Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
Megpoid_sweet/Megpoid_sweet.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Megpoid_sweet/Megpoid_sweet.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Megpoid_sweet/setup.bin
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Megpoid_sweet/setup.bin
Resource
win10v2004-20240709-en
General
-
Target
Megpoid_sweet/Megpoid_sweet.exe
-
Size
5.0MB
-
MD5
e7c475266cc53cde788b5bfd5eade9dd
-
SHA1
caff489650833e6bcb5173a3db9f61e5a046b85e
-
SHA256
6dfbc11d8209b76c3556333f9476672d1b63cc8626ae28b03042969c9e2d4fe7
-
SHA512
7d2de3da52e04dbc4f37aa4a4f1f7cca99d0a1ab3a6ea0ff957686b157c1dd92ac229228ba487155044c00b0249ed7263a5c65b23a43828a5b5d7488562429e9
-
SSDEEP
98304:PkSuxagH7OD8a8a6kHkEDLmYD1dmr4kAoVjna5fAt+YzW45IzXWX9h8pR4too9:fgHCD8NCkVYxdmMkAoVjnsC+YS/XWz3r
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000234e9-34.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2604 Megpoid_sweet.tmp -
Loads dropped DLL 6 IoCs
pid Process 2604 Megpoid_sweet.tmp 2604 Megpoid_sweet.tmp 2604 Megpoid_sweet.tmp 2604 Megpoid_sweet.tmp 2604 Megpoid_sweet.tmp 2604 Megpoid_sweet.tmp -
resource yara_rule behavioral2/files/0x00070000000234e9-34.dat upx behavioral2/memory/2604-38-0x00000000068C0000-0x00000000068F1000-memory.dmp upx behavioral2/memory/2604-37-0x00000000068C0000-0x00000000068F1000-memory.dmp upx behavioral2/memory/2604-49-0x00000000068C0000-0x00000000068F1000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\VoiceDB\Megpoid_sweet\BCCDC6XZLSZHZCB4 Megpoid_sweet.tmp File created C:\Program Files (x86)\VoiceDB\Megpoid_sweet\BCCDC6XZLSZHZCB4\Megpoid_Sweet.vvd Megpoid_sweet.tmp File opened for modification C:\Program Files (x86)\VoiceDB\Megpoid_sweet\BCCDC6XZLSZHZCB4\Megpoid_Sweet.vvd Megpoid_sweet.tmp File opened for modification C:\Program Files (x86)\VoiceDB\unins000.dat Megpoid_sweet.tmp File created C:\Program Files (x86)\VoiceDB\is-K6UGR.tmp Megpoid_sweet.tmp File opened for modification C:\Program Files (x86)\VoiceDB\Megpoid_sweet Megpoid_sweet.tmp File created C:\Program Files (x86)\VoiceDB\Megpoid_sweet\BCCDC6XZLSZHZCB4\Megpoid_Sweet.ddb Megpoid_sweet.tmp File opened for modification C:\Program Files (x86)\VoiceDB\Megpoid_sweet\BCCDC6XZLSZHZCB4\Megpoid_Sweet.ddb Megpoid_sweet.tmp File created C:\Program Files (x86)\VoiceDB\Megpoid_sweet\BCCDC6XZLSZHZCB4\Megpoid_Sweet.ddi Megpoid_sweet.tmp File opened for modification C:\Program Files (x86)\VoiceDB\Megpoid_sweet\BCCDC6XZLSZHZCB4\Megpoid_Sweet.ddi Megpoid_sweet.tmp File created C:\Program Files (x86)\VoiceDB\unins000.dat Megpoid_sweet.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2604 Megpoid_sweet.tmp -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3636 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3636 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 Megpoid_sweet.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 2604 216 Megpoid_sweet.exe 85 PID 216 wrote to memory of 2604 216 Megpoid_sweet.exe 85 PID 216 wrote to memory of 2604 216 Megpoid_sweet.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Megpoid_sweet\Megpoid_sweet.exe"C:\Users\Admin\AppData\Local\Temp\Megpoid_sweet\Megpoid_sweet.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\is-A75M6.tmp\Megpoid_sweet.tmp"C:\Users\Admin\AppData\Local\Temp\is-A75M6.tmp\Megpoid_sweet.tmp" /SL5="$A0222,4854253,60928,C:\Users\Admin\AppData\Local\Temp\Megpoid_sweet\Megpoid_sweet.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2604
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x4641⤵
- Suspicious use of AdjustPrivilegeToken
PID:3636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694KB
MD5fe09f5ac4f69487b64388151c6af14cb
SHA16612616ebde43e8f492d3b3e0356fe0770588a50
SHA2564c36492448db48c20bda63fbc42456218ede1e283e7e001db39a87a22ed411f0
SHA51257862f62eae1f17af707eac45ab145dc1e637571cd1310d2df08606e45094effbe3eb62fd0ea0f5c365dab41a7df9d65abdb0102a3e109ff490e1e0f917b254b
-
Filesize
91KB
MD526295a0baf87955f2e37735af135ca45
SHA197f468d3ebaca4774ce69f6f55c998b93a912540
SHA2560bd42c13dd0a5c881e80f161f7548b093c4fd99a747c13568af983e2c76cd71a
SHA5126760c5fe3621b1d9c84a5c974c28d796cfba83dba4ff0e9f9eb0ed19cb47a6fc6a1322f58193eb4d638e214f7e61e9543f6f9235c2be8888bcd075fa7650b20a
-
Filesize
4.2MB
MD5eec39118faddbc1396a58db4e330a9f4
SHA13cf98c6e385fb8e5a29a4d88b8a8b4bb8a6cabbe
SHA256a4d11891e9b1d389ed5d255900af592dc28888af16044301a0d0f68159c75a95
SHA5125949a424a87777d283b5ce48df1fd991f2f7adbdd76134df5a2acab184670d40a9f8abf7accc75aeaed79e3af7aa846a42e27fc9215a5364890c78336196a120
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
34KB
MD509974eaff6defadde38b1328754dbe09
SHA1001cfb5514444188e455b97acc369f037079ca9d
SHA2569eeef28d82fc4db7d1269dfbc0ea282768ce5e2e4e4bdc867d80d6847468dca7
SHA512da29b01ebebb454c004420c6b29bb8dca9fb50554a7a5db30035a5ec458d766049bf5502f708bf7eb210a4f9cbdb308cc0c8dcdad9f745b01a9e4f1455bbc846
-
Filesize
214KB
MD597553f17f620de864a3297153e3711fa
SHA18834d5b74ccecd15ef3bc5bfeb7ea6faa6e641b8
SHA2562adcfd5fc9d6c62ea98beab6aac230d5d828ead4403ba930b24326cd81db40ac
SHA512669e76854a44ab4991bb421481c0415cdc6d27378eba720357e5ada2f57698ad86293717723d542ce838a7acdf7b2e4c4e182aa13e9dfa7479955f3dd0df1fd9