Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2022, 03:13

General

  • Target

    Noteppad_SettupX32iX64.exe

  • Size

    6.3MB

  • MD5

    6d9f7b051a734c7029f67d51e5038bbd

  • SHA1

    916ffa3b7b9815d7941a6a3c47a95469a0092b2e

  • SHA256

    d719df850d62a455d34bf2a5847b36e6d267047824b2e96b7c4c9cdfbd9737e3

  • SHA512

    8286513227e83fda02040cd39aee177a3b33e9fced3e7deed5caf7035ced698712618644a13c518f3545bc7b583edcd3d88ad78a1a9cd36bdcbad9d540d35b5f

  • SSDEEP

    196608:mTQb8bQ8VhcpciM1rr5bgYFTNZXdSNSI:mTO8c2cBMx9cwDt

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Noteppad_SettupX32iX64.exe
    "C:\Users\Admin\AppData\Local\Temp\Noteppad_SettupX32iX64.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Windows\system32\rundll32.exe
      "C:\Users\Admin\AppData\Roaming\nsis_unse56a01d.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8EL|ADcAVABNAGn+OwBSAHUAWQBqPwBQAEwAcCMALQH|WUiD7CjoBAL|AABIg8Qow8z|zMxMiUQkGEj|iVQkEEiJTCT9CF0BSItEJDBIt4kEJIEBOEhvAAjfSMdEJBAtAesOvoEBEEiDwAGPARBugQFASDmWAHMlnwP|iwwkSAPISIuvwUiLTKsBVHsAA||RSIvKigmICPvrwWYFZUiLBCX9YPPwM8lIi1AY|0g70XQ2SIPC|yBIiwJIO8J0|ypmg3hIGHUa|0yLQFBmQYM4d2t0BxERS3UIERD|eBAudAVIiwBf69VIi0j9AMFqAP9AU1VWV0FUQd9VQVZBV10BZoH|OU1aTYv4TIt|8kiL2Q+F|PPw|0xjSTxBgTwJf1BFAAAPherz8N9Bi4QJiPPwhcB|SI08AQ+E1moR74O8CYwtAQ+Ex|7z8ESLZyBEi1||HIt3JESLTxj|TAPhTAPZSAP|8TPJRYXJD4T9pPPwTYvEQYsQ|0Uz0kgD04oC|4TAdB1BwcoN9w++wPoAAUQD0P6|EXXsQYH6qvz|DXx0DoPBAUn|g8AEQTvJc2n|68aLwQ+3DE7|RYssi0wD63T3WDPtqhB0UUGL|RTBANMzyYoCTL+LwusPwcnIEQO9yOUQAUGKANUQ7f8zwDP2QTsMtvzgEKYAg8YBg|gI|3Lu6wpIi8tB|||VSYkE94PF|uQQxAQ7bxhyr|5mAUFfQV5BXUHfXF9eXVszF0iB9+xgAWQAi+noZv|+||9IhcAPhK2YdSBMja8BiysQyO8z|+ibfSCNXwT|TI1FRjPSi8vv|1QkaIAgTIvg1w+Ea3UgRagQM8D7i9ORIEiJfCQg+qYgcIAgSIvwD4T5S3UgpiBQSI1WCP9EjUdASI2MJH6FEUiL2Oh8|X4gV41WSN4gEOIhzPPw++hn7yBEiwaNV+kIQSCmIFjKIYmEJLWAhxLe8|CLDtogWMeJjCRxEQcwkSDoMfbvIIucLTJMi10630iD+2xIiiAwTH+JZCQ4TIukGjJ3TIlchAGEJNyHEduGko0RjUdLMIwk|fDz8EmL1Ojp|HYFMIqceDJIjYR4Mv9BgPMhjU9sRPswGKQCg+kBdfP7gbx4MiFSZXh1302LhCT0IjGUJP34NQHCSDvYcjj|g|psdjNEjUk9QPoAlEG4AJgApiA9QMoi+HQZRLYwwDHfSY1UJGyRIEmD7+hs6GuCMEiLzv6mIHhIhf90EovnVUJMjjAbMUiNTH8kQP|XSIHEdCEAYSQtCC0B
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • outlook_office_path
      • outlook_win_path
      PID:3292
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3292 -s 524
        3⤵
        • Program crash
        PID:2180
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 452 -p 3292 -ip 3292
    1⤵
      PID:4232

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\nsis_unse56a01d.dll

      Filesize

      57KB

      MD5

      713062daba2534394662294035fd7e92

      SHA1

      40270752db5576f1d5e6c935f224754c7b6c3450

      SHA256

      e6a5ca65acfd261d56f622f891bf04e6d41862ab505466374daeee8852a01b71

      SHA512

      e07d9c38d43334cb8e35b32c12eef9ff1ddb7ffe0004ae0d56fe3fb24fbec6b179b631f61afc54b1d31ad02c619442c783a9d881cce86be833b39c59f236b2fd

    • C:\Users\Admin\AppData\Roaming\nsis_unse56a01d.dll

      Filesize

      57KB

      MD5

      713062daba2534394662294035fd7e92

      SHA1

      40270752db5576f1d5e6c935f224754c7b6c3450

      SHA256

      e6a5ca65acfd261d56f622f891bf04e6d41862ab505466374daeee8852a01b71

      SHA512

      e07d9c38d43334cb8e35b32c12eef9ff1ddb7ffe0004ae0d56fe3fb24fbec6b179b631f61afc54b1d31ad02c619442c783a9d881cce86be833b39c59f236b2fd

    • memory/1616-137-0x00000000029F0000-0x0000000002A0D000-memory.dmp

      Filesize

      116KB

    • memory/1616-132-0x0000000000400000-0x0000000000DBD000-memory.dmp

      Filesize

      9.7MB

    • memory/1616-136-0x0000000000DEF000-0x0000000000E03000-memory.dmp

      Filesize

      80KB

    • memory/1616-135-0x0000000000400000-0x0000000000DBD000-memory.dmp

      Filesize

      9.7MB

    • memory/1616-143-0x0000000000400000-0x0000000000DBD000-memory.dmp

      Filesize

      9.7MB

    • memory/1616-144-0x00000000029F0000-0x0000000002A0D000-memory.dmp

      Filesize

      116KB

    • memory/3292-142-0x00007FF4027D0000-0x00007FF4028CA000-memory.dmp

      Filesize

      1000KB

    • memory/3292-141-0x00000204B45A0000-0x00000204B45A7000-memory.dmp

      Filesize

      28KB

    • memory/3292-145-0x00007FF4027D0000-0x00007FF4028CA000-memory.dmp

      Filesize

      1000KB

    • memory/3292-146-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB