Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 00:42

General

  • Target

    8ea024d86e71e3e1121acbc597d686279dbed7534722d592b3a1de7d237703d1.xls

  • Size

    80KB

  • MD5

    56581bdea36b2cfeb01d0b494117323e

  • SHA1

    af450163903dc4c534a1a9de29ea4f3dd7440361

  • SHA256

    8ea024d86e71e3e1121acbc597d686279dbed7534722d592b3a1de7d237703d1

  • SHA512

    f5341b49680008c38f4f96098df93e11bcc1fb80c5a69e78cac399cbe8cfd0e4531a05fc395a87cd78c2be88c42fc63e64987c82e3951ec5b49f1447c6c23a2d

  • SSDEEP

    1536:ROOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgFQHuS4VcTO9/r7UYdEJeFa:RBKpb8rGYrMPe3q7Q0XV5xtezEsi8/d3

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://beeslandkerman.ir/XPFvBDrNkT/lUkOx4VAOizId7u/

xlm40.dropper

http://cerdi.com/_derived/J4Fu7VmGZQ7rGA/

xlm40.dropper

https://www.chasingmavericks.co.ke/agendaafrikadebates.co.ke/QznOFMKV9R/

xlm40.dropper

http://bsbmakina.com.tr/logo/eVWaAWm/

Signatures

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8ea024d86e71e3e1121acbc597d686279dbed7534722d592b3a1de7d237703d1.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3720
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\cui1.ocx
      2⤵
      • Process spawned unexpected child process
      PID:1620
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\cui2.ocx
      2⤵
      • Process spawned unexpected child process
      PID:3304
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\cui3.ocx
      2⤵
      • Process spawned unexpected child process
      PID:1116
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\cui4.ocx
      2⤵
      • Process spawned unexpected child process
      PID:4708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    659B

    MD5

    91d72be9a90e6861fcb878b943d4b7ec

    SHA1

    4dcf28ffdf292bb02b3c812ae7e32d8829c569a1

    SHA256

    ab070422a4b8549219f379be77a1fdbb3e3d8471b6ad7cfebc6921d218825a81

    SHA512

    73f979661b876f57ffbc0ad898b0f7c4dbbe717688eb3aed2399552adcc845511c6ccd62e2c2efb446f8699f46c9f04018713f7a108ff6e571a1c21c93c4c465

  • memory/3720-11-0x00007FF8DF3B0000-0x00007FF8DF5A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3720-17-0x00007FF8DF3B0000-0x00007FF8DF5A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3720-3-0x00007FF89F430000-0x00007FF89F440000-memory.dmp

    Filesize

    64KB

  • memory/3720-4-0x00007FF8DF3B0000-0x00007FF8DF5A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3720-7-0x00007FF8DF3B0000-0x00007FF8DF5A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3720-10-0x00007FF8DF3B0000-0x00007FF8DF5A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3720-12-0x00007FF8DF3B0000-0x00007FF8DF5A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3720-13-0x00007FF8DF3B0000-0x00007FF8DF5A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3720-14-0x00007FF89CEB0000-0x00007FF89CEC0000-memory.dmp

    Filesize

    64KB

  • memory/3720-1-0x00007FF8DF44D000-0x00007FF8DF44E000-memory.dmp

    Filesize

    4KB

  • memory/3720-2-0x00007FF89F430000-0x00007FF89F440000-memory.dmp

    Filesize

    64KB

  • memory/3720-16-0x00007FF8DF3B0000-0x00007FF8DF5A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3720-15-0x00007FF89CEB0000-0x00007FF89CEC0000-memory.dmp

    Filesize

    64KB

  • memory/3720-9-0x00007FF89F430000-0x00007FF89F440000-memory.dmp

    Filesize

    64KB

  • memory/3720-8-0x00007FF8DF3B0000-0x00007FF8DF5A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3720-6-0x00007FF8DF3B0000-0x00007FF8DF5A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3720-5-0x00007FF89F430000-0x00007FF89F440000-memory.dmp

    Filesize

    64KB

  • memory/3720-30-0x00007FF8DF3B0000-0x00007FF8DF5A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3720-31-0x00007FF8DF44D000-0x00007FF8DF44E000-memory.dmp

    Filesize

    4KB

  • memory/3720-35-0x00007FF8DF3B0000-0x00007FF8DF5A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3720-0-0x00007FF89F430000-0x00007FF89F440000-memory.dmp

    Filesize

    64KB