Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 04:35
Behavioral task
behavioral1
Sample
9cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef.dll
Resource
win10v2004-20220901-en
General
-
Target
9cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef.dll
-
Size
30KB
-
MD5
613bd35c954253f726fe9687d137ca70
-
SHA1
e3cdd6c6eaf684505223d38c74c635379c0ff031
-
SHA256
9cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef
-
SHA512
9d96aa7fd77f69c3340a7d7a6d8a409e9d7707655d53f739f699e6b0b84501b014f75de210ab6834aa36034eb7d1f20f048210e2a526898bdf565ab64e48dda2
-
SSDEEP
768:gogYVYCjnn15hc21l7Ivg+SboVUnbcuyD7Us:gwOgOI9Rnouy8
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000022ddb-134.dat acprotect behavioral2/files/0x0007000000022ddb-136.dat acprotect behavioral2/files/0x0007000000022ddb-135.dat acprotect -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\msflxgrd\Parameters\ServiceDll = "C:\\Windows\\system32\\msflxgrd.ocx.dll" rundll32.exe -
resource yara_rule behavioral2/memory/2604-133-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/files/0x0007000000022ddb-134.dat upx behavioral2/files/0x0007000000022ddb-136.dat upx behavioral2/files/0x0007000000022ddb-135.dat upx behavioral2/memory/4208-137-0x0000000000AC0000-0x0000000000ADB000-memory.dmp upx behavioral2/memory/2604-138-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 4208 svchost.exe 4208 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msflxgrd.ocx.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\msflxgrd.ocx.dll rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2604 2680 rundll32.exe 76 PID 2680 wrote to memory of 2604 2680 rundll32.exe 76 PID 2680 wrote to memory of 2604 2680 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef.dll,#12⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
PID:2604
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:4208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5613bd35c954253f726fe9687d137ca70
SHA1e3cdd6c6eaf684505223d38c74c635379c0ff031
SHA2569cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef
SHA5129d96aa7fd77f69c3340a7d7a6d8a409e9d7707655d53f739f699e6b0b84501b014f75de210ab6834aa36034eb7d1f20f048210e2a526898bdf565ab64e48dda2
-
Filesize
30KB
MD5613bd35c954253f726fe9687d137ca70
SHA1e3cdd6c6eaf684505223d38c74c635379c0ff031
SHA2569cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef
SHA5129d96aa7fd77f69c3340a7d7a6d8a409e9d7707655d53f739f699e6b0b84501b014f75de210ab6834aa36034eb7d1f20f048210e2a526898bdf565ab64e48dda2
-
Filesize
30KB
MD5613bd35c954253f726fe9687d137ca70
SHA1e3cdd6c6eaf684505223d38c74c635379c0ff031
SHA2569cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef
SHA5129d96aa7fd77f69c3340a7d7a6d8a409e9d7707655d53f739f699e6b0b84501b014f75de210ab6834aa36034eb7d1f20f048210e2a526898bdf565ab64e48dda2