Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    175s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 19:19

General

  • Target

    2524dd7b060afa72aac7977cd26245284516c6cb466c356cea97fd044b66e1be.exe

  • Size

    275KB

  • MD5

    7846ae94d06ac0dce5de1dd7f95280bd

  • SHA1

    31149e1825d6defec696dc4a1d2e8dcb6dd23b9c

  • SHA256

    2524dd7b060afa72aac7977cd26245284516c6cb466c356cea97fd044b66e1be

  • SHA512

    a545b62a239451d8c6b331fad924ad469fd6e451f46207c75acce9ba8221e3906984696f82d0cbafbc548be85c9f401a5e085d67c2264b9ef006740039f01981

  • SSDEEP

    6144:2+ft09BZRn01/EjRmH4mm1cECD+p1H/j+8jZ7rvaU3+mWrWnvoSI:Dfe9TRno/EjRq4m6TnH/j+eFzFJoSI

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 4 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2524dd7b060afa72aac7977cd26245284516c6cb466c356cea97fd044b66e1be.exe
    "C:\Users\Admin\AppData\Local\Temp\2524dd7b060afa72aac7977cd26245284516c6cb466c356cea97fd044b66e1be.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3612
    • C:\Users\Admin\AppData\Local\Temp\prova.exe
      "C:\Users\Admin\AppData\Local\Temp\prova.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Windows\mstwain32.exe
        "C:\Windows\mstwain32.exe"
        3⤵
        • UAC bypass
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:4092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\prova.exe

    Filesize

    109KB

    MD5

    318561dfbba844f4c0d2e9a11178e861

    SHA1

    7fa527d313f1ba598a79e54af6b9ea1f0a3a8f2d

    SHA256

    b0324e5e2535c6671ce22d4f0fcf5071a0c07ffd14d96ac712ca1f6e6dbd412d

    SHA512

    dfefc883257830894390dd4010b2a760507992831bc2525f898e8036b00e6f73a727cf8c256c70b273888000844f39a5c50004c226f3d704648f83e12e95edfd

  • C:\Users\Admin\AppData\Local\Temp\prova.exe

    Filesize

    109KB

    MD5

    318561dfbba844f4c0d2e9a11178e861

    SHA1

    7fa527d313f1ba598a79e54af6b9ea1f0a3a8f2d

    SHA256

    b0324e5e2535c6671ce22d4f0fcf5071a0c07ffd14d96ac712ca1f6e6dbd412d

    SHA512

    dfefc883257830894390dd4010b2a760507992831bc2525f898e8036b00e6f73a727cf8c256c70b273888000844f39a5c50004c226f3d704648f83e12e95edfd

  • C:\Windows\cmsetac.dll

    Filesize

    33KB

    MD5

    cc0766f6104dea68cc7178a509586fe5

    SHA1

    06119060ec08801628c17c8e799dd9db05afba2f

    SHA256

    d192352cccc5f91457de3a03eefd66b7497b4418c3fdcde984cebc7855d4614f

    SHA512

    7a3b7b439dde6089536aca87e98908e16c1abdb289d45cc41535be22e96c37345c05a655f45ef81f2d249a8ac4c76d3de16880f6bc245ad7f5d43f0bc5a205d5

  • C:\Windows\cmsetac.dll

    Filesize

    33KB

    MD5

    cc0766f6104dea68cc7178a509586fe5

    SHA1

    06119060ec08801628c17c8e799dd9db05afba2f

    SHA256

    d192352cccc5f91457de3a03eefd66b7497b4418c3fdcde984cebc7855d4614f

    SHA512

    7a3b7b439dde6089536aca87e98908e16c1abdb289d45cc41535be22e96c37345c05a655f45ef81f2d249a8ac4c76d3de16880f6bc245ad7f5d43f0bc5a205d5

  • C:\Windows\mstwain32.exe

    Filesize

    109KB

    MD5

    318561dfbba844f4c0d2e9a11178e861

    SHA1

    7fa527d313f1ba598a79e54af6b9ea1f0a3a8f2d

    SHA256

    b0324e5e2535c6671ce22d4f0fcf5071a0c07ffd14d96ac712ca1f6e6dbd412d

    SHA512

    dfefc883257830894390dd4010b2a760507992831bc2525f898e8036b00e6f73a727cf8c256c70b273888000844f39a5c50004c226f3d704648f83e12e95edfd

  • C:\Windows\mstwain32.exe

    Filesize

    109KB

    MD5

    318561dfbba844f4c0d2e9a11178e861

    SHA1

    7fa527d313f1ba598a79e54af6b9ea1f0a3a8f2d

    SHA256

    b0324e5e2535c6671ce22d4f0fcf5071a0c07ffd14d96ac712ca1f6e6dbd412d

    SHA512

    dfefc883257830894390dd4010b2a760507992831bc2525f898e8036b00e6f73a727cf8c256c70b273888000844f39a5c50004c226f3d704648f83e12e95edfd

  • C:\Windows\ntdtcstp.dll

    Filesize

    7KB

    MD5

    67587e25a971a141628d7f07bd40ffa0

    SHA1

    76fcd014539a3bb247cc0b761225f68bd6055f6b

    SHA256

    e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378

    SHA512

    6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

  • C:\Windows\ntdtcstp.dll

    Filesize

    7KB

    MD5

    67587e25a971a141628d7f07bd40ffa0

    SHA1

    76fcd014539a3bb247cc0b761225f68bd6055f6b

    SHA256

    e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378

    SHA512

    6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

  • memory/4092-142-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/4092-147-0x0000000003080000-0x000000000308E000-memory.dmp

    Filesize

    56KB

  • memory/4092-148-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/4508-141-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/4508-137-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB