Analysis
-
max time kernel
74s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 10:00
Behavioral task
behavioral1
Sample
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe
Resource
win10v2004-20221111-en
General
-
Target
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe
-
Size
362KB
-
MD5
d77fa14d6295188b4af7954b3c8f1a38
-
SHA1
7acef1bd3b324546c91862eb5f54773d1d28df20
-
SHA256
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28
-
SHA512
f016d54979979d2ff649764e57c6b048cf3fc690cc1aa0b743c1be985f58b4705636b67487c8fb5bee48251a459cc33ffd478a434e3668e0e86cb7a0fabef184
-
SSDEEP
6144:x7/8yCh1wTvyk4vr4RNvKaJlllbXXPyCO8E7ih/kN5CtH9k8ryIV5G8Cb++1tdv:x77BTjCMRZfJlXf/O8mIICtH7HCb+6tt
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Windows\SysWOW64\msidrz32.dll acprotect \Windows\SysWOW64\msidrz32.dll acprotect \Windows\SysWOW64\msidrz32.dll acprotect \Windows\SysWOW64\msidrz32.dll acprotect C:\Windows\SysWOW64\msidrz32.dll acprotect -
Processes:
resource yara_rule behavioral1/memory/1632-55-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1632-59-0x0000000000400000-0x000000000046C000-memory.dmp upx \Windows\SysWOW64\msidrz32.dll upx \Windows\SysWOW64\msidrz32.dll upx \Windows\SysWOW64\msidrz32.dll upx \Windows\SysWOW64\msidrz32.dll upx C:\Windows\SysWOW64\msidrz32.dll upx behavioral1/memory/1356-70-0x0000000010000000-0x0000000010088000-memory.dmp upx -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 1356 rundll32.exe 1356 rundll32.exe 1356 rundll32.exe 1356 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSIDLL = "C:\\Windows\\SysWOW64\\rundll32.exe msidrz32.dll,XzXRQcUSq" 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
Processes:
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exedescription ioc process File created C:\Windows\SysWOW64\msidrz32.dll 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe File opened for modification C:\Windows\SysWOW64\msidrz32.dll 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 604 1632 WerFault.exe 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exepid process 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exedescription pid process target process PID 1632 wrote to memory of 1356 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe rundll32.exe PID 1632 wrote to memory of 1356 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe rundll32.exe PID 1632 wrote to memory of 1356 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe rundll32.exe PID 1632 wrote to memory of 1356 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe rundll32.exe PID 1632 wrote to memory of 1356 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe rundll32.exe PID 1632 wrote to memory of 1356 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe rundll32.exe PID 1632 wrote to memory of 1356 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe rundll32.exe PID 1632 wrote to memory of 604 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe WerFault.exe PID 1632 wrote to memory of 604 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe WerFault.exe PID 1632 wrote to memory of 604 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe WerFault.exe PID 1632 wrote to memory of 604 1632 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe WerFault.exe -
outlook_win_path 1 IoCs
Processes:
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe"C:\Users\Admin\AppData\Local\Temp\5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe"1⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_win_path
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe msidrz32.dll,XzXRQcUSq2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 3402⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\msidrz32.dllFilesize
174KB
MD5e8f30e1c5099edd4ee2d24cad67c333c
SHA1bcd3f120cb6d99ef27e7bcc8822ca3d9b40faa4b
SHA256cbfb7f70b2442f72d4172f349d0d92686dd864e223438e2331f3741a796852f7
SHA512883d6a71a2c7dd48b6fc1f54198666678e0b4ed2a3d77109bdad06491faa16635d0d7452f62f8c69a4d309fabed61e4acad9cdfd315440cb2f70925ff7d0b4f1
-
\Windows\SysWOW64\msidrz32.dllFilesize
174KB
MD5e8f30e1c5099edd4ee2d24cad67c333c
SHA1bcd3f120cb6d99ef27e7bcc8822ca3d9b40faa4b
SHA256cbfb7f70b2442f72d4172f349d0d92686dd864e223438e2331f3741a796852f7
SHA512883d6a71a2c7dd48b6fc1f54198666678e0b4ed2a3d77109bdad06491faa16635d0d7452f62f8c69a4d309fabed61e4acad9cdfd315440cb2f70925ff7d0b4f1
-
\Windows\SysWOW64\msidrz32.dllFilesize
174KB
MD5e8f30e1c5099edd4ee2d24cad67c333c
SHA1bcd3f120cb6d99ef27e7bcc8822ca3d9b40faa4b
SHA256cbfb7f70b2442f72d4172f349d0d92686dd864e223438e2331f3741a796852f7
SHA512883d6a71a2c7dd48b6fc1f54198666678e0b4ed2a3d77109bdad06491faa16635d0d7452f62f8c69a4d309fabed61e4acad9cdfd315440cb2f70925ff7d0b4f1
-
\Windows\SysWOW64\msidrz32.dllFilesize
174KB
MD5e8f30e1c5099edd4ee2d24cad67c333c
SHA1bcd3f120cb6d99ef27e7bcc8822ca3d9b40faa4b
SHA256cbfb7f70b2442f72d4172f349d0d92686dd864e223438e2331f3741a796852f7
SHA512883d6a71a2c7dd48b6fc1f54198666678e0b4ed2a3d77109bdad06491faa16635d0d7452f62f8c69a4d309fabed61e4acad9cdfd315440cb2f70925ff7d0b4f1
-
\Windows\SysWOW64\msidrz32.dllFilesize
174KB
MD5e8f30e1c5099edd4ee2d24cad67c333c
SHA1bcd3f120cb6d99ef27e7bcc8822ca3d9b40faa4b
SHA256cbfb7f70b2442f72d4172f349d0d92686dd864e223438e2331f3741a796852f7
SHA512883d6a71a2c7dd48b6fc1f54198666678e0b4ed2a3d77109bdad06491faa16635d0d7452f62f8c69a4d309fabed61e4acad9cdfd315440cb2f70925ff7d0b4f1
-
memory/604-64-0x0000000000000000-mapping.dmp
-
memory/1356-70-0x0000000010000000-0x0000000010088000-memory.dmpFilesize
544KB
-
memory/1356-60-0x0000000000000000-mapping.dmp
-
memory/1632-58-0x00000000022D0000-0x0000000002358000-memory.dmpFilesize
544KB
-
memory/1632-63-0x00000000022D0000-0x0000000002358000-memory.dmpFilesize
544KB
-
memory/1632-62-0x00000000002C0000-0x000000000031A000-memory.dmpFilesize
360KB
-
memory/1632-59-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/1632-54-0x00000000757B1000-0x00000000757B3000-memory.dmpFilesize
8KB
-
memory/1632-57-0x00000000022D0000-0x0000000002358000-memory.dmpFilesize
544KB
-
memory/1632-56-0x00000000002C0000-0x000000000031A000-memory.dmpFilesize
360KB
-
memory/1632-55-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB