Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    957s
  • max time network
    960s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    06/01/2023, 16:13

General

  • Target

    SublimeText4.zip

  • Size

    8.7MB

  • MD5

    fec9ce0c54cf19606555b133dda68a70

  • SHA1

    e3c9e92454c454baf9c9bde9ad59f8080e7bbe0a

  • SHA256

    e2e202fda0ca462db8c71225a76c177dfb28a5da0fc8993de3ec5d9aae9f98b0

  • SHA512

    99bbd09937e7b2b4ff05dbf1f1480b587a5644025b35e07fff0ef3c48a6e7418bb1d4a10d9d9fb3f9870a98fe84f5da6871cfa186f8776094f94163d59e3f5a3

  • SSDEEP

    196608:xyIpHnwUY1kYg8qxPYUt7I/Re6C6Bm4qmFiPGRQpg5UkC:xpvK9n/mhmgPGRQyykC

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\SublimeText4.zip
    1⤵
      PID:4972
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1320
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap10154:82:7zEvent4475
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:4184
      • C:\Users\Admin\Desktop\SublimeSetup.exe
        "C:\Users\Admin\Desktop\SublimeSetup.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:4976
        • C:\Windows\system32\rundll32.exe
          "C:\Users\Admin\AppData\Roaming\nsis_unse593d7c.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8Da|AFYAdgB5QQBnvwBJAGgAMB8AMr8AMQBaAGstAln|SIPsKOgEAgD|AEiDxCjDzMz|zEyJRCQYSIn|VCQQSIlMJAj+XQFIi0QkMEiJ2wQkgQE4SG8ACEhvx0QkEC0B6w6BAV8QSIPAAY8BEIEBt0BIOZYAcyWfA4v|DCRIA8hIi8HXSItMqwFUewAD0f9Ii8qKCYgI6|3BZgVlSIsEJWD+8|AzyUiLUBhI|zvRdDZIg8Ig|0iLAkg7wnQq|2aDeEgYdRpM|4tAUGZBgzhru3QHERFLdQgREHj|EC50BUiLAOuv1UiLSP0AwWoAQP9TVVZXQVRBVe9BVkFXXQFmgTn|TVpNi|hMi|K|SIvZD4X88|BM|2NJPEGBPAlQv0UAAA+F6vPwQe+LhAmI8|CFwEi|jTwBD4TWahGDd7wJjC0BD4TH8|D|RItnIESLXxz|i3ckRItPGEz|A+FMA9lIA|H|M8lFhckPhKT+8|BNi8RBixBF|zPSSAPTigKE|8B0HUHByg0Pe77A+gABRAPQvxH|dexBgfqq|A3|fHQOg8EBSYP|wARBO8lzaev|xovBD7cMTkX|iyyLTAPrdFj7M+2qEHRRQYsU|sEA0zPJigJMi9|C6w|BycgRA8je5RABQYoA1RDtM3|AM|ZBOwy24BD+pgCDxgGD+Ahy|+7rCkiLy0H|f9VJiQT3g8XkEH|EBDtvGHKvZgH|QV9BXkFdQVzvX15dWzMXSIHs+2ABZACL6ehm|v|||0iFwA+EmNZ1IEyNrwGLKxDIM|f|6Jt9II1fBEz|jUVGM9KLy||3VCRogCBMi+AP64RrdSBFqBAzwIt905EgSIl8JCCmIP1wgCBIi|APhEv8dSCmIFBIjVYIRH+NR0BIjYwkhRG|SIvY6Hz9fiCNq1ZI3iAQ4iHM8|Do|WfvIESLBo1XCPRBIKYgWMohiYQkgNqHEt7z8IsO2iBYiWOMJHERBzCRIOgx7yD7i5wtMkyLXTpI74P7bEiKIDBMib9kJDhMi6QaMky7iVyEAYQk3IcRhu2SjRGNR0swjCTwfvPwSYvU6On8BTC7ipx4MkiNhHgyQf+A8yGNT2xEMP0YpAKD6QF184H9vHgyIVJleHVN74uEJPQiMZQk+P41AcJIO9hyOIP|+mx2M0SNSUCe+gCUQbgAmACmIECeyiL4dBlEtjDAMUnvjVQkbJEgSYPod2zoa4IwSIvOpiD|eEiF|3QSi1XzQkyOMBsxSI1MJD9A|9dIgcR0IWEkAC0ILQE=
          2⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Accesses Microsoft Outlook profiles
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • outlook_office_path
          • outlook_win_path
          PID:2088
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2088 -s 548
            3⤵
            • Program crash
            PID:1652
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 472 -p 2088 -ip 2088
        1⤵
          PID:2632

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\nsis_unse593d7c.dll

          Filesize

          57KB

          MD5

          713062daba2534394662294035fd7e92

          SHA1

          40270752db5576f1d5e6c935f224754c7b6c3450

          SHA256

          e6a5ca65acfd261d56f622f891bf04e6d41862ab505466374daeee8852a01b71

          SHA512

          e07d9c38d43334cb8e35b32c12eef9ff1ddb7ffe0004ae0d56fe3fb24fbec6b179b631f61afc54b1d31ad02c619442c783a9d881cce86be833b39c59f236b2fd

        • C:\Users\Admin\AppData\Roaming\nsis_unse593d7c.dll

          Filesize

          57KB

          MD5

          713062daba2534394662294035fd7e92

          SHA1

          40270752db5576f1d5e6c935f224754c7b6c3450

          SHA256

          e6a5ca65acfd261d56f622f891bf04e6d41862ab505466374daeee8852a01b71

          SHA512

          e07d9c38d43334cb8e35b32c12eef9ff1ddb7ffe0004ae0d56fe3fb24fbec6b179b631f61afc54b1d31ad02c619442c783a9d881cce86be833b39c59f236b2fd

        • C:\Users\Admin\Desktop\SublimeSetup.exe

          Filesize

          717.1MB

          MD5

          f9d24d508200a0f652ec68e0e782d4dc

          SHA1

          da3b896b26960f9c7de45b311eac311743d02e6c

          SHA256

          3a47750df80b6dbb548f26500bba98aaa4312caa083fbe941647b93f8ce050c2

          SHA512

          0803f1c1e81ffcef8a82c6a52755f4559f5acf856641d6ff9bcdc1860b4fb18a0a3da24c67f26332aa12d1e64007e49bbb10b4b94b0c9ea191ca4db15b3543ab

        • C:\Users\Admin\Desktop\SublimeSetup.exe

          Filesize

          717.1MB

          MD5

          f9d24d508200a0f652ec68e0e782d4dc

          SHA1

          da3b896b26960f9c7de45b311eac311743d02e6c

          SHA256

          3a47750df80b6dbb548f26500bba98aaa4312caa083fbe941647b93f8ce050c2

          SHA512

          0803f1c1e81ffcef8a82c6a52755f4559f5acf856641d6ff9bcdc1860b4fb18a0a3da24c67f26332aa12d1e64007e49bbb10b4b94b0c9ea191ca4db15b3543ab

        • C:\Users\Admin\desktop\Privacy Policу\cmds\cmds\system\keystroke.gt

          Filesize

          6KB

          MD5

          21ae03873b350256641799662580ade8

          SHA1

          514eefda0379921195e7ef78135e1516de1eb9ef

          SHA256

          8401ca19fbc5d0f99269ee14241c7882f1d61885402a4a4bc71c6665f7e5279a

          SHA512

          39198d9c128fc513553027b92d39c6693fc3f605c4c332ed1465ddbd42dc1cd009e17cc85c81a6ee5facf92a5421e96f03080ddb3fecf6b2151e46339a376889

        • C:\Users\Admin\desktop\Privacy Policу\cmds\libs\keyboard.g

          Filesize

          4KB

          MD5

          6c9e1d1d1be0501a75d0632cf9241b96

          SHA1

          95ac710f94620a26040fd9f4c83d03e626b0bccb

          SHA256

          0078883d04ac51f86316887c10919114cf84cad61fc2817e6b50db4a9722f8b8

          SHA512

          eb9059dd7cc8a2d307b2e06d4a15b5491edda185b5c6dbdd708567ee7a4d88ab8bff6a301a4bbe0c0e093a2266603d8d536abe6d304f68fe39b92400f889cafe

        • C:\Users\Admin\desktop\Privacy Policу\cmds\sources\keystroke.g

          Filesize

          5KB

          MD5

          dd3115f2908fe1b419a0aa12e51ef0b3

          SHA1

          772a98361aa87c63bbf393c121995a932887cbfd

          SHA256

          817e3e92ebf78dc10849246b0f8835496b30d85023d6ff305c385d85214964d2

          SHA512

          32ab286b598c516fc63b2133135b062a4c8375420ccba5b7dd31a9329e98a3a4f85581e011e5984e6d649d5b53d2c81d803797e79d2dad05054925f7fb28f4f1

        • memory/2088-144-0x00007FF424630000-0x00007FF42472A000-memory.dmp

          Filesize

          1000KB

        • memory/2088-151-0x0000000010000000-0x0000000010013000-memory.dmp

          Filesize

          76KB

        • memory/2088-150-0x00007FF424630000-0x00007FF42472A000-memory.dmp

          Filesize

          1000KB

        • memory/2088-143-0x000002DC5EB90000-0x000002DC5EB97000-memory.dmp

          Filesize

          28KB

        • memory/4976-137-0x00000000008A0000-0x00000000008BD000-memory.dmp

          Filesize

          116KB

        • memory/4976-145-0x0000000000630000-0x0000000000665000-memory.dmp

          Filesize

          212KB

        • memory/4976-146-0x00000000008A0000-0x00000000008BD000-memory.dmp

          Filesize

          116KB

        • memory/4976-142-0x00000000001C0000-0x00000000001FB000-memory.dmp

          Filesize

          236KB

        • memory/4976-141-0x000000000AAE0000-0x000000000BAE0000-memory.dmp

          Filesize

          16.0MB

        • memory/4976-136-0x00000000006F9000-0x00000000006FC000-memory.dmp

          Filesize

          12KB

        • memory/4976-135-0x0000000000630000-0x0000000000665000-memory.dmp

          Filesize

          212KB

        • memory/4976-134-0x00000000001C0000-0x00000000001FB000-memory.dmp

          Filesize

          236KB