Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/01/2023, 16:30

General

  • Target

    104c2f23de160113292fddaaaba2a94f34c6edffa89388f4fae8f1c7be221a41.exe

  • Size

    3.1MB

  • MD5

    269240c6291fa4cecb4324c56d9077cc

  • SHA1

    b58b373ef9b7c1561b1dcf66af59f61e5e690ac5

  • SHA256

    104c2f23de160113292fddaaaba2a94f34c6edffa89388f4fae8f1c7be221a41

  • SHA512

    0388547dddcf213eee3dbde8297af5c3a5ab40a3f51999ea2804185f8c69906683087e37974af2202a661f0a66d979414f53258b090183d1e2bdbae135be31af

  • SSDEEP

    49152:MU+AugP+M1a1i225oazT9LUg6lZOW4pxxqCsT72qLXNcYnyd/x45wHQhV6BGmAcj:MUxHTszceLGpx9s8fawHtzdrt

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 24 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\104c2f23de160113292fddaaaba2a94f34c6edffa89388f4fae8f1c7be221a41.exe
    "C:\Users\Admin\AppData\Local\Temp\104c2f23de160113292fddaaaba2a94f34c6edffa89388f4fae8f1c7be221a41.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Eorppuwwrieiyod.dll,start
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:1896
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23757
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:368
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:4024
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4340
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
            3⤵
              PID:2108
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
              3⤵
                PID:3416
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 400
              2⤵
              • Program crash
              PID:2708
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3144 -ip 3144
            1⤵
              PID:1904
            • C:\Windows\System32\rundll32.exe
              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
              1⤵
                PID:3212
              • C:\Windows\SysWOW64\svchost.exe
                C:\Windows\SysWOW64\svchost.exe -k LocalService
                1⤵
                  PID:4584
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\mozilla maintenance service\logs\turnoffnotificationintray.dll",pFNRN1Y=
                    2⤵
                      PID:3976

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\Mozilla Maintenance Service\logs\turnOffNotificationInTray.dll

                    Filesize

                    4.2MB

                    MD5

                    7cdbcf2c9899cc192496605481b79078

                    SHA1

                    a2b978acac377897141215f014fc9f351b6902c2

                    SHA256

                    c11ecd7d48f7104c264c4a0ce0987b4dae44668f1c38a80e7384942671b432a1

                    SHA512

                    fd41eff112b0d4cfa54a311fb3899857772d667a61cd601f9f70fbaa806cedf6bf2af2c4830b6b4025e6dd8171f7fef2daa2347ff3d920db1d867e9183f6ec8e

                  • C:\Program Files (x86)\Mozilla Maintenance Service\logs\turnOffNotificationInTray.dll

                    Filesize

                    4.2MB

                    MD5

                    7cdbcf2c9899cc192496605481b79078

                    SHA1

                    a2b978acac377897141215f014fc9f351b6902c2

                    SHA256

                    c11ecd7d48f7104c264c4a0ce0987b4dae44668f1c38a80e7384942671b432a1

                    SHA512

                    fd41eff112b0d4cfa54a311fb3899857772d667a61cd601f9f70fbaa806cedf6bf2af2c4830b6b4025e6dd8171f7fef2daa2347ff3d920db1d867e9183f6ec8e

                  • C:\Program Files (x86)\Mozilla Maintenance Service\logs\turnOffNotificationInTray.dll

                    Filesize

                    4.2MB

                    MD5

                    7cdbcf2c9899cc192496605481b79078

                    SHA1

                    a2b978acac377897141215f014fc9f351b6902c2

                    SHA256

                    c11ecd7d48f7104c264c4a0ce0987b4dae44668f1c38a80e7384942671b432a1

                    SHA512

                    fd41eff112b0d4cfa54a311fb3899857772d667a61cd601f9f70fbaa806cedf6bf2af2c4830b6b4025e6dd8171f7fef2daa2347ff3d920db1d867e9183f6ec8e

                  • C:\ProgramData\{06A035FC-7F90-C267-2C48-7AA277FEBDD4}\C2RManifest.proofing.msi.16.en-us.xml

                    Filesize

                    1KB

                    MD5

                    d23cf0da0462ecbb77509f23f26edc57

                    SHA1

                    b0a3353089a1c174a092e7a791d286bb28bb764c

                    SHA256

                    9fc823530ff0f81c7064fb67d0f6932ad735897a2f5479a8f1d298075b04817f

                    SHA512

                    a113d35757e4abebede230ca695b2163f44910bdca6253ad65d3649ab1cdaa16da966f01dc1c85d782ed775757915c130e39d6aa008ff5b926674ac353d23dff

                  • C:\ProgramData\{06A035FC-7F90-C267-2C48-7AA277FEBDD4}\CiST0000.000

                    Filesize

                    240B

                    MD5

                    b43f2c5970d4fb9779455936e782e07d

                    SHA1

                    94ac8227f935e94c939538acbbbc61c07307bc2e

                    SHA256

                    745e92ec1673e2ce855b5b19e1d6317434386df46970f885675acedae9b631b5

                    SHA512

                    77a6f673ad4a4d873b1433f456363f787e96acc79e356a82471a402a3a5f2a0a9fcef0ad7153c717a3be6e985b17eb8f3877b63070a3d76697e6b3564ed50c33

                  • C:\ProgramData\{06A035FC-7F90-C267-2C48-7AA277FEBDD4}\DeploymentConfiguration.xml

                    Filesize

                    614B

                    MD5

                    54cec4437128f703c259efb3dc734386

                    SHA1

                    9b15ebe33a771a7e12cd966fd8b583da06914015

                    SHA256

                    d44d8ffc6e0261e32c4b5c77573a0daa0b4066d4e160c2cd5b5728199f63dfb4

                    SHA512

                    c1793acc8f6dc9997fd0261d501ffed200f3c039c9b77e554a031262925878b56727bd84cf5fbeeccb481c1d4511f37e940a8f8436054c8f08adb8e5f46773ea

                  • C:\ProgramData\{06A035FC-7F90-C267-2C48-7AA277FEBDD4}\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe.xml

                    Filesize

                    9KB

                    MD5

                    996f11041df0526341cebbbd40a98390

                    SHA1

                    37f652515ef8c662840086d743f7f68d327cce52

                    SHA256

                    bb39de067132d2ccbb7a3c066743010f070a3c3856f42ccc892da0b40012771e

                    SHA512

                    6cafa4b3bd8c56d20859a4f8fb7109e3ca4c690d0746b13f9f2eaa19d88bfca469dc45d71fb91f5658f9cd300f285aafb9e212ebd7c1496aadb6046da4e56c03

                  • C:\ProgramData\{06A035FC-7F90-C267-2C48-7AA277FEBDD4}\Peaosueatessepu.tmp

                    Filesize

                    3.5MB

                    MD5

                    7a32bb6c9803a1d93f2616b6fa1c2e31

                    SHA1

                    61555fff00be55763ddd6b821de089408785ff13

                    SHA256

                    1e8f45031d088427133416f65bbfb1672151c565faeffb471e178d40368cae81

                    SHA512

                    6476ef4a0578381cb987104058980b3277d236cc4e9701f6b76803da3baa17a1d72271fd279a14923fe05fa62381a8b2d188efe4e825404d4da536ab8014bf54

                  • C:\ProgramData\{06A035FC-7F90-C267-2C48-7AA277FEBDD4}\Peaosueatessepu.tmp

                    Filesize

                    3.5MB

                    MD5

                    7a32bb6c9803a1d93f2616b6fa1c2e31

                    SHA1

                    61555fff00be55763ddd6b821de089408785ff13

                    SHA256

                    1e8f45031d088427133416f65bbfb1672151c565faeffb471e178d40368cae81

                    SHA512

                    6476ef4a0578381cb987104058980b3277d236cc4e9701f6b76803da3baa17a1d72271fd279a14923fe05fa62381a8b2d188efe4e825404d4da536ab8014bf54

                  • C:\Users\Admin\AppData\Local\Temp\Eorppuwwrieiyod.dll

                    Filesize

                    4.2MB

                    MD5

                    d6acb76b0bf89a5ea31e92c2c5e2983c

                    SHA1

                    222178d1744aa9a7fa95db7c09a853edd5539033

                    SHA256

                    67d89d5ff5a280878fdca1e0e619d247c7559f446b9fa5e9fd0362c76f362318

                    SHA512

                    197a4836b7547497efffcb3881b64d8d4f24d3085132409ce7d86965274f02509adcf74f38624e4c8e7b4ec5208993abce9cfe813bf05f490d8213aea838dcc3

                  • C:\Users\Admin\AppData\Local\Temp\Eorppuwwrieiyod.dll

                    Filesize

                    4.2MB

                    MD5

                    d6acb76b0bf89a5ea31e92c2c5e2983c

                    SHA1

                    222178d1744aa9a7fa95db7c09a853edd5539033

                    SHA256

                    67d89d5ff5a280878fdca1e0e619d247c7559f446b9fa5e9fd0362c76f362318

                    SHA512

                    197a4836b7547497efffcb3881b64d8d4f24d3085132409ce7d86965274f02509adcf74f38624e4c8e7b4ec5208993abce9cfe813bf05f490d8213aea838dcc3

                  • C:\Users\Admin\AppData\Local\Temp\Eorppuwwrieiyod.dll

                    Filesize

                    4.2MB

                    MD5

                    d6acb76b0bf89a5ea31e92c2c5e2983c

                    SHA1

                    222178d1744aa9a7fa95db7c09a853edd5539033

                    SHA256

                    67d89d5ff5a280878fdca1e0e619d247c7559f446b9fa5e9fd0362c76f362318

                    SHA512

                    197a4836b7547497efffcb3881b64d8d4f24d3085132409ce7d86965274f02509adcf74f38624e4c8e7b4ec5208993abce9cfe813bf05f490d8213aea838dcc3

                  • \??\c:\program files (x86)\mozilla maintenance service\logs\turnoffnotificationintray.dll

                    Filesize

                    4.2MB

                    MD5

                    7cdbcf2c9899cc192496605481b79078

                    SHA1

                    a2b978acac377897141215f014fc9f351b6902c2

                    SHA256

                    c11ecd7d48f7104c264c4a0ce0987b4dae44668f1c38a80e7384942671b432a1

                    SHA512

                    fd41eff112b0d4cfa54a311fb3899857772d667a61cd601f9f70fbaa806cedf6bf2af2c4830b6b4025e6dd8171f7fef2daa2347ff3d920db1d867e9183f6ec8e

                  • memory/368-154-0x000001CDBB200000-0x000001CDBB4A3000-memory.dmp

                    Filesize

                    2.6MB

                  • memory/368-151-0x000001CDBCAC0000-0x000001CDBCC00000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/368-153-0x000001CDBCAC0000-0x000001CDBCC00000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/368-152-0x0000000000CE0000-0x0000000000F71000-memory.dmp

                    Filesize

                    2.6MB

                  • memory/1896-143-0x0000000004140000-0x0000000004C91000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/1896-144-0x0000000004D60000-0x0000000004EA0000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/1896-148-0x0000000004D60000-0x0000000004EA0000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/1896-147-0x0000000004D60000-0x0000000004EA0000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/1896-146-0x0000000004D60000-0x0000000004EA0000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/1896-155-0x0000000004140000-0x0000000004C91000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/1896-149-0x0000000004D60000-0x0000000004EA0000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/1896-139-0x0000000002ED0000-0x000000000330C000-memory.dmp

                    Filesize

                    4.2MB

                  • memory/1896-145-0x0000000004D60000-0x0000000004EA0000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/1896-141-0x0000000004140000-0x0000000004C91000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/1896-142-0x0000000004140000-0x0000000004C91000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/3144-132-0x0000000004CD7000-0x0000000004FD7000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/3144-140-0x0000000000400000-0x0000000002E81000-memory.dmp

                    Filesize

                    42.5MB

                  • memory/3144-133-0x0000000004FE0000-0x000000000539C000-memory.dmp

                    Filesize

                    3.7MB

                  • memory/3144-134-0x0000000000400000-0x0000000002E81000-memory.dmp

                    Filesize

                    42.5MB

                  • memory/3976-172-0x0000000002960000-0x0000000002D9C000-memory.dmp

                    Filesize

                    4.2MB

                  • memory/3976-174-0x00000000035C0000-0x0000000004111000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/3976-176-0x00000000035C0000-0x0000000004111000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/3976-175-0x00000000035C0000-0x0000000004111000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/4584-167-0x00000000020C0000-0x0000000002C11000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/4584-166-0x00000000020C0000-0x0000000002C11000-memory.dmp

                    Filesize

                    11.3MB