Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
29/01/2024, 04:39
240129-e973taabe9 1029/01/2024, 02:55
240129-dew7dshgep 1029/01/2024, 01:55
240129-ccg41sfdf2 1029/01/2024, 01:50
240129-b9jhnsgham 329/01/2024, 01:26
240129-bts26sfaa4 10Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
29/01/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
excel40macroschallenge.rar
Resource
win10-20231215-en
General
-
Target
excel40macroschallenge.rar
-
Size
103KB
-
MD5
542ead021ed9ecab2f5b6ff0edaf2f74
-
SHA1
f1a509cb6dc15534a0b7ee29486789557a434941
-
SHA256
024ef55d8112d913021e2f8e38294052c40d177062afebc1b462f396c86c297b
-
SHA512
d2e1514a891db86ec6275ffcb6f44503cedf9e4560d200eeefc3fe047e08c7769de1892b92ee71fe4663720652eb509a55c29e24e82d6deb8dbe5a741cd9cb95
-
SSDEEP
1536:r6diRoyzKi0WAx5elOHwxvhuQcLE6/Q59VGqITfVuy03FD+/mUtzBxr:xutnmOQxvqEPHVZILVK1D+eUtX
Malware Config
Extracted
https://nws.visionconsulting.ro/N1G1KCXA/dot.html
https://royalpalm.sparkblue.lk/vCNhYrq3Yg8/dot.html
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3004 3744 regsvr32.exe 76 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2176 3744 regsvr32.exe 76 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1968775928-2924269989-3510977013-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1968775928-2924269989-3510977013-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance 7zFM.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3744 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3900 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3900 7zFM.exe Token: 35 3900 7zFM.exe Token: SeSecurityPrivilege 3900 7zFM.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 3900 7zFM.exe 3900 7zFM.exe 3900 7zFM.exe 3744 EXCEL.EXE 3744 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3744 EXCEL.EXE 3744 EXCEL.EXE 3744 EXCEL.EXE 3744 EXCEL.EXE 3744 EXCEL.EXE 3744 EXCEL.EXE 3744 EXCEL.EXE 3744 EXCEL.EXE 3744 EXCEL.EXE 3744 EXCEL.EXE 3744 EXCEL.EXE 3744 EXCEL.EXE 3744 EXCEL.EXE 3744 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 212 wrote to memory of 3900 212 cmd.exe 73 PID 212 wrote to memory of 3900 212 cmd.exe 73 PID 3744 wrote to memory of 3004 3744 EXCEL.EXE 80 PID 3744 wrote to memory of 3004 3744 EXCEL.EXE 80 PID 3744 wrote to memory of 2176 3744 EXCEL.EXE 81 PID 3744 wrote to memory of 2176 3744 EXCEL.EXE 81
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\excel40macroschallenge.rar1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\excel40macroschallenge.rar"2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3900
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\research-1646684671.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 -s ..\iroto.dll2⤵
- Process spawned unexpected child process
PID:3004
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 -s ..\iroto1.dll2⤵
- Process spawned unexpected child process
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275B
MD54926738d61b95ed85f82b1163c66f5c5
SHA12199d0a1a08ad5b4e05749bd152bc600a192c0e1
SHA2562a1df9acdef48812611932a0780bc2d8658f0ac6652df9cbe835eec47922aa33
SHA512352f2f3c72ab2fc2da4e77306726da7a27cf123158ed4832cee05cd9f2c5e8c646a4b742e1295bf592ec9286bae3e13fc077fe6836f243c4f7a322611b20f7ee
-
Filesize
648KB
MD5927005139a0be61efe849c715d875dd2
SHA10f6a91916941d85b69e5320873a5d1c45055bc4e
SHA256b23491ede17f9a5b7d6ad27d3051a2224c214a5afa2139e5147bd26319577f85
SHA51230f40d913815f43395186b0957413e9f3f8999af97b3192372a4da86c6b5b32e3abd8adadb9623417521b57cff4e323d85d72e0e31c6be901b0926a0350c9b3e
-
Filesize
1KB
MD5f2eda6999563e6eeae51b31bfcbce6fd
SHA15182ef0d59af25d3ee12376991207a04e168653c
SHA256113e7da3abfdb830cd255ad55e161d0c8a4538e01d60484fc596594c5fbeeded
SHA512a6f425e6cdfa09499a8db3cdfabe7adb2d466a2c97e45258ff5b4ac58d8919d518cca0315faf90bd5be12a2a690a7b446725d3541aac88a7a3c09af2f4d7c335