Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 16:16
Behavioral task
behavioral1
Sample
888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe
Resource
win10v2004-20220812-en
General
-
Target
888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe
-
Size
645KB
-
MD5
a05c0a0282db7dbd7aa46d08a1cfe446
-
SHA1
8d08aeb8dba49db71ab414ab9d24eed6416733ab
-
SHA256
888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe
-
SHA512
d732b8de5f7a587de27f3242148d31a6f96c19ef281e3b83f40fef3023ce55049dc61637caf127f484b1651cd92af398c0fc38025ef7acf9bd351eb091cbca94
-
SSDEEP
12288:TjkArEN249AyE/rbaMct4bO2/Vx8afeLdZkdIwcK0rOXc1JEpG7ppakmYSkJ:YFE//Tct4bOsHn4cdcK0qXcDelwJ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/files/0x000c00000002171d-134.dat modiloader_stage2 behavioral2/files/0x000c00000002171d-135.dat modiloader_stage2 behavioral2/files/0x0002000000021b43-138.dat modiloader_stage2 behavioral2/files/0x0002000000021b43-137.dat modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 3912 decrypted.exe 1508 mstwain32.exe -
resource yara_rule behavioral2/memory/3752-132-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/3752-139-0x0000000000400000-0x00000000004E7000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation decrypted.exe -
Loads dropped DLL 4 IoCs
pid Process 1508 mstwain32.exe 1508 mstwain32.exe 1508 mstwain32.exe 1508 mstwain32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ mstwain32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA decrypted.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3752-139-0x0000000000400000-0x00000000004E7000-memory.dmp autoit_exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe File created C:\Windows\mstwain32.exe decrypted.exe File opened for modification C:\Windows\mstwain32.exe decrypted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3912 decrypted.exe Token: SeDebugPrivilege 1508 mstwain32.exe Token: SeDebugPrivilege 1508 mstwain32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1508 mstwain32.exe 1508 mstwain32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3752 wrote to memory of 3912 3752 888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe 80 PID 3752 wrote to memory of 3912 3752 888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe 80 PID 3752 wrote to memory of 3912 3752 888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe 80 PID 3912 wrote to memory of 1508 3912 decrypted.exe 81 PID 3912 wrote to memory of 1508 3912 decrypted.exe 81 PID 3912 wrote to memory of 1508 3912 decrypted.exe 81 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe"C:\Users\Admin\AppData\Local\Temp\888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\decrypted.exeC:\Users\Admin\AppData\Local\Temp\decrypted.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\decrypted.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1508
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD5b86a4a683904ca29be166305d4687a42
SHA156de0d615e83dd8fb3a9968499f006fb4b6b0cbd
SHA2567bef64f152f0aaebf645e1e5623ef283bb62b12b75225f43b53c5d80f01eec6a
SHA512592cff2eeb521c374fdcdab5fb38a6525b041e92c6173007cdd8ad6dd12e137bc877a49418a3d33dd707ba5089c2ee42246ec69dd72cc58a42cd2832cc4e3b63
-
Filesize
270KB
MD5b86a4a683904ca29be166305d4687a42
SHA156de0d615e83dd8fb3a9968499f006fb4b6b0cbd
SHA2567bef64f152f0aaebf645e1e5623ef283bb62b12b75225f43b53c5d80f01eec6a
SHA512592cff2eeb521c374fdcdab5fb38a6525b041e92c6173007cdd8ad6dd12e137bc877a49418a3d33dd707ba5089c2ee42246ec69dd72cc58a42cd2832cc4e3b63
-
Filesize
33KB
MD55c0c0ece110b3e759e951b5da3366256
SHA180b91a6b19584fd6bcc7d71811cc654ad5aec6cd
SHA2563f1f54941876b4c77537a0703b1322cba344400bf08db2c23df84b1740d82ff7
SHA512cd20a07c4ec2052afd1e5b00525747b4c579df85d8bf6854274ec78557d8efa24838ef9ae950e7081e2df4bb4542051a777151d1c61c72f7d1c9f6e4248eba77
-
Filesize
33KB
MD55c0c0ece110b3e759e951b5da3366256
SHA180b91a6b19584fd6bcc7d71811cc654ad5aec6cd
SHA2563f1f54941876b4c77537a0703b1322cba344400bf08db2c23df84b1740d82ff7
SHA512cd20a07c4ec2052afd1e5b00525747b4c579df85d8bf6854274ec78557d8efa24838ef9ae950e7081e2df4bb4542051a777151d1c61c72f7d1c9f6e4248eba77
-
Filesize
270KB
MD5b86a4a683904ca29be166305d4687a42
SHA156de0d615e83dd8fb3a9968499f006fb4b6b0cbd
SHA2567bef64f152f0aaebf645e1e5623ef283bb62b12b75225f43b53c5d80f01eec6a
SHA512592cff2eeb521c374fdcdab5fb38a6525b041e92c6173007cdd8ad6dd12e137bc877a49418a3d33dd707ba5089c2ee42246ec69dd72cc58a42cd2832cc4e3b63
-
Filesize
270KB
MD5b86a4a683904ca29be166305d4687a42
SHA156de0d615e83dd8fb3a9968499f006fb4b6b0cbd
SHA2567bef64f152f0aaebf645e1e5623ef283bb62b12b75225f43b53c5d80f01eec6a
SHA512592cff2eeb521c374fdcdab5fb38a6525b041e92c6173007cdd8ad6dd12e137bc877a49418a3d33dd707ba5089c2ee42246ec69dd72cc58a42cd2832cc4e3b63
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350