Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 11:44
Behavioral task
behavioral1
Sample
facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe
Resource
win10v2004-20220901-en
General
-
Target
facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe
-
Size
352KB
-
MD5
76dea90bde59f852c5f8f77b870ddcfb
-
SHA1
12e6d649b58f583497965c12e6a9eefea477c72c
-
SHA256
facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4
-
SHA512
8c7704e0815f224fd4e70fbe680793052846c58291de73590b846c0cd8b6e2971cb8c00817644293cdd129752663918caaafd50dd339d13bc271173bd13b63b8
-
SSDEEP
6144:QLcWkuzmQXbpobHVyC1XEWB++tSXje5iTmDXQECEqIlXSK+XMVOJj:JuzwHVf6cae5iTt2lCK+X
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000f00000001e08c-137.dat acprotect behavioral2/files/0x000f00000001e08c-138.dat acprotect -
resource yara_rule behavioral2/memory/5060-132-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/5060-133-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/files/0x000f00000001e08c-137.dat upx behavioral2/files/0x000f00000001e08c-138.dat upx behavioral2/memory/3848-140-0x0000000010000000-0x0000000010085000-memory.dmp upx behavioral2/memory/5060-141-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 3848 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSIDLL = "C:\\Windows\\SysWOW64\\rundll32.exe msibqx32.dll,ssMdcLKWg" facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msibqx32.dll facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe File opened for modification C:\Windows\SysWOW64\msibqx32.dll facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4668 5060 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5060 facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe 5060 facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe 5060 facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe 5060 facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe 5060 facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe 5060 facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe 5060 facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe 5060 facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 3848 5060 facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe 86 PID 5060 wrote to memory of 3848 5060 facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe 86 PID 5060 wrote to memory of 3848 5060 facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe"C:\Users\Admin\AppData\Local\Temp\facde13e33a8f6485a42a53503d58913398d59b36a14f701c0bc26e8bdde4be4.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe msibqx32.dll,ssMdcLKWg2⤵
- Loads dropped DLL
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 6842⤵
- Program crash
PID:4668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5060 -ip 50601⤵PID:5068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD548518c28b28128f23428afac9d12d183
SHA1abc163c73811703d3cf0c24da22986131905ca34
SHA2562e1505794ad03265fa0a4c3ccb7a3dff7b3033cad9ed29297a98f7600b27cb8a
SHA512991a88ad034432c10e7668f37f48444d78d69c4cb8b1b17d16036771c4b8e0fa3dbb42c061dd5c2baa7f00a787a95bb793f2d92308061e49a2554c4a5294aab0
-
Filesize
169KB
MD548518c28b28128f23428afac9d12d183
SHA1abc163c73811703d3cf0c24da22986131905ca34
SHA2562e1505794ad03265fa0a4c3ccb7a3dff7b3033cad9ed29297a98f7600b27cb8a
SHA512991a88ad034432c10e7668f37f48444d78d69c4cb8b1b17d16036771c4b8e0fa3dbb42c061dd5c2baa7f00a787a95bb793f2d92308061e49a2554c4a5294aab0