Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2023, 01:16

General

  • Target

    9962625262537.exe

  • Size

    891KB

  • MD5

    fe063f58390e106c939aa6bdd09aaba6

  • SHA1

    4a47f9313b08a00aa62d8e0fad57b7af906253bd

  • SHA256

    51e9ab106ca72189b724415ace85775bb907178d4621cb2ee123cad629f2e4a9

  • SHA512

    31061e9c022ac31d7cb137f23e368393d5568cacc4718355d09f21f165c25ba9137c59878a9d0e9c196f13f5ee68d025b3a7139618a73f17544c14e864520d83

  • SSDEEP

    24576:DqdXPn4tl29UFPWmKoyk4TLmgvky46i95nwkac:DqdfXUFPjKoNw714J

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 62 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Users\Admin\AppData\Local\Temp\9962625262537.exe
      "C:\Users\Admin\AppData\Local\Temp\9962625262537.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4280
      • C:\Windows\SysWOW64\SndVol.exe
        C:\Windows\System32\SndVol.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4980
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4572
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1608
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1608 -s 144
            4⤵
            • Program crash
            PID:4864
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 452 -p 1608 -ip 1608
      1⤵
        PID:1364

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3176-348-0x0000000002D40000-0x0000000002E51000-memory.dmp

        Filesize

        1.1MB

      • memory/3176-360-0x0000000008360000-0x00000000083F8000-memory.dmp

        Filesize

        608KB

      • memory/3176-409-0x0000000000FA0000-0x0000000000FAA000-memory.dmp

        Filesize

        40KB

      • memory/3176-408-0x0000000000CD0000-0x0000000000CD2000-memory.dmp

        Filesize

        8KB

      • memory/3176-380-0x0000000000F90000-0x0000000000FA0000-memory.dmp

        Filesize

        64KB

      • memory/3176-363-0x0000000008360000-0x00000000083F8000-memory.dmp

        Filesize

        608KB

      • memory/4280-169-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-174-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-139-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-140-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-141-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-142-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-143-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-144-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-145-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-175-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-147-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-148-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-149-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-150-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-151-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-152-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-153-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-154-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-155-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-156-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-157-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-158-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-159-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-160-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-161-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-162-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-163-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-164-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-165-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-166-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-167-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-168-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-137-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-170-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-171-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-172-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-138-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-173-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-146-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-176-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-177-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-178-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-179-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-180-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-181-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-182-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-184-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-185-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-186-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-187-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-188-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-189-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-190-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-191-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-192-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-193-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-194-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-195-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-196-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-197-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-133-0x0000000002390000-0x0000000002391000-memory.dmp

        Filesize

        4KB

      • memory/4280-134-0x0000000000400000-0x00000000004E4000-memory.dmp

        Filesize

        912KB

      • memory/4280-135-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4280-136-0x0000000003FA0000-0x0000000003FD2000-memory.dmp

        Filesize

        200KB

      • memory/4572-361-0x0000000000C30000-0x0000000000C5D000-memory.dmp

        Filesize

        180KB

      • memory/4572-357-0x0000000001330000-0x00000000013BF000-memory.dmp

        Filesize

        572KB

      • memory/4572-356-0x0000000001700000-0x0000000001A4A000-memory.dmp

        Filesize

        3.3MB

      • memory/4572-354-0x0000000000C30000-0x0000000000C5D000-memory.dmp

        Filesize

        180KB

      • memory/4572-353-0x0000000000900000-0x000000000090E000-memory.dmp

        Filesize

        56KB

      • memory/4980-344-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/4980-345-0x0000000004C20000-0x0000000004C21000-memory.dmp

        Filesize

        4KB

      • memory/4980-346-0x0000000010410000-0x000000001043F000-memory.dmp

        Filesize

        188KB

      • memory/4980-347-0x0000000005010000-0x000000000535A000-memory.dmp

        Filesize

        3.3MB