Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2024, 19:13 UTC

General

  • Target

    45e17449a3b95a4f125507b6f985920c15aa79477eb3bfcf0444ff302771f20aN.dll

  • Size

    780KB

  • MD5

    a9d2386f0aefed71734f7b8d1f02f5c0

  • SHA1

    4f63fe9cb35749ac4b479ab9c95b75f1946fa05c

  • SHA256

    45e17449a3b95a4f125507b6f985920c15aa79477eb3bfcf0444ff302771f20a

  • SHA512

    fa038537282a0aca836a5da9afe14adb84025c72f378eac74e2c16f84dca00052a9a7327e3b465306bd0c5e259cde0c1e67062e0dc792df41273861dbb7c3aa9

  • SSDEEP

    12288:5s/YpAp2/yQ0P7BLyP70niTkgwzDwtAs0owb8ZPnJ0l7FgDZ4liMFdajByR:5GPp2/yQ0PtC0x/w50Pb8wgDZTGMjB

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

45.80.148.200:443

80.211.3.13:8080

110.232.117.186:8080

45.142.114.231:8080

131.100.24.231:80

107.182.225.142:8080

45.118.135.203:7080

164.68.99.3:8080

212.237.56.116:7080

41.76.108.46:8080

58.227.42.236:80

104.168.155.129:8080

79.172.212.216:8080

192.254.71.210:443

51.38.71.0:443

217.182.143.207:443

203.114.109.124:443

185.157.82.211:8080

173.212.193.249:8080

45.176.232.124:443

eck1.plain
1
-----BEGIN PUBLIC KEY-----
2
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE86M1tQ4uK/Q1Vs0KTCk+fPEQ3cuw
3
TyCz+gIgzky2DB5Elr60DubJW5q9Tr2dj8/gEFs0TIIEJgLTuqzx+58sdg==
4
-----END PUBLIC KEY-----
ecs1.plain
1
-----BEGIN PUBLIC KEY-----
2
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEQF90tsTY3Aw9HwZ6N9y5+be9Xoov
3
pqHyD6F5DRTl9THosAoePIs/e5AdJiYxhmV8Gq3Zw1ysSPBghxjZdDxY+Q==
4
-----END PUBLIC KEY-----

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\45e17449a3b95a4f125507b6f985920c15aa79477eb3bfcf0444ff302771f20aN.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\45e17449a3b95a4f125507b6f985920c15aa79477eb3bfcf0444ff302771f20aN.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\45e17449a3b95a4f125507b6f985920c15aa79477eb3bfcf0444ff302771f20aN.dll",DllRegisterServer
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3016-0-0x0000000000260000-0x0000000000285000-memory.dmp

    Filesize

    148KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.