Analysis
-
max time kernel
23s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 10:09
Behavioral task
behavioral1
Sample
7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe
Resource
win10v2004-20221111-en
General
-
Target
7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe
-
Size
356KB
-
MD5
031a25a6e4fcfcc6835f4df2ffba3dc9
-
SHA1
a28fe5dc28b7839bba8b61a5a3f2e56b531e26c3
-
SHA256
7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45
-
SHA512
2efbd650936045d8a88f7e061a349ed1d73f5213d689e190f377a4bc15b28ca5c3d35c6242841c5647f1da060f0ace8fe73be969d1a309999c842cb63b9b86c0
-
SSDEEP
6144:2OKlmpsf6bitr8fozSAVP9L99HptTo6rOeZtmWrzeXQw38546bNfjm:2gsf6MiyPZ99JVb1lz4Lsel
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Windows\SysWOW64\msiguj32.dll acprotect \Windows\SysWOW64\msiguj32.dll acprotect \Windows\SysWOW64\msiguj32.dll acprotect \Windows\SysWOW64\msiguj32.dll acprotect \Windows\SysWOW64\msiguj32.dll acprotect -
Processes:
resource yara_rule behavioral1/memory/1144-55-0x0000000000400000-0x000000000046B000-memory.dmp upx C:\Windows\SysWOW64\msiguj32.dll upx \Windows\SysWOW64\msiguj32.dll upx \Windows\SysWOW64\msiguj32.dll upx \Windows\SysWOW64\msiguj32.dll upx \Windows\SysWOW64\msiguj32.dll upx behavioral1/memory/268-67-0x0000000010000000-0x0000000010086000-memory.dmp upx behavioral1/memory/1144-68-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 268 rundll32.exe 268 rundll32.exe 268 rundll32.exe 268 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSIDLL = "C:\\Windows\\SysWOW64\\rundll32.exe msiguj32.dll,yXUhgqYyHIhf" 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
Processes:
7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exedescription ioc process File created C:\Windows\SysWOW64\msiguj32.dll 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe File opened for modification C:\Windows\SysWOW64\msiguj32.dll 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 460 1144 WerFault.exe 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exepid process 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exedescription pid process target process PID 1144 wrote to memory of 268 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe rundll32.exe PID 1144 wrote to memory of 268 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe rundll32.exe PID 1144 wrote to memory of 268 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe rundll32.exe PID 1144 wrote to memory of 268 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe rundll32.exe PID 1144 wrote to memory of 268 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe rundll32.exe PID 1144 wrote to memory of 268 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe rundll32.exe PID 1144 wrote to memory of 268 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe rundll32.exe PID 1144 wrote to memory of 460 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe WerFault.exe PID 1144 wrote to memory of 460 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe WerFault.exe PID 1144 wrote to memory of 460 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe WerFault.exe PID 1144 wrote to memory of 460 1144 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe WerFault.exe -
outlook_win_path 1 IoCs
Processes:
7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe"C:\Users\Admin\AppData\Local\Temp\7dc19e400d1784dfb646ac55ff012359d1501d06fa968306a7462c414ab2ce45.exe"1⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:1144 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe msiguj32.dll,yXUhgqYyHIhf2⤵
- Loads dropped DLL
PID:268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 3402⤵
- Program crash
PID:460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\msiguj32.dllFilesize
170KB
MD58548a43890cb576206edda8cf35e5cde
SHA17d8bb8fbb7a8c6bc02fceb18caca883850534961
SHA256ecd8ba00db780f2da2bf468317f636d78695c5609c3dd7e342c5d995c45beb66
SHA51223d664bced7f4df74a70787c1dd2c7274a4601fad0666685ed549435dbe6f8f31ccd5effbb1119bc59b244a138a731b6c10b5485a7044108e80b46755dd23adc
-
\Windows\SysWOW64\msiguj32.dllFilesize
170KB
MD58548a43890cb576206edda8cf35e5cde
SHA17d8bb8fbb7a8c6bc02fceb18caca883850534961
SHA256ecd8ba00db780f2da2bf468317f636d78695c5609c3dd7e342c5d995c45beb66
SHA51223d664bced7f4df74a70787c1dd2c7274a4601fad0666685ed549435dbe6f8f31ccd5effbb1119bc59b244a138a731b6c10b5485a7044108e80b46755dd23adc
-
\Windows\SysWOW64\msiguj32.dllFilesize
170KB
MD58548a43890cb576206edda8cf35e5cde
SHA17d8bb8fbb7a8c6bc02fceb18caca883850534961
SHA256ecd8ba00db780f2da2bf468317f636d78695c5609c3dd7e342c5d995c45beb66
SHA51223d664bced7f4df74a70787c1dd2c7274a4601fad0666685ed549435dbe6f8f31ccd5effbb1119bc59b244a138a731b6c10b5485a7044108e80b46755dd23adc
-
\Windows\SysWOW64\msiguj32.dllFilesize
170KB
MD58548a43890cb576206edda8cf35e5cde
SHA17d8bb8fbb7a8c6bc02fceb18caca883850534961
SHA256ecd8ba00db780f2da2bf468317f636d78695c5609c3dd7e342c5d995c45beb66
SHA51223d664bced7f4df74a70787c1dd2c7274a4601fad0666685ed549435dbe6f8f31ccd5effbb1119bc59b244a138a731b6c10b5485a7044108e80b46755dd23adc
-
\Windows\SysWOW64\msiguj32.dllFilesize
170KB
MD58548a43890cb576206edda8cf35e5cde
SHA17d8bb8fbb7a8c6bc02fceb18caca883850534961
SHA256ecd8ba00db780f2da2bf468317f636d78695c5609c3dd7e342c5d995c45beb66
SHA51223d664bced7f4df74a70787c1dd2c7274a4601fad0666685ed549435dbe6f8f31ccd5effbb1119bc59b244a138a731b6c10b5485a7044108e80b46755dd23adc
-
memory/268-58-0x0000000000000000-mapping.dmp
-
memory/268-67-0x0000000010000000-0x0000000010086000-memory.dmpFilesize
536KB
-
memory/460-65-0x0000000000000000-mapping.dmp
-
memory/1144-57-0x0000000002290000-0x0000000002316000-memory.dmpFilesize
536KB
-
memory/1144-56-0x0000000001B90000-0x0000000001BEA000-memory.dmpFilesize
360KB
-
memory/1144-55-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/1144-54-0x0000000075F01000-0x0000000075F03000-memory.dmpFilesize
8KB
-
memory/1144-66-0x0000000002290000-0x0000000002316000-memory.dmpFilesize
536KB
-
memory/1144-68-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/1144-69-0x0000000001B90000-0x0000000001BEA000-memory.dmpFilesize
360KB