Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 00:40
Behavioral task
behavioral1
Sample
09ccfdf0657074e136f7afd66ec9ce8c62db5c33cb9ec04101e49c761fdbd276.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09ccfdf0657074e136f7afd66ec9ce8c62db5c33cb9ec04101e49c761fdbd276.xls
Resource
win10v2004-20241007-en
General
-
Target
09ccfdf0657074e136f7afd66ec9ce8c62db5c33cb9ec04101e49c761fdbd276.xls
-
Size
60KB
-
MD5
021dd30080b450fcaafa421cd08c6b16
-
SHA1
9f73701033a4dcbaca1b72665ab656e654379323
-
SHA256
09ccfdf0657074e136f7afd66ec9ce8c62db5c33cb9ec04101e49c761fdbd276
-
SHA512
9bb15cf7717258dc605b8c348b466c5cbb355c88d4a76c30bec044d95dd24b75f3f6dc57e2b7fa9aa5b4c3f34bd2b80af418087f95e491bf1585b1b5b9b6c30e
-
SSDEEP
1536:NpKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgUDOJiA6Cv/UGLI36yOAR5N:rKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgw
Malware Config
Extracted
http://www.valyval.com/pun/VAYL/
http://cabans.com/CeudWYRQEzZgrHPcI/
http://calzadoyuyin.com/cgj-bin/jZPff/
http://cagranus.com/slide/mcqAFuMhaekn/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2684 628 regsvr32.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2572 628 regsvr32.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 608 628 regsvr32.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2600 628 regsvr32.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 628 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 628 wrote to memory of 2684 628 EXCEL.EXE 31 PID 628 wrote to memory of 2684 628 EXCEL.EXE 31 PID 628 wrote to memory of 2684 628 EXCEL.EXE 31 PID 628 wrote to memory of 2684 628 EXCEL.EXE 31 PID 628 wrote to memory of 2684 628 EXCEL.EXE 31 PID 628 wrote to memory of 2684 628 EXCEL.EXE 31 PID 628 wrote to memory of 2684 628 EXCEL.EXE 31 PID 628 wrote to memory of 2572 628 EXCEL.EXE 33 PID 628 wrote to memory of 2572 628 EXCEL.EXE 33 PID 628 wrote to memory of 2572 628 EXCEL.EXE 33 PID 628 wrote to memory of 2572 628 EXCEL.EXE 33 PID 628 wrote to memory of 2572 628 EXCEL.EXE 33 PID 628 wrote to memory of 2572 628 EXCEL.EXE 33 PID 628 wrote to memory of 2572 628 EXCEL.EXE 33 PID 628 wrote to memory of 608 628 EXCEL.EXE 34 PID 628 wrote to memory of 608 628 EXCEL.EXE 34 PID 628 wrote to memory of 608 628 EXCEL.EXE 34 PID 628 wrote to memory of 608 628 EXCEL.EXE 34 PID 628 wrote to memory of 608 628 EXCEL.EXE 34 PID 628 wrote to memory of 608 628 EXCEL.EXE 34 PID 628 wrote to memory of 608 628 EXCEL.EXE 34 PID 628 wrote to memory of 2600 628 EXCEL.EXE 35 PID 628 wrote to memory of 2600 628 EXCEL.EXE 35 PID 628 wrote to memory of 2600 628 EXCEL.EXE 35 PID 628 wrote to memory of 2600 628 EXCEL.EXE 35 PID 628 wrote to memory of 2600 628 EXCEL.EXE 35 PID 628 wrote to memory of 2600 628 EXCEL.EXE 35 PID 628 wrote to memory of 2600 628 EXCEL.EXE 35
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\09ccfdf0657074e136f7afd66ec9ce8c62db5c33cb9ec04101e49c761fdbd276.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\xgev1.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\xgev2.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\xgev3.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:608
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\xgev4.ocx2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5225aaa0bb1d8a22bd4ef9ee3a99fb995
SHA1c6fc06c8aa4ede5cfcca2ae867626458a5f75f2e
SHA256bd256a3225c02e94b20b029337938c34c4c87d8f5b52dcd387894524289e9950
SHA51210890f65360ce6d93de29fe84746ef91fedc7121f8e9102b22969486447a51a13ca4d43c04405e078f5303882b4bd65c5e4a1153ee72e744ef0d38bd38c07c69