Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
04/11/2022, 11:45
Behavioral task
behavioral1
Sample
e8085fda85865155aa942efb04e789962791ca7d0338216674a8e28c1e1a60ae.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
e8085fda85865155aa942efb04e789962791ca7d0338216674a8e28c1e1a60ae.xls
Resource
win10-20220901-en
General
-
Target
e8085fda85865155aa942efb04e789962791ca7d0338216674a8e28c1e1a60ae.xls
-
Size
217KB
-
MD5
bc33b79e5ae05e7611a77449a9538610
-
SHA1
9cac3606f7e4d5a693d53e4b0ba239a26d27a536
-
SHA256
e8085fda85865155aa942efb04e789962791ca7d0338216674a8e28c1e1a60ae
-
SHA512
f5ab02ba498e0a2ef0b0c3753ea7eea15a894efb63a3bee81eeb4ef0b489c5a260fe3d2a5cceb19be630ec629769e744c5a83ad8d03db4d91700c864b4d1d9c5
-
SSDEEP
6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgIyY+TAQXTHGUMEyP5p6f5jQmG:bbGUMVWlbG
Malware Config
Extracted
http://cursosinterativos.com.br/semprichickoff2/pEl/
http://mulmatdol.com/adm/Fa/
http://www.tugarden.com/docs/csv_import/rf6bMPAtbBPiDK/
http://www.darularqompatean.com/asq/IcVMFfwR65Yf8fMd5G/
Extracted
emotet
Epoch4
45.235.8.30:8080
94.23.45.86:4143
119.59.103.152:8080
169.60.181.70:8080
164.68.99.3:8080
172.105.226.75:8080
107.170.39.149:8080
206.189.28.199:8080
1.234.2.232:8080
188.44.20.25:443
186.194.240.217:443
103.43.75.120:443
149.28.143.92:443
159.89.202.34:443
209.97.163.214:443
183.111.227.137:8080
129.232.188.93:443
139.59.126.41:443
110.232.117.186:8080
139.59.56.73:8080
103.75.201.2:443
91.207.28.33:8080
164.90.222.65:443
197.242.150.244:8080
212.24.98.99:8080
51.161.73.194:443
115.68.227.76:8080
159.65.88.10:8080
201.94.166.162:443
95.217.221.146:8080
173.212.193.249:8080
82.223.21.224:8080
103.132.242.26:8080
213.239.212.5:443
153.126.146.25:7080
45.176.232.124:443
182.162.143.56:443
169.57.156.166:8080
159.65.140.115:443
163.44.196.120:8080
172.104.251.154:8080
167.172.253.162:8080
91.187.140.35:8080
45.118.115.99:8080
147.139.166.154:8080
72.15.201.15:8080
149.56.131.28:8080
167.172.199.165:8080
101.50.0.91:8080
160.16.142.56:8080
185.4.135.165:8080
104.168.155.143:8080
79.137.35.198:8080
5.135.159.50:443
187.63.160.88:80
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4444 2672 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4904 2672 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5008 2672 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 356 2672 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 4 IoCs
pid Process 4444 regsvr32.exe 4904 regsvr32.exe 5008 regsvr32.exe 356 regsvr32.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FUHAwukwtEuAYyE.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\FKauITcIwaLOcAL\\FUHAwukwtEuAYyE.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spekMdLmAaqsi.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\CgIbBMNBtlEeH\\spekMdLmAaqsi.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BiMEsWNjzHTltTUa.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\VHybpjKgUGKjDII\\BiMEsWNjzHTltTUa.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\uauqEHiUfXeRD.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\TlyYlhaUMWpDLPP\\uauqEHiUfXeRD.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2672 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4444 regsvr32.exe 4444 regsvr32.exe 4704 regsvr32.exe 4704 regsvr32.exe 4704 regsvr32.exe 4704 regsvr32.exe 4904 regsvr32.exe 4904 regsvr32.exe 5112 regsvr32.exe 5112 regsvr32.exe 5008 regsvr32.exe 5008 regsvr32.exe 5112 regsvr32.exe 5112 regsvr32.exe 5052 regsvr32.exe 5052 regsvr32.exe 5052 regsvr32.exe 5052 regsvr32.exe 356 regsvr32.exe 356 regsvr32.exe 1272 regsvr32.exe 1272 regsvr32.exe 1272 regsvr32.exe 1272 regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2672 EXCEL.EXE 2672 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2672 wrote to memory of 4444 2672 EXCEL.EXE 69 PID 2672 wrote to memory of 4444 2672 EXCEL.EXE 69 PID 4444 wrote to memory of 4704 4444 regsvr32.exe 70 PID 4444 wrote to memory of 4704 4444 regsvr32.exe 70 PID 2672 wrote to memory of 4904 2672 EXCEL.EXE 71 PID 2672 wrote to memory of 4904 2672 EXCEL.EXE 71 PID 4904 wrote to memory of 5112 4904 regsvr32.exe 72 PID 4904 wrote to memory of 5112 4904 regsvr32.exe 72 PID 2672 wrote to memory of 5008 2672 EXCEL.EXE 73 PID 2672 wrote to memory of 5008 2672 EXCEL.EXE 73 PID 5008 wrote to memory of 5052 5008 regsvr32.exe 74 PID 5008 wrote to memory of 5052 5008 regsvr32.exe 74 PID 2672 wrote to memory of 356 2672 EXCEL.EXE 75 PID 2672 wrote to memory of 356 2672 EXCEL.EXE 75 PID 356 wrote to memory of 1272 356 regsvr32.exe 76 PID 356 wrote to memory of 1272 356 regsvr32.exe 76
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e8085fda85865155aa942efb04e789962791ca7d0338216674a8e28c1e1a60ae.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\VHybpjKgUGKjDII\BiMEsWNjzHTltTUa.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\TlyYlhaUMWpDLPP\uauqEHiUfXeRD.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\FKauITcIwaLOcAL\FUHAwukwtEuAYyE.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\CgIbBMNBtlEeH\spekMdLmAaqsi.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
529KB
MD5475b778563790430f30ddf9b05c6e0a3
SHA147977ed3b8ab508059c2a4acb27b041108de75ea
SHA256c426f9d6c8f8410d37431d93c7eee26b18eb052ab0334b138f010347bfc1d983
SHA51298b144798f18723348138074d15e9e36b96401fb61ef6d69a43a4b3997e8cbfbb9ebdf0b996e3d0aedc4d64a5e16a86cbdfe831fa30675abf714104492e5bbda
-
Filesize
529KB
MD59936fa6576f6ba02d1d96357f3aac9cc
SHA13c7222a2023c0ee5f8428c63f78d563a79de1af2
SHA256371f264c56935dbd1fab2eb7091c1540179eafc2fb271cccd4430262d36492f8
SHA51231947107cf8072009f8f21c172cfc25905d2f90e37d1e0aff5f5455df3ea4756487cd92261a9e6f9d5b5a0b614e8270dfe31a4ba03fb03794e7688a11a604796
-
Filesize
529KB
MD59403aff61752fe527cc2a37668159a83
SHA10ac191c7305313fdcb88cc7f4748fcf6a77aeb3f
SHA2569eb753b1a1a3f74e9ad3de4edc0950c06aae8922477127eedc7949c73793ecce
SHA512dc4525a8f3c528d78a019292e10c0a8f885eb503ac37620f81ad178c018a24306d104c84b8f1a6700bff840d07cadaee1cada4c2edaa17792af1041cd369119d
-
Filesize
529KB
MD5427fea29b64e5664dee117bb2241ca97
SHA1b1a2439b2da6cbf77cd33362104972051a76648d
SHA25614677b1d0f14aa9dda095744ddc26f92e85535df3262b82d831ec4d1c164fe6a
SHA5124f06d75ccde8e7210cdd51c7a6a54b0cbdc6cacfa4097b19d2f3bd2972971d580c63d6b17f7e526bd5e5d10973aeae1cf597bc3f473d9be573b00a8021a45ad0
-
Filesize
529KB
MD5475b778563790430f30ddf9b05c6e0a3
SHA147977ed3b8ab508059c2a4acb27b041108de75ea
SHA256c426f9d6c8f8410d37431d93c7eee26b18eb052ab0334b138f010347bfc1d983
SHA51298b144798f18723348138074d15e9e36b96401fb61ef6d69a43a4b3997e8cbfbb9ebdf0b996e3d0aedc4d64a5e16a86cbdfe831fa30675abf714104492e5bbda
-
Filesize
529KB
MD59936fa6576f6ba02d1d96357f3aac9cc
SHA13c7222a2023c0ee5f8428c63f78d563a79de1af2
SHA256371f264c56935dbd1fab2eb7091c1540179eafc2fb271cccd4430262d36492f8
SHA51231947107cf8072009f8f21c172cfc25905d2f90e37d1e0aff5f5455df3ea4756487cd92261a9e6f9d5b5a0b614e8270dfe31a4ba03fb03794e7688a11a604796
-
Filesize
529KB
MD59403aff61752fe527cc2a37668159a83
SHA10ac191c7305313fdcb88cc7f4748fcf6a77aeb3f
SHA2569eb753b1a1a3f74e9ad3de4edc0950c06aae8922477127eedc7949c73793ecce
SHA512dc4525a8f3c528d78a019292e10c0a8f885eb503ac37620f81ad178c018a24306d104c84b8f1a6700bff840d07cadaee1cada4c2edaa17792af1041cd369119d
-
Filesize
529KB
MD5427fea29b64e5664dee117bb2241ca97
SHA1b1a2439b2da6cbf77cd33362104972051a76648d
SHA25614677b1d0f14aa9dda095744ddc26f92e85535df3262b82d831ec4d1c164fe6a
SHA5124f06d75ccde8e7210cdd51c7a6a54b0cbdc6cacfa4097b19d2f3bd2972971d580c63d6b17f7e526bd5e5d10973aeae1cf597bc3f473d9be573b00a8021a45ad0