Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 02:21 UTC
Behavioral task
behavioral1
Sample
8a9cacd789a6b530c5aefa0a3f5a5952.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8a9cacd789a6b530c5aefa0a3f5a5952.exe
Resource
win10v2004-20231215-en
General
-
Target
8a9cacd789a6b530c5aefa0a3f5a5952.exe
-
Size
4.3MB
-
MD5
8a9cacd789a6b530c5aefa0a3f5a5952
-
SHA1
18c2d69de57fbd554d5a8e59d8a9c229afc8cadc
-
SHA256
bbc0d94f0cdd9711f992b83ef5ad8ced87605b2ede666db7536ea6ce34c192a3
-
SHA512
022a776f5a6bde4dc799ec0b1cc152eab2b31f86b2bc6036528a57c850a3b69f670a85efb0368b9bdf06daf55490205fb10885082cef3ff53330dde3817eff42
-
SSDEEP
98304:By3taq6A+5u9oVa6TuVBkiF+LPJ5WRIwGhvSbTTN4uMi2Gsc:c3taVzE6s6uBzbIw8UBMi6
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00060000000231f3-13.dat acprotect behavioral2/files/0x00060000000231eb-17.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 4936 8a9cacd789a6b530c5aefa0a3f5a5952.exe 4936 8a9cacd789a6b530c5aefa0a3f5a5952.exe -
resource yara_rule behavioral2/files/0x00060000000231f3-13.dat upx behavioral2/memory/4936-15-0x0000000075590000-0x0000000075841000-memory.dmp upx behavioral2/files/0x00060000000231eb-17.dat upx behavioral2/memory/4936-18-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/4936-19-0x0000000075590000-0x0000000075841000-memory.dmp upx behavioral2/memory/4936-21-0x0000000075590000-0x0000000075841000-memory.dmp upx behavioral2/memory/4936-22-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2944 wrote to memory of 4936 2944 8a9cacd789a6b530c5aefa0a3f5a5952.exe 85 PID 2944 wrote to memory of 4936 2944 8a9cacd789a6b530c5aefa0a3f5a5952.exe 85 PID 2944 wrote to memory of 4936 2944 8a9cacd789a6b530c5aefa0a3f5a5952.exe 85 PID 4936 wrote to memory of 1404 4936 8a9cacd789a6b530c5aefa0a3f5a5952.exe 86 PID 4936 wrote to memory of 1404 4936 8a9cacd789a6b530c5aefa0a3f5a5952.exe 86 PID 4936 wrote to memory of 1404 4936 8a9cacd789a6b530c5aefa0a3f5a5952.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a9cacd789a6b530c5aefa0a3f5a5952.exe"C:\Users\Admin\AppData\Local\Temp\8a9cacd789a6b530c5aefa0a3f5a5952.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\8a9cacd789a6b530c5aefa0a3f5a5952.exe"C:\Users\Admin\AppData\Local\Temp\8a9cacd789a6b530c5aefa0a3f5a5952.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls && title BlackBong Software 2016-20183⤵PID:1404
-
-
Network
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request194.178.17.96.in-addr.arpaIN PTRResponse194.178.17.96.in-addr.arpaIN PTRa96-17-178-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request180.178.17.96.in-addr.arpaIN PTRResponse180.178.17.96.in-addr.arpaIN PTRa96-17-178-180deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request34.197.79.40.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
194.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.160.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
180.178.17.96.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
34.197.79.40.in-addr.arpa
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5c5f603fae071c883cf8ca1400855b713
SHA1fc6fab3bee6aa33354f1dedcb12c207fa42bbc64
SHA256e44e6dd3cbff07038853d694f960d60c3b60e89389217319ffd176a28e16b086
SHA5123a8c3a0c7c8c608d12434d6b4eef6cf63cfce039b4d074c90f71a9b2d19a7c0cd983fa0c72ccbd4d1e9b5f21dd7e1dc7e9433d2937dfc592365e1bd73356489e
-
Filesize
1008B
MD5ad0ec8ca74f71a81b29b4dfa20e30bec
SHA1af5cf20cc503e27cdbceabe0d96591e5840f0e4c
SHA256ce2ef99323bafb9a10a82b643fbed8930bb054ea9d5b06356b9b08c262154b48
SHA512da46bfc845e3d9354de8d7fa10ad204257fa985e4c4ce01ccc96dfeb14c9de536f31fb1f1ee07baa054a27cf638033f0e6fb5c11c25f98a522fb9dac22033de2
-
Filesize
879KB
MD54953718d73246486612d952e00b2deb9
SHA1c87098ffe58ba2f5c24c9653ea9599da1a65e663
SHA256ec4d398a61fe2ecb956342f5e2845fd811b436c601f9416ba307592a530c8f70
SHA512afd60f911b09ba17e0e458b73293499730e7ff87c204ed23a650bcc04a0773d106256e855ec31996735850b15416e6fa64bf16c08a20cb97ce860f6e915a5e6c