Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2023, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
Jan-statement.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Jan-statement.exe
Resource
win10v2004-20220812-en
General
-
Target
Jan-statement.exe
-
Size
1.9MB
-
MD5
2a486fd49ea99742267a7c8aa86947a2
-
SHA1
967bd75a7d95db517ca8c5285adbc506295e50b1
-
SHA256
b0a22e9a9850fa4356f5603905f45645489ae04d60d630772b3b8227a21b1956
-
SHA512
56c8c15d1c9445f08320072cf440fa153488491d7a2643e220cfe3d6609f0ed0c652b3608a64c87ede71ebe55273f4d9991471445ffaa61820c50dd7acc617a2
-
SSDEEP
24576:GqTCf9W3TunNxmbBMhvEGt2Xfj0jlsmLK+NMixG7dRrLnJUxegZjWLNn0bqS9L+j:1Wf+ImlUvWLm2+NneLJUr6LN0bqS8e1S
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2816 created 2492 2816 Jan-statement.exe 57 -
Blocklisted process makes network request 1 IoCs
flow pid Process 27 4884 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2816 Jan-statement.exe 4884 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3696 ngentask.exe 3696 ngentask.exe 3696 ngentask.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2816 set thread context of 3696 2816 Jan-statement.exe 81 -
Program crash 3 IoCs
pid pid_target Process procid_target 1988 2816 WerFault.exe 75 3088 2816 WerFault.exe 75 316 4884 WerFault.exe 84 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 2816 Jan-statement.exe 4884 rundll32.exe 4884 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3696 2816 Jan-statement.exe 81 PID 2816 wrote to memory of 3696 2816 Jan-statement.exe 81 PID 2816 wrote to memory of 3696 2816 Jan-statement.exe 81 PID 2816 wrote to memory of 3696 2816 Jan-statement.exe 81 PID 2816 wrote to memory of 3696 2816 Jan-statement.exe 81 PID 2816 wrote to memory of 2196 2816 Jan-statement.exe 82 PID 2816 wrote to memory of 2196 2816 Jan-statement.exe 82 PID 2816 wrote to memory of 2196 2816 Jan-statement.exe 82 PID 2816 wrote to memory of 2196 2816 Jan-statement.exe 82 PID 3696 wrote to memory of 4884 3696 ngentask.exe 84 PID 3696 wrote to memory of 4884 3696 ngentask.exe 84 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2492
-
C:\Windows\SysWOW64\fontview.exe"C:\Windows\SYSWOW64\fontview.exe"2⤵PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\Jan-statement.exe"C:\Users\Admin\AppData\Local\Temp\Jan-statement.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\system32\rundll32.exe"C:\Users\Admin\AppData\Roaming\nsis_unse5720a7.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8GHuIwBvADgjAHQARf8AagBaADAAae5NAHoAQi0CWUiD|+wo6AQCAABI|4PEKMPMzMxM|4lEJBhIiVQkvxBIiUwkCF0BSP+LRCQwSIkEJPaBAThIbwAISMdE2yQQLQHrDoEBEEjXg8ABjwEQgQFASO05lgBzJZ8Diwwk|0gDyEiLwUiL9UyrAVR7AAPRSIt|yooJiAjrwWYFv2VIiwQlYPPwM||JSItQGEg70f90NkiDwiBIi|8CSDvCdCpmg|94SBh1GkyLQP9QZkGDOGt0B+4REUt1CBEQeBAu|3QFSIsA69VI64tI|QDBagBAU1X|VldBVEFVQVb7QVddAWaBOU1a|02L+EyL8kiL79kPhfzz8ExjSf88QYE8CVBFAO8AD4Xq8|BBi4T7CYjz8IXASI087wEPhNZqEYO8Cd2MLQEPhMfz8ESL|2cgRItfHIt3|yREi08YTAPh|0wD2UgD8TPJv0WFyQ+EpPPwTf+LxEGLEEUz0v9IA9OKAoTAdP8dQcHKDQ++wN76AAFEA9C|EXXs|0GB+qr8DXx0|w6DwQFJg8AE|0E7yXNp68aL|8EPtwxORYss|4tMA+t0WDPtvqoQdFFBixTBANP|M8mKAkyLwuu3D8HJyBEDyOUQAfdBigDVEO0zwDOf9kE7DLbgEKYAg||GAYP4CHLu6|8KSIvLQf|VSd+JBPeDxeQQxATfO28Ycq9mAUFf|0FeQV1BXF9e+11bMxdIgexgAf5kAIvp6Gb+||+|SIXAD4SYdSBM9Y2vAYsrEMgz|+j9m30gjV8ETI1F|0Yz0ovL|1Qk|WiAIEyL4A+Ea3p1IEWoEDPAi9ORIF9IiXwkIKYgcIAgP0iL8A+ES3UgpiD|UEiNVghEjUffQEiNjCSFEUiL79jofP1+II1WSGreIBDiIczz8Ohn7yA|RIsGjVcIQSCmIL1YyiGJhCSAhxLe9vPwiw7aIFiJjCTYcREHMJEg6DHvIIuc|i0yTItdOkiD+|tsSIogMEyJZCTvOEyLpBoyTIlcboQBhCTchxGGko0Ru41HSzCMJPDz8Enfi9To6fwFMIqc7ngySI2EeDJBgPN|IY1PbEQwGKQCf4PpAXXzgbx4Mv8hUmV4dU2LhLsk9CIxlCT4NQHC|0g72HI4g|psv3YzRI1JQPoAlKdBuACYAKYgQMoi+Od0GUS2MMAxSY1U+yRskSBJg+hs6N1rgjBIi86mIHhI|4X|dBKLVUJM|I4wGzFIjUwkQP8P10iBxHQhYSQtCC0B3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:4884 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4884 -s 3084⤵
- Program crash
PID:316
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 12562⤵
- Program crash
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 12762⤵
- Program crash
PID:3088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2816 -ip 28161⤵PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2816 -ip 28161⤵PID:4104
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 432 -p 4884 -ip 48841⤵PID:176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
442KB
MD5acf51213c2e0b564c28cf0db859c9e38
SHA10ec6d956dd0299a8d26bd4671af11c9c3fbe2ca0
SHA256643044a62d07c6725a73bce3ee702ad0c15f0fe332165821c5e7f73937f898b7
SHA51215f30f50afdc2838ebdc4f38199f9857c1b9bc43350588abed404dcaef039698a2533dd5c074d2bfc88448a578c2202c033073592a9c551f7a7e4d263e293eed
-
Filesize
57KB
MD5713062daba2534394662294035fd7e92
SHA140270752db5576f1d5e6c935f224754c7b6c3450
SHA256e6a5ca65acfd261d56f622f891bf04e6d41862ab505466374daeee8852a01b71
SHA512e07d9c38d43334cb8e35b32c12eef9ff1ddb7ffe0004ae0d56fe3fb24fbec6b179b631f61afc54b1d31ad02c619442c783a9d881cce86be833b39c59f236b2fd
-
Filesize
57KB
MD5713062daba2534394662294035fd7e92
SHA140270752db5576f1d5e6c935f224754c7b6c3450
SHA256e6a5ca65acfd261d56f622f891bf04e6d41862ab505466374daeee8852a01b71
SHA512e07d9c38d43334cb8e35b32c12eef9ff1ddb7ffe0004ae0d56fe3fb24fbec6b179b631f61afc54b1d31ad02c619442c783a9d881cce86be833b39c59f236b2fd