Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2022, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
aa5c23bffe92e7df946e1c59423bb1e5978043d0e7e38aeb4f7ae6924b9dc557.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa5c23bffe92e7df946e1c59423bb1e5978043d0e7e38aeb4f7ae6924b9dc557.exe
Resource
win10v2004-20220812-en
General
-
Target
aa5c23bffe92e7df946e1c59423bb1e5978043d0e7e38aeb4f7ae6924b9dc557.exe
-
Size
107KB
-
MD5
663d6f1455e3eeac90b58a208c3172f0
-
SHA1
b23639f4693e88d53d43c9869b06a3f39014ebd2
-
SHA256
aa5c23bffe92e7df946e1c59423bb1e5978043d0e7e38aeb4f7ae6924b9dc557
-
SHA512
d892d1935a373584e585f252147a5ad99d28909e8a9c8089096f1d3bb05890e9d8061be5a2ac7c9479000cfa7147f9bac31a041a1ed4d787cb02ba55b359dc52
-
SSDEEP
3072:IgXdZt9P6D3XJbC1PVTMF+LGT02bVcu+HZN+p5q:Ie344hio0fbVc5HZN+p5q
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000022e6b-133.dat acprotect behavioral2/files/0x0008000000022e6b-134.dat acprotect -
resource yara_rule behavioral2/files/0x0008000000022e6b-133.dat upx behavioral2/files/0x0008000000022e6b-134.dat upx behavioral2/memory/1576-135-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1576-136-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1576 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1576 2524 aa5c23bffe92e7df946e1c59423bb1e5978043d0e7e38aeb4f7ae6924b9dc557.exe 83 PID 2524 wrote to memory of 1576 2524 aa5c23bffe92e7df946e1c59423bb1e5978043d0e7e38aeb4f7ae6924b9dc557.exe 83 PID 2524 wrote to memory of 1576 2524 aa5c23bffe92e7df946e1c59423bb1e5978043d0e7e38aeb4f7ae6924b9dc557.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa5c23bffe92e7df946e1c59423bb1e5978043d0e7e38aeb4f7ae6924b9dc557.exe"C:\Users\Admin\AppData\Local\Temp\aa5c23bffe92e7df946e1c59423bb1e5978043d0e7e38aeb4f7ae6924b9dc557.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\miniloader.dll",Install C:\Users\Admin\AppData\Local\Temp\activate.dat2⤵
- Loads dropped DLL
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1576 -ip 15761⤵PID:4724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5a3fa5c73d9efda1ac7f9b70d08387e46
SHA1900af6dc41e846ce84e5e692b53f732aadcc074e
SHA256c30c903a0b7068ab021af249c762e56aff6778c85957b397892c1aa7bc6332b5
SHA512e1b6d46be75ce15ca46ee2740e39cdb1a292faf1c31b907f9a8c509e4207931b597ccc24cde9b0b56341cc69caba8da4e5ec1c6840c84097bd07c9af2cec6b5d
-
Filesize
76KB
MD5a3fa5c73d9efda1ac7f9b70d08387e46
SHA1900af6dc41e846ce84e5e692b53f732aadcc074e
SHA256c30c903a0b7068ab021af249c762e56aff6778c85957b397892c1aa7bc6332b5
SHA512e1b6d46be75ce15ca46ee2740e39cdb1a292faf1c31b907f9a8c509e4207931b597ccc24cde9b0b56341cc69caba8da4e5ec1c6840c84097bd07c9af2cec6b5d