c323c26993ef95c35adb4b39a6e6109f428329d96ddbb609ae8ceb5c3637ee2
SHA512e37a90bccdabad319e560db2ed3bc3521cc49e3f52cc1538e17c27b9b59d758ef963ebc2946d2bb2f129bc14652772cc9584d2bc8dd8468e0b7b8d62652eda51