Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 14:33
Behavioral task
behavioral1
Sample
a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe
Resource
win10v2004-20220901-en
General
-
Target
a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe
-
Size
108KB
-
MD5
92d9fc66cd8a4f01a353866351216d98
-
SHA1
6087791e7e885f02a793da01f54b28a15811e6a1
-
SHA256
a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2
-
SHA512
3ff15b141a5d6ab813eee239ff33af3b62aa89bf7aeaa07d97e28fde27efb32f6884b997beb4c6fa810edcd123e16b7df8039865df2ea521054fb0a784377adb
-
SSDEEP
3072:y1+MJKrUnFYY5z1i0Nmbi5fJBN5A5out:yIrPj0NmWtNkoS
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe -
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4792-138-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral2/memory/4792-132-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4792-138-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 4792 a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe 4792 a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe 4792 a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe 4792 a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4792 a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe Token: SeDebugPrivilege 4792 a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4792 a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe 4792 a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe"C:\Users\Admin\AppData\Local\Temp\a717546b8a3cbed8f6b43a9b989de4738a1b912cd07e3e7879c8d8a4684877f2.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD514b3cba711bd6027adb79614a4177fb5
SHA144a0611a034af59c29e2d529196a0c6150050c20
SHA256ab100eb6e5c2211b6e1f05df13550ad193abbd9f0804c596022b7fc66ce33f10
SHA512a39ba38d2ce3076a18336dc7e8f2dd3fb8addec40bc8df8b73703e5d8b499c55b677e3c4c6b1aa96bf971b228c047352e1a55f64dc968fc8675065a222a5c46c
-
Filesize
32KB
MD514b3cba711bd6027adb79614a4177fb5
SHA144a0611a034af59c29e2d529196a0c6150050c20
SHA256ab100eb6e5c2211b6e1f05df13550ad193abbd9f0804c596022b7fc66ce33f10
SHA512a39ba38d2ce3076a18336dc7e8f2dd3fb8addec40bc8df8b73703e5d8b499c55b677e3c4c6b1aa96bf971b228c047352e1a55f64dc968fc8675065a222a5c46c
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350