Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2022, 06:23
Behavioral task
behavioral1
Sample
9224M-0311.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9224M-0311.xls
Resource
win10v2004-20220812-en
General
-
Target
9224M-0311.xls
-
Size
217KB
-
MD5
2cbd1cdca247f0f28fc63a5c0e0b13d5
-
SHA1
966e13dfaa1080606d3f47e8cb6c3abd5568b847
-
SHA256
64ff2f53597a590af0608eb012ffd3320f647949019b806da2cbf6fed1eae264
-
SHA512
5f5379a66fa9aacb0563c25ed18dd56e605836b4a4813dc8694df1097183878d2d072ef6530832c0319b7f611ab2c96e68265b52d9e29996fcc6ab3ea62ebad6
-
SSDEEP
6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgJyY+TAQXTHGUMEyP5p6f5jQm1:4bGUMVWlb1
Malware Config
Extracted
http://ruitaiwz.com/wp-admin/sV1NeVxLDiHJ1xm/
http://wordpress.xinmoshiwang.com/list/cRIH9Bd/
http://cultura.educad.pe/wp-content/A86I7QxwuEZV/
http://voinet.ca/cgi-bin/RXDWHpi8dHHZf8/
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3292 4308 regsvr32.exe 79 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1452 4308 regsvr32.exe 79 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2540 4308 regsvr32.exe 79 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1592 4308 regsvr32.exe 79 -
Downloads MZ/PE file
-
Loads dropped DLL 4 IoCs
pid Process 3292 regsvr32.exe 1560 regsvr32.exe 1592 regsvr32.exe 3108 regsvr32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZzimpJvzsfR.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\OImZjHzKlvGupi\\ZzimpJvzsfR.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BNoehZbikuH.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\WgVAU\\BNoehZbikuH.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4308 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3292 regsvr32.exe 3292 regsvr32.exe 1560 regsvr32.exe 1560 regsvr32.exe 1560 regsvr32.exe 1560 regsvr32.exe 1592 regsvr32.exe 1592 regsvr32.exe 3108 regsvr32.exe 3108 regsvr32.exe 3108 regsvr32.exe 3108 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4308 EXCEL.EXE 4308 EXCEL.EXE 4308 EXCEL.EXE 4308 EXCEL.EXE 4308 EXCEL.EXE 4308 EXCEL.EXE 4308 EXCEL.EXE 4308 EXCEL.EXE 4308 EXCEL.EXE 4308 EXCEL.EXE 4308 EXCEL.EXE 4308 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4308 wrote to memory of 3292 4308 EXCEL.EXE 82 PID 4308 wrote to memory of 3292 4308 EXCEL.EXE 82 PID 3292 wrote to memory of 1560 3292 regsvr32.exe 83 PID 3292 wrote to memory of 1560 3292 regsvr32.exe 83 PID 4308 wrote to memory of 1452 4308 EXCEL.EXE 91 PID 4308 wrote to memory of 1452 4308 EXCEL.EXE 91 PID 4308 wrote to memory of 2540 4308 EXCEL.EXE 92 PID 4308 wrote to memory of 2540 4308 EXCEL.EXE 92 PID 4308 wrote to memory of 1592 4308 EXCEL.EXE 93 PID 4308 wrote to memory of 1592 4308 EXCEL.EXE 93 PID 1592 wrote to memory of 3108 1592 regsvr32.exe 94 PID 1592 wrote to memory of 3108 1592 regsvr32.exe 94
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9224M-0311.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\OImZjHzKlvGupi\ZzimpJvzsfR.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
PID:1452
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
PID:2540
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\WgVAU\BNoehZbikuH.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD5ee5e3c80b21ae1f086223cb2cb303dc5
SHA1b2990dccbf7dce788684a2fe1c53eaf910cb39dc
SHA25674e8d2b2f7006b3aeb3f8d85a12093bb2584e8b90edb387b8e723acb122d6ab5
SHA512734d851bcb368337567226ec2b32fd8af4ba59de47279dcb2588e99ca29fc3f36b987a999e04b77fde11ef77217c4f58bc369ef6b271097548a2e2c94f70cd7c
-
Filesize
751KB
MD5ee5e3c80b21ae1f086223cb2cb303dc5
SHA1b2990dccbf7dce788684a2fe1c53eaf910cb39dc
SHA25674e8d2b2f7006b3aeb3f8d85a12093bb2584e8b90edb387b8e723acb122d6ab5
SHA512734d851bcb368337567226ec2b32fd8af4ba59de47279dcb2588e99ca29fc3f36b987a999e04b77fde11ef77217c4f58bc369ef6b271097548a2e2c94f70cd7c
-
Filesize
751KB
MD57fb981d6ef2687bda30521d5e948c0ce
SHA19831da103c1a60289a87ed86ca2a05459077d54c
SHA256525b7ee535e78c411523e0cfa8e3d36333ae705937843f2ec261b30e59792bb3
SHA51200af9d31dc83e86d3e409494e04fddcbc89ed6e4226c0674726ad1c9cf9b9dfc176777795953f2d6637d3c42393defeae2e33e9c3e26f91bf86a863ec0daadab
-
Filesize
751KB
MD57fb981d6ef2687bda30521d5e948c0ce
SHA19831da103c1a60289a87ed86ca2a05459077d54c
SHA256525b7ee535e78c411523e0cfa8e3d36333ae705937843f2ec261b30e59792bb3
SHA51200af9d31dc83e86d3e409494e04fddcbc89ed6e4226c0674726ad1c9cf9b9dfc176777795953f2d6637d3c42393defeae2e33e9c3e26f91bf86a863ec0daadab
-
Filesize
751KB
MD5ee5e3c80b21ae1f086223cb2cb303dc5
SHA1b2990dccbf7dce788684a2fe1c53eaf910cb39dc
SHA25674e8d2b2f7006b3aeb3f8d85a12093bb2584e8b90edb387b8e723acb122d6ab5
SHA512734d851bcb368337567226ec2b32fd8af4ba59de47279dcb2588e99ca29fc3f36b987a999e04b77fde11ef77217c4f58bc369ef6b271097548a2e2c94f70cd7c
-
Filesize
751KB
MD57fb981d6ef2687bda30521d5e948c0ce
SHA19831da103c1a60289a87ed86ca2a05459077d54c
SHA256525b7ee535e78c411523e0cfa8e3d36333ae705937843f2ec261b30e59792bb3
SHA51200af9d31dc83e86d3e409494e04fddcbc89ed6e4226c0674726ad1c9cf9b9dfc176777795953f2d6637d3c42393defeae2e33e9c3e26f91bf86a863ec0daadab