Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2023, 10:51

General

  • Target

    Jan-statement.exe

  • Size

    1.9MB

  • MD5

    2a486fd49ea99742267a7c8aa86947a2

  • SHA1

    967bd75a7d95db517ca8c5285adbc506295e50b1

  • SHA256

    b0a22e9a9850fa4356f5603905f45645489ae04d60d630772b3b8227a21b1956

  • SHA512

    56c8c15d1c9445f08320072cf440fa153488491d7a2643e220cfe3d6609f0ed0c652b3608a64c87ede71ebe55273f4d9991471445ffaa61820c50dd7acc617a2

  • SSDEEP

    24576:GqTCf9W3TunNxmbBMhvEGt2Xfj0jlsmLK+NMixG7dRrLnJUxegZjWLNn0bqS9L+j:1Wf+ImlUvWLm2+NneLJUr6LN0bqS8e1S

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:2492
      • C:\Windows\SysWOW64\fontview.exe
        "C:\Windows\SYSWOW64\fontview.exe"
        2⤵
          PID:2196
      • C:\Users\Admin\AppData\Local\Temp\Jan-statement.exe
        "C:\Users\Admin\AppData\Local\Temp\Jan-statement.exe"
        1⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
          2⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of WriteProcessMemory
          PID:3696
          • C:\Windows\system32\rundll32.exe
            "C:\Users\Admin\AppData\Roaming\nsis_unse5720a7.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8GHuIwBvADgjAHQARf8AagBaADAAae5NAHoAQi0CWUiD|+wo6AQCAABI|4PEKMPMzMxM|4lEJBhIiVQkvxBIiUwkCF0BSP+LRCQwSIkEJPaBAThIbwAISMdE2yQQLQHrDoEBEEjXg8ABjwEQgQFASO05lgBzJZ8Diwwk|0gDyEiLwUiL9UyrAVR7AAPRSIt|yooJiAjrwWYFv2VIiwQlYPPwM||JSItQGEg70f90NkiDwiBIi|8CSDvCdCpmg|94SBh1GkyLQP9QZkGDOGt0B+4REUt1CBEQeBAu|3QFSIsA69VI64tI|QDBagBAU1X|VldBVEFVQVb7QVddAWaBOU1a|02L+EyL8kiL79kPhfzz8ExjSf88QYE8CVBFAO8AD4Xq8|BBi4T7CYjz8IXASI087wEPhNZqEYO8Cd2MLQEPhMfz8ESL|2cgRItfHIt3|yREi08YTAPh|0wD2UgD8TPJv0WFyQ+EpPPwTf+LxEGLEEUz0v9IA9OKAoTAdP8dQcHKDQ++wN76AAFEA9C|EXXs|0GB+qr8DXx0|w6DwQFJg8AE|0E7yXNp68aL|8EPtwxORYss|4tMA+t0WDPtvqoQdFFBixTBANP|M8mKAkyLwuu3D8HJyBEDyOUQAfdBigDVEO0zwDOf9kE7DLbgEKYAg||GAYP4CHLu6|8KSIvLQf|VSd+JBPeDxeQQxATfO28Ycq9mAUFf|0FeQV1BXF9e+11bMxdIgexgAf5kAIvp6Gb+||+|SIXAD4SYdSBM9Y2vAYsrEMgz|+j9m30gjV8ETI1F|0Yz0ovL|1Qk|WiAIEyL4A+Ea3p1IEWoEDPAi9ORIF9IiXwkIKYgcIAgP0iL8A+ES3UgpiD|UEiNVghEjUffQEiNjCSFEUiL79jofP1+II1WSGreIBDiIczz8Ohn7yA|RIsGjVcIQSCmIL1YyiGJhCSAhxLe9vPwiw7aIFiJjCTYcREHMJEg6DHvIIuc|i0yTItdOkiD+|tsSIogMEyJZCTvOEyLpBoyTIlcboQBhCTchxGGko0Ru41HSzCMJPDz8Enfi9To6fwFMIqc7ngySI2EeDJBgPN|IY1PbEQwGKQCf4PpAXXzgbx4Mv8hUmV4dU2LhLsk9CIxlCT4NQHC|0g72HI4g|psv3YzRI1JQPoAlKdBuACYAKYgQMoi+Od0GUS2MMAxSY1U+yRskSBJg+hs6N1rgjBIi86mIHhI|4X|dBKLVUJM|I4wGzFIjUwkQP8P10iBxHQhYSQtCC0B
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Accesses Microsoft Outlook profiles
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • outlook_office_path
            • outlook_win_path
            PID:4884
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 4884 -s 308
              4⤵
              • Program crash
              PID:316
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 1256
          2⤵
          • Program crash
          PID:1988
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 1276
          2⤵
          • Program crash
          PID:3088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2816 -ip 2816
        1⤵
          PID:1160
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2816 -ip 2816
          1⤵
            PID:4104
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -pss -s 432 -p 4884 -ip 4884
            1⤵
              PID:176

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\240587843.dll

              Filesize

              442KB

              MD5

              acf51213c2e0b564c28cf0db859c9e38

              SHA1

              0ec6d956dd0299a8d26bd4671af11c9c3fbe2ca0

              SHA256

              643044a62d07c6725a73bce3ee702ad0c15f0fe332165821c5e7f73937f898b7

              SHA512

              15f30f50afdc2838ebdc4f38199f9857c1b9bc43350588abed404dcaef039698a2533dd5c074d2bfc88448a578c2202c033073592a9c551f7a7e4d263e293eed

            • C:\Users\Admin\AppData\Roaming\nsis_unse5720a7.dll

              Filesize

              57KB

              MD5

              713062daba2534394662294035fd7e92

              SHA1

              40270752db5576f1d5e6c935f224754c7b6c3450

              SHA256

              e6a5ca65acfd261d56f622f891bf04e6d41862ab505466374daeee8852a01b71

              SHA512

              e07d9c38d43334cb8e35b32c12eef9ff1ddb7ffe0004ae0d56fe3fb24fbec6b179b631f61afc54b1d31ad02c619442c783a9d881cce86be833b39c59f236b2fd

            • C:\Users\Admin\AppData\Roaming\nsis_unse5720a7.dll

              Filesize

              57KB

              MD5

              713062daba2534394662294035fd7e92

              SHA1

              40270752db5576f1d5e6c935f224754c7b6c3450

              SHA256

              e6a5ca65acfd261d56f622f891bf04e6d41862ab505466374daeee8852a01b71

              SHA512

              e07d9c38d43334cb8e35b32c12eef9ff1ddb7ffe0004ae0d56fe3fb24fbec6b179b631f61afc54b1d31ad02c619442c783a9d881cce86be833b39c59f236b2fd

            • memory/2196-147-0x0000000000805000-0x0000000000807000-memory.dmp

              Filesize

              8KB

            • memory/2196-143-0x00000000001A0000-0x00000000001D5000-memory.dmp

              Filesize

              212KB

            • memory/2196-152-0x00000000006C0000-0x00000000006DD000-memory.dmp

              Filesize

              116KB

            • memory/2196-151-0x00000000001A0000-0x00000000001D5000-memory.dmp

              Filesize

              212KB

            • memory/2196-145-0x00000000001A0000-0x00000000001D5000-memory.dmp

              Filesize

              212KB

            • memory/2816-133-0x000000000AE00000-0x000000000B0CD000-memory.dmp

              Filesize

              2.8MB

            • memory/2816-132-0x0000000002CF0000-0x0000000002E7F000-memory.dmp

              Filesize

              1.6MB

            • memory/2816-159-0x000000000AE00000-0x000000000B0CD000-memory.dmp

              Filesize

              2.8MB

            • memory/2816-158-0x0000000002CF0000-0x0000000002E7F000-memory.dmp

              Filesize

              1.6MB

            • memory/2816-134-0x000000000AE00000-0x000000000B0CD000-memory.dmp

              Filesize

              2.8MB

            • memory/3696-138-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3696-146-0x0000000002A40000-0x0000000002A5D000-memory.dmp

              Filesize

              116KB

            • memory/3696-136-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3696-140-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3696-142-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/3696-153-0x0000000002F70000-0x0000000003F70000-memory.dmp

              Filesize

              16.0MB

            • memory/3696-157-0x0000000002A40000-0x0000000002A5D000-memory.dmp

              Filesize

              116KB

            • memory/3696-156-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/4884-155-0x00007FF4C5110000-0x00007FF4C520A000-memory.dmp

              Filesize

              1000KB

            • memory/4884-154-0x000001F1001C0000-0x000001F1001C7000-memory.dmp

              Filesize

              28KB

            • memory/4884-160-0x00007FF4C5110000-0x00007FF4C520A000-memory.dmp

              Filesize

              1000KB

            • memory/4884-161-0x0000000010000000-0x0000000010013000-memory.dmp

              Filesize

              76KB