Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
957s -
max time network
960s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-es -
resource tags
arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
06/01/2023, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
SublimeText4.zip
Resource
win10-20220901-es
Behavioral task
behavioral2
Sample
SublimeText4.zip
Resource
win7-20221111-es
Behavioral task
behavioral3
Sample
SublimeText4.zip
Resource
win10v2004-20221111-es
General
-
Target
SublimeText4.zip
-
Size
8.7MB
-
MD5
fec9ce0c54cf19606555b133dda68a70
-
SHA1
e3c9e92454c454baf9c9bde9ad59f8080e7bbe0a
-
SHA256
e2e202fda0ca462db8c71225a76c177dfb28a5da0fc8993de3ec5d9aae9f98b0
-
SHA512
99bbd09937e7b2b4ff05dbf1f1480b587a5644025b35e07fff0ef3c48a6e7418bb1d4a10d9d9fb3f9870a98fe84f5da6871cfa186f8776094f94163d59e3f5a3
-
SSDEEP
196608:xyIpHnwUY1kYg8qxPYUt7I/Re6C6Bm4qmFiPGRQpg5UkC:xpvK9n/mhmgPGRQyykC
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 42 2088 rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 4976 SublimeSetup.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4976 SublimeSetup.exe 4976 SublimeSetup.exe 4976 SublimeSetup.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1652 2088 WerFault.exe 97 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2088 rundll32.exe 2088 rundll32.exe 2088 rundll32.exe 2088 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4184 7zG.exe Token: 35 4184 7zG.exe Token: SeSecurityPrivilege 4184 7zG.exe Token: SeSecurityPrivilege 4184 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4184 7zG.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4976 wrote to memory of 2088 4976 SublimeSetup.exe 97 PID 4976 wrote to memory of 2088 4976 SublimeSetup.exe 97 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\SublimeText4.zip1⤵PID:4972
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1320
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap10154:82:7zEvent44751⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4184
-
C:\Users\Admin\Desktop\SublimeSetup.exe"C:\Users\Admin\Desktop\SublimeSetup.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\system32\rundll32.exe"C:\Users\Admin\AppData\Roaming\nsis_unse593d7c.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8Da|AFYAdgB5QQBnvwBJAGgAMB8AMr8AMQBaAGstAln|SIPsKOgEAgD|AEiDxCjDzMz|zEyJRCQYSIn|VCQQSIlMJAj+XQFIi0QkMEiJ2wQkgQE4SG8ACEhvx0QkEC0B6w6BAV8QSIPAAY8BEIEBt0BIOZYAcyWfA4v|DCRIA8hIi8HXSItMqwFUewAD0f9Ii8qKCYgI6|3BZgVlSIsEJWD+8|AzyUiLUBhI|zvRdDZIg8Ig|0iLAkg7wnQq|2aDeEgYdRpM|4tAUGZBgzhru3QHERFLdQgREHj|EC50BUiLAOuv1UiLSP0AwWoAQP9TVVZXQVRBVe9BVkFXXQFmgTn|TVpNi|hMi|K|SIvZD4X88|BM|2NJPEGBPAlQv0UAAA+F6vPwQe+LhAmI8|CFwEi|jTwBD4TWahGDd7wJjC0BD4TH8|D|RItnIESLXxz|i3ckRItPGEz|A+FMA9lIA|H|M8lFhckPhKT+8|BNi8RBixBF|zPSSAPTigKE|8B0HUHByg0Pe77A+gABRAPQvxH|dexBgfqq|A3|fHQOg8EBSYP|wARBO8lzaev|xovBD7cMTkX|iyyLTAPrdFj7M+2qEHRRQYsU|sEA0zPJigJMi9|C6w|BycgRA8je5RABQYoA1RDtM3|AM|ZBOwy24BD+pgCDxgGD+Ahy|+7rCkiLy0H|f9VJiQT3g8XkEH|EBDtvGHKvZgH|QV9BXkFdQVzvX15dWzMXSIHs+2ABZACL6ehm|v|||0iFwA+EmNZ1IEyNrwGLKxDIM|f|6Jt9II1fBEz|jUVGM9KLy||3VCRogCBMi+AP64RrdSBFqBAzwIt905EgSIl8JCCmIP1wgCBIi|APhEv8dSCmIFBIjVYIRH+NR0BIjYwkhRG|SIvY6Hz9fiCNq1ZI3iAQ4iHM8|Do|WfvIESLBo1XCPRBIKYgWMohiYQkgNqHEt7z8IsO2iBYiWOMJHERBzCRIOgx7yD7i5wtMkyLXTpI74P7bEiKIDBMib9kJDhMi6QaMky7iVyEAYQk3IcRhu2SjRGNR0swjCTwfvPwSYvU6On8BTC7ipx4MkiNhHgyQf+A8yGNT2xEMP0YpAKD6QF184H9vHgyIVJleHVN74uEJPQiMZQk+P41AcJIO9hyOIP|+mx2M0SNSUCe+gCUQbgAmACmIECeyiL4dBlEtjDAMUnvjVQkbJEgSYPod2zoa4IwSIvOpiD|eEiF|3QSi1XzQkyOMBsxSI1MJD9A|9dIgcR0IWEkAC0ILQE=2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:2088 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2088 -s 5483⤵
- Program crash
PID:1652
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 472 -p 2088 -ip 20881⤵PID:2632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5713062daba2534394662294035fd7e92
SHA140270752db5576f1d5e6c935f224754c7b6c3450
SHA256e6a5ca65acfd261d56f622f891bf04e6d41862ab505466374daeee8852a01b71
SHA512e07d9c38d43334cb8e35b32c12eef9ff1ddb7ffe0004ae0d56fe3fb24fbec6b179b631f61afc54b1d31ad02c619442c783a9d881cce86be833b39c59f236b2fd
-
Filesize
57KB
MD5713062daba2534394662294035fd7e92
SHA140270752db5576f1d5e6c935f224754c7b6c3450
SHA256e6a5ca65acfd261d56f622f891bf04e6d41862ab505466374daeee8852a01b71
SHA512e07d9c38d43334cb8e35b32c12eef9ff1ddb7ffe0004ae0d56fe3fb24fbec6b179b631f61afc54b1d31ad02c619442c783a9d881cce86be833b39c59f236b2fd
-
Filesize
717.1MB
MD5f9d24d508200a0f652ec68e0e782d4dc
SHA1da3b896b26960f9c7de45b311eac311743d02e6c
SHA2563a47750df80b6dbb548f26500bba98aaa4312caa083fbe941647b93f8ce050c2
SHA5120803f1c1e81ffcef8a82c6a52755f4559f5acf856641d6ff9bcdc1860b4fb18a0a3da24c67f26332aa12d1e64007e49bbb10b4b94b0c9ea191ca4db15b3543ab
-
Filesize
717.1MB
MD5f9d24d508200a0f652ec68e0e782d4dc
SHA1da3b896b26960f9c7de45b311eac311743d02e6c
SHA2563a47750df80b6dbb548f26500bba98aaa4312caa083fbe941647b93f8ce050c2
SHA5120803f1c1e81ffcef8a82c6a52755f4559f5acf856641d6ff9bcdc1860b4fb18a0a3da24c67f26332aa12d1e64007e49bbb10b4b94b0c9ea191ca4db15b3543ab
-
Filesize
6KB
MD521ae03873b350256641799662580ade8
SHA1514eefda0379921195e7ef78135e1516de1eb9ef
SHA2568401ca19fbc5d0f99269ee14241c7882f1d61885402a4a4bc71c6665f7e5279a
SHA51239198d9c128fc513553027b92d39c6693fc3f605c4c332ed1465ddbd42dc1cd009e17cc85c81a6ee5facf92a5421e96f03080ddb3fecf6b2151e46339a376889
-
Filesize
4KB
MD56c9e1d1d1be0501a75d0632cf9241b96
SHA195ac710f94620a26040fd9f4c83d03e626b0bccb
SHA2560078883d04ac51f86316887c10919114cf84cad61fc2817e6b50db4a9722f8b8
SHA512eb9059dd7cc8a2d307b2e06d4a15b5491edda185b5c6dbdd708567ee7a4d88ab8bff6a301a4bbe0c0e093a2266603d8d536abe6d304f68fe39b92400f889cafe
-
Filesize
5KB
MD5dd3115f2908fe1b419a0aa12e51ef0b3
SHA1772a98361aa87c63bbf393c121995a932887cbfd
SHA256817e3e92ebf78dc10849246b0f8835496b30d85023d6ff305c385d85214964d2
SHA51232ab286b598c516fc63b2133135b062a4c8375420ccba5b7dd31a9329e98a3a4f85581e011e5984e6d649d5b53d2c81d803797e79d2dad05054925f7fb28f4f1