Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2024, 22:25

General

  • Target

    1bb66318a867e921a9fd16fe0b4974d0N.exe

  • Size

    352KB

  • MD5

    1bb66318a867e921a9fd16fe0b4974d0

  • SHA1

    28873d066eed279fc2257359d9a2d3e4321659fb

  • SHA256

    df90c248718e6c2efcafe90d0ab15dec6dd122a123409f012c87af89e6f7af46

  • SHA512

    46377ebfe0ccc9a4c02b6406a790a855ba0f29034f230eb46a0ae5cc141df472fdf016e5ca7bc12d70d71e2312d50e83b9b886f03d0c57e9c82c5ed5e8397af9

  • SSDEEP

    6144:QsSJbFSCQ4knkc+8c11BJ5AH4gpyjrwKMMbvB42Iplc5nJZ+b1vXI6hpA:Qsq0kcXC1Bji8ZMMacJJAvXIs2

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

80.227.52.78:80

51.89.199.141:8080

173.212.214.235:7080

167.114.153.111:8080

61.19.246.238:443

37.179.204.33:80

190.164.104.62:80

95.9.5.93:80

138.68.87.218:443

176.111.60.55:8080

194.190.67.75:80

66.76.12.94:8080

190.29.166.0:80

139.59.60.244:8080

184.180.181.202:80

49.50.209.131:80

24.133.106.23:80

121.7.31.214:80

185.94.252.104:443

50.91.114.38:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet payload 5 IoCs

    Detects Emotet payload in memory.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bb66318a867e921a9fd16fe0b4974d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\1bb66318a867e921a9fd16fe0b4974d0N.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Windows\SysWOW64\KBDMLT48\api-ms-win-core-file-l2-1-0.exe
      "C:\Windows\SysWOW64\KBDMLT48\api-ms-win-core-file-l2-1-0.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\KBDMLT48\api-ms-win-core-file-l2-1-0.exe

    Filesize

    352KB

    MD5

    1bb66318a867e921a9fd16fe0b4974d0

    SHA1

    28873d066eed279fc2257359d9a2d3e4321659fb

    SHA256

    df90c248718e6c2efcafe90d0ab15dec6dd122a123409f012c87af89e6f7af46

    SHA512

    46377ebfe0ccc9a4c02b6406a790a855ba0f29034f230eb46a0ae5cc141df472fdf016e5ca7bc12d70d71e2312d50e83b9b886f03d0c57e9c82c5ed5e8397af9

  • memory/1060-1-0x0000000001CA0000-0x0000000001CDD000-memory.dmp

    Filesize

    244KB

  • memory/1060-6-0x0000000001CE0000-0x0000000001D1C000-memory.dmp

    Filesize

    240KB

  • memory/1060-4-0x00000000002F0000-0x000000000032A000-memory.dmp

    Filesize

    232KB

  • memory/1060-10-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2540-13-0x0000000000390000-0x00000000003CD000-memory.dmp

    Filesize

    244KB

  • memory/2540-17-0x0000000000460000-0x000000000049C000-memory.dmp

    Filesize

    240KB