Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
04/11/2022, 07:39
Behavioral task
behavioral1
Sample
dc664ca4ea13b3d8dd1bd6aae5ed913b908bad26e1461182496f53cf82df1b70.xls
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
dc664ca4ea13b3d8dd1bd6aae5ed913b908bad26e1461182496f53cf82df1b70.xls
Resource
win10-20220812-en
General
-
Target
dc664ca4ea13b3d8dd1bd6aae5ed913b908bad26e1461182496f53cf82df1b70.xls
-
Size
217KB
-
MD5
5f19d68ca7f85fc05af539464f77d18d
-
SHA1
1eafce6b42c6f4b1153055e9c49bfbf4a224956d
-
SHA256
dc664ca4ea13b3d8dd1bd6aae5ed913b908bad26e1461182496f53cf82df1b70
-
SHA512
8bf4b37ba08f31329c73dd6a669eabb793e389661185752c6a68ccea4f08265721ed6507a01b2954c9afa47e9de01fe18d1fb1e46ca1ed8be3e194f848261f71
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgXyY+TAQXTHGUMEyP5p6f5jQmq:DbGUMVWlbq
Malware Config
Extracted
https://barkstage.es/wp-content/0E7NdYl7TZuHMJq7/
http://contactworks.nl/images_old/NuEAhfF0PCFhvv/
http://www.iam.ch/wp-content/cache/minify/O1OAjWnfen/
https://www.elaboro.pl/wp-admin/J0hwyIMsk9YFIi/
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1220 1524 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1092 1524 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2404 1524 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3360 1524 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
pid Process 1092 regsvr32.exe 2404 regsvr32.exe 3360 regsvr32.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vKkMMBCNDoLnN.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\GdbdcafLqI\\vKkMMBCNDoLnN.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KLks.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\VoIcIPZRPAOAA\\KLks.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MMdTMPsGyaPgU.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\GEPIwS\\MMdTMPsGyaPgU.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1524 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1092 regsvr32.exe 1092 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 2404 regsvr32.exe 2404 regsvr32.exe 1600 regsvr32.exe 1600 regsvr32.exe 1400 regsvr32.exe 1400 regsvr32.exe 1400 regsvr32.exe 1400 regsvr32.exe 3360 regsvr32.exe 3360 regsvr32.exe 2576 regsvr32.exe 2576 regsvr32.exe 2576 regsvr32.exe 2576 regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1524 EXCEL.EXE 1524 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1524 EXCEL.EXE 1524 EXCEL.EXE 1524 EXCEL.EXE 1524 EXCEL.EXE 1524 EXCEL.EXE 1524 EXCEL.EXE 1524 EXCEL.EXE 1524 EXCEL.EXE 1524 EXCEL.EXE 1524 EXCEL.EXE 1524 EXCEL.EXE 1524 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1524 wrote to memory of 1220 1524 EXCEL.EXE 74 PID 1524 wrote to memory of 1220 1524 EXCEL.EXE 74 PID 1524 wrote to memory of 1092 1524 EXCEL.EXE 75 PID 1524 wrote to memory of 1092 1524 EXCEL.EXE 75 PID 1092 wrote to memory of 1600 1092 regsvr32.exe 76 PID 1092 wrote to memory of 1600 1092 regsvr32.exe 76 PID 1524 wrote to memory of 2404 1524 EXCEL.EXE 77 PID 1524 wrote to memory of 2404 1524 EXCEL.EXE 77 PID 2404 wrote to memory of 1400 2404 regsvr32.exe 78 PID 2404 wrote to memory of 1400 2404 regsvr32.exe 78 PID 1524 wrote to memory of 3360 1524 EXCEL.EXE 79 PID 1524 wrote to memory of 3360 1524 EXCEL.EXE 79 PID 3360 wrote to memory of 2576 3360 regsvr32.exe 80 PID 3360 wrote to memory of 2576 3360 regsvr32.exe 80
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\dc664ca4ea13b3d8dd1bd6aae5ed913b908bad26e1461182496f53cf82df1b70.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
PID:1220
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\GdbdcafLqI\vKkMMBCNDoLnN.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\VoIcIPZRPAOAA\KLks.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\GEPIwS\MMdTMPsGyaPgU.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD59ab34d3de7c813d5d1185224a1ca623a
SHA15787b9085e9d908b8aaa0b3a8b788e1599728b90
SHA2562102a1499757826c38d4b4108d128a33d151a37bfc027936b2f6966dea3be061
SHA512cd0069bd1eefc25ec2a3472fcd967900248490adde41c5c74f87b430f601fddc094b066120b44d501770f251972a90495113c2e3b71d8fa8ffe835f653b1ecfc
-
Filesize
751KB
MD5d5c2bef19e9c844f3f2b9daf53aafb1d
SHA14e4f4759a86a3661c844150b1e09f58d294700be
SHA2563b6be6397366f82af040c0e19d42e022aff0a0fa28c8f5d743377661aa9d282a
SHA512daebc123e55ed520cc8fb9619c10b398f6192cccae84a949819bc1c01d40a1967357edc15fa2fe6a3de6917e7f7029efe4b86e8d26c2ea52f502f9f809bc0ebc
-
Filesize
751KB
MD50137d529b5713fcb4cee7705167c761b
SHA137138a21ce7a8123d4e5d1c33e59c8104e20735f
SHA25626b0a767e6d46bc9bdee1145059f2d440be78e32a58167545b73d9e01249d9d7
SHA512485e87aab7eec3bdb39ca0a416d3d66968289893db97defb19517ded9fd77e6f11fa40cb26786da977f7e032a10841c767a486d2e69cb25642e223b2e9868945
-
Filesize
751KB
MD59ab34d3de7c813d5d1185224a1ca623a
SHA15787b9085e9d908b8aaa0b3a8b788e1599728b90
SHA2562102a1499757826c38d4b4108d128a33d151a37bfc027936b2f6966dea3be061
SHA512cd0069bd1eefc25ec2a3472fcd967900248490adde41c5c74f87b430f601fddc094b066120b44d501770f251972a90495113c2e3b71d8fa8ffe835f653b1ecfc
-
Filesize
751KB
MD5d5c2bef19e9c844f3f2b9daf53aafb1d
SHA14e4f4759a86a3661c844150b1e09f58d294700be
SHA2563b6be6397366f82af040c0e19d42e022aff0a0fa28c8f5d743377661aa9d282a
SHA512daebc123e55ed520cc8fb9619c10b398f6192cccae84a949819bc1c01d40a1967357edc15fa2fe6a3de6917e7f7029efe4b86e8d26c2ea52f502f9f809bc0ebc
-
Filesize
751KB
MD50137d529b5713fcb4cee7705167c761b
SHA137138a21ce7a8123d4e5d1c33e59c8104e20735f
SHA25626b0a767e6d46bc9bdee1145059f2d440be78e32a58167545b73d9e01249d9d7
SHA512485e87aab7eec3bdb39ca0a416d3d66968289893db97defb19517ded9fd77e6f11fa40cb26786da977f7e032a10841c767a486d2e69cb25642e223b2e9868945