Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/10/2022, 16:48

General

  • Target

    d8de61c578121ca0b2a20bc362ac1bcc.exe

  • Size

    324KB

  • MD5

    d8de61c578121ca0b2a20bc362ac1bcc

  • SHA1

    cba62ef1335b45934622ffb2f8e5191715723c03

  • SHA256

    913a0ef3cb455f66c24a59f5ca9c4a6f27f548c90b9bbac4992b45527286b896

  • SHA512

    f76d9e3764b1709d3a0fceda30c6d3ddf2f6eb3209a2baec28041f00434779d3a86939d79a46163d0abd20cba1b635b684f63d5ca2b23860b8982a70cf324248

  • SSDEEP

    6144:H3L5+zZemvILQj4p3lXV7VbJ9MiFpIIUwB0U:H75+zZemvIB1lzUwy

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8de61c578121ca0b2a20bc362ac1bcc.exe
    "C:\Users\Admin\AppData\Local\Temp\d8de61c578121ca0b2a20bc362ac1bcc.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\system32\rundll32.exe
      "C:\Users\Admin\AppData\Roaming\nsis_unse56dbfd.dll",PrintUIEntry |5CQkOhiAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBWYXAFj+HwBjAFcAZwB1|wAwAGsAcwBT+h8AZy0CWUiD7Cj|6AQCAABIg8T|KMPMzMxMiUT|JBhIiVQkEEjviUwkCFkBSItEvyQwSIkEJH0BOP1IawAISMdEJBD2LQHrDn0BEEiDwHUBiwEQfQFASDmSAPtzJZsDiwwkSAN|yEiLwUiLTKcB|VR3AAPRSIvKit8JiAjrwWIFZUjviwQlYPPwM8lI|4tQGEg70XQ2|0iDwiBIiwJI|zvCdCpmg3hI|xh1GkyLQFBmv0GDOGt0Bw0RS|t1CA0QeBAudAX|SIsA69VIi0j6+QDBZgBAU1VWV|9BVEFVQVZBV|5ZAWaBOU1aTYv|+EyL8kiL2Q|7hfzz8ExjSTxB|4E8CVBFAAAP+4Xq8|BBi4QJiP7z8IXASI08AQ97hNZmEYO8CYwtAfcPhMfz8ESLZyD|RItfHIt3JET|i08YTAPhTAP|2UgD8TPJRYXvyQ+EpPPwTYvE|0GLEEUz0kgD|9OKAoTAdB1Bv8HKDQ++wPYAAfdEA9C7EXXsQYH|+qr8DXx0DoP|wQFJg8AEQTv|yXNp68aLwQ||twxORYssi0y|A+t0WDPtphB071FBixS9ANMzyf+KAkyLwusPwe3JxBEDyOEQAUGK|QDREO0zwDP2Qec7DLbcEKIAg8YB|4P4CHLu6wpI|4vLQf|VSYkE9|eDxeAQxAQ7b|cYcq9iAUFfQV7|QV1BXF9eXVu+LxdIgexgAWAAi||p6Gb+||9IhW|AD4SZcSBMjasBfYsnEMgz|+ibeSD|jV8ETI1FQjN|0ovL|1QkaHwgv0yL4A+EbHEgRd6kEDPAi9ONIEiJ13wkIKIgcHwgSIvP8A+ETHEgoiBQSP+NVghEjUdASPeNjCSBEUiL2Oi7fP16II1WSNogENreIczz8Ohn6yBEi08GjVcIPSCiIFjGIa+JhCSAgxLd8|CLPQ7WIFiJjCRtEQMw9o0g6DHrIEyLXTq7i6wpMkiLnBYyTP+JZCQ4RI1nbO9JO+xIhiAwTIndXIABhCTcgxGGjvTjId8g8KwTSIvT6Nvn|AEwipxzMkiN|YRzMkGA8yFJi+|MRDAYoAKD6QHvdfOBvHMyIVJlf3h1SouEJPQeMfeUJPjz8APCSDv|6HI1QTvUdjD|RI1JQEkr1EHTuACUAKIgQMYi+HTzF0S0ML4xSI1TbL6NIE0rxOhsgDBI+4vOoiB4SIX|dPMUTIwwFzFIjUwk90C6A|Pw|9dIgRnEcCFdJAAA
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • outlook_office_path
      • outlook_win_path
      PID:4000
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 4000 -s 720
        3⤵
        • Program crash
        PID:3720
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 648
      2⤵
      • Program crash
      PID:648
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2732 -ip 2732
    1⤵
      PID:4076
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 540 -p 4000 -ip 4000
      1⤵
        PID:1192

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\nsis_unse56dbfd.dll

        Filesize

        58KB

        MD5

        664e46926466a2d4c9b87540f4853c39

        SHA1

        b172d1c2bde331770b0a944fcf6a9e2d75ded66b

        SHA256

        92a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488

        SHA512

        1490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03

      • C:\Users\Admin\AppData\Roaming\nsis_unse56dbfd.dll

        Filesize

        58KB

        MD5

        664e46926466a2d4c9b87540f4853c39

        SHA1

        b172d1c2bde331770b0a944fcf6a9e2d75ded66b

        SHA256

        92a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488

        SHA512

        1490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03

      • memory/2732-135-0x00000000030E0000-0x00000000030FA000-memory.dmp

        Filesize

        104KB

      • memory/2732-133-0x00000000030B0000-0x00000000030E0000-memory.dmp

        Filesize

        192KB

      • memory/2732-137-0x0000000003100000-0x000000000311D000-memory.dmp

        Filesize

        116KB

      • memory/2732-134-0x0000000000400000-0x0000000002C3E000-memory.dmp

        Filesize

        40.2MB

      • memory/2732-132-0x0000000002CB7000-0x0000000002CDC000-memory.dmp

        Filesize

        148KB

      • memory/2732-140-0x0000000004DE0000-0x0000000005DE0000-memory.dmp

        Filesize

        16.0MB

      • memory/2732-143-0x0000000002CB7000-0x0000000002CDC000-memory.dmp

        Filesize

        148KB

      • memory/2732-144-0x0000000000400000-0x0000000002C3E000-memory.dmp

        Filesize

        40.2MB

      • memory/4000-141-0x00000194E7C80000-0x00000194E7C87000-memory.dmp

        Filesize

        28KB

      • memory/4000-142-0x00007FF4C5460000-0x00007FF4C5553000-memory.dmp

        Filesize

        972KB

      • memory/4000-145-0x00007FF4C5460000-0x00007FF4C5553000-memory.dmp

        Filesize

        972KB

      • memory/4000-146-0x0000000010000000-0x0000000010013000-memory.dmp

        Filesize

        76KB