Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
175s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 15:43
Behavioral task
behavioral1
Sample
63b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
63b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e.exe
Resource
win10v2004-20220812-en
General
-
Target
63b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e.exe
-
Size
124KB
-
MD5
0f5db1b3a92112e3e7f103c4fd9312e0
-
SHA1
5d29d966a0b76b88d7c39803bf3a1e99dfb93786
-
SHA256
63b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e
-
SHA512
a06923c42d019987d70e885f1f614b65ed2fe880ec4cc3409a0e564a107479d0591ede42ff6e0d5e4956f8c145e85efd3560be155b6d7c491c5cb396ec73d868
-
SSDEEP
3072:7LCnfuTStThRr7+O9ewqjXrbAJNN2a1h29Btxfmp9nEMRLx:7ktF57+O9YLAT0a1OPfm3nEqx
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/files/0x000b000000022e19-133.dat modiloader_stage2 behavioral2/files/0x000b000000022e19-134.dat modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 4884 apocalyps32.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe 63b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e.exe File opened for modification C:\Windows\apocalyps32.exe 63b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e.exe File created C:\Windows\apocalyps32.exe apocalyps32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 668 wrote to memory of 4884 668 63b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e.exe 80 PID 668 wrote to memory of 4884 668 63b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e.exe 80 PID 668 wrote to memory of 4884 668 63b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e.exe 80 PID 4884 wrote to memory of 4932 4884 apocalyps32.exe 81 PID 4884 wrote to memory of 4932 4884 apocalyps32.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\63b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e.exe"C:\Users\Admin\AppData\Local\Temp\63b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\apocalyps32.exe-bs2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe-bs3⤵PID:4932
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD50f5db1b3a92112e3e7f103c4fd9312e0
SHA15d29d966a0b76b88d7c39803bf3a1e99dfb93786
SHA25663b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e
SHA512a06923c42d019987d70e885f1f614b65ed2fe880ec4cc3409a0e564a107479d0591ede42ff6e0d5e4956f8c145e85efd3560be155b6d7c491c5cb396ec73d868
-
Filesize
124KB
MD50f5db1b3a92112e3e7f103c4fd9312e0
SHA15d29d966a0b76b88d7c39803bf3a1e99dfb93786
SHA25663b64880047c8956e67e9339cfcd430ab5b683bbef3631eea5a56827abed8b2e
SHA512a06923c42d019987d70e885f1f614b65ed2fe880ec4cc3409a0e564a107479d0591ede42ff6e0d5e4956f8c145e85efd3560be155b6d7c491c5cb396ec73d868