Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
Wiprelyokcawpj.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Wiprelyokcawpj.exe
Resource
win10v2004-20230915-en
General
-
Target
Wiprelyokcawpj.exe
-
Size
1.3MB
-
MD5
14239e8403667595f401b4971c28b3db
-
SHA1
9b1afe3640abcde93657ff00d7ccf91efb7e652c
-
SHA256
25c965edd039ebc00529a936e066f34149b4bb69c59c7a4fb575849584a71dda
-
SHA512
fa4f817274d8c81581e79454c43ff704d1017f0ea7017a8422d9c4e897810d5c1108047082fe325391ba580f823e2d954d81e7774231ede4cb621226d2738b55
-
SSDEEP
24576:vUrkF9ZT6xy9M7HCZmFq/wbgKcQrE/k2+gL5:vUwVk2XL
Malware Config
Extracted
formbook
4.1
fadc
protechdream.com
faireco.life
bakrinhome.com
bustygirl.xyz
kbif.info
ningo.bond
hollywoodcircleevents.site
eapv-uabjo.com
852bets.com
nooption.online
global-strategy.pro
cartaonline.online
sacredbones2023.com
barsandbands.fun
liftchairs-info-mx.today
delamar.one
shuntianyuan.net
americanworldsolutions.com
julitv.net
criativax.com
edge-estimates.info
fursanalhamayel.com
huilingtong.net
cheemanotary.com
myartgallery.net
mrsearthphilippines.com
auth7070-50.cfd
wrld.site
mypluscoins.com
curvepro.net
petticoatsandpockets.com
dzji12.top
y250rx08ow.top
korearx.com
sensorlightsales.com
kloveloboosting.com
innercircleloans.com
r0g.lat
hombresprostatabio.online
telcosme.com
ansorullawfirm.com
donateprolifeministry.com
wtmidsole.com
tincoco.net
yuanlaigou.net
complete-s.monster
dm16888.xyz
aidadesignhub.com
lcyj.net
qiohdf55123.com
arlnx.com
haixindx.com
2viaequatorial.com
biaogewuliu.com
kristieannmarkets.com
iptvtest.live
vanheltenadviesenfinance.com
seathee.com
ywhlearn.com
eeee84.com
tr-dysonbayisi-tr.com
annaddiddi.com
kmdsz.net
ocseawatch.com
baoshengmaritime.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2564-8-0x0000000004F30000-0x0000000005F30000-memory.dmp formbook behavioral2/memory/2564-12-0x0000000004F30000-0x0000000005F30000-memory.dmp formbook behavioral2/memory/1264-18-0x0000000000EC0000-0x0000000000EEF000-memory.dmp formbook behavioral2/memory/1264-20-0x0000000000EC0000-0x0000000000EEF000-memory.dmp formbook -
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4308-2-0x00000000042B0000-0x00000000052B0000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wiprelyo = "C:\\Users\\Public\\Wiprelyo.url" Wiprelyokcawpj.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2564 set thread context of 3116 2564 colorcpl.exe 47 PID 1264 set thread context of 3116 1264 help.exe 47 -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 24 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 33 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 4308 Wiprelyokcawpj.exe 4308 Wiprelyokcawpj.exe 2564 colorcpl.exe 2564 colorcpl.exe 2564 colorcpl.exe 2564 colorcpl.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe 1264 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3116 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2564 colorcpl.exe 2564 colorcpl.exe 2564 colorcpl.exe 1264 help.exe 1264 help.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2564 colorcpl.exe Token: SeShutdownPrivilege 3116 Explorer.EXE Token: SeCreatePagefilePrivilege 3116 Explorer.EXE Token: SeShutdownPrivilege 3116 Explorer.EXE Token: SeCreatePagefilePrivilege 3116 Explorer.EXE Token: SeDebugPrivilege 1264 help.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3116 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4308 wrote to memory of 2564 4308 Wiprelyokcawpj.exe 91 PID 4308 wrote to memory of 2564 4308 Wiprelyokcawpj.exe 91 PID 4308 wrote to memory of 2564 4308 Wiprelyokcawpj.exe 91 PID 4308 wrote to memory of 2564 4308 Wiprelyokcawpj.exe 91 PID 3116 wrote to memory of 1264 3116 Explorer.EXE 93 PID 3116 wrote to memory of 1264 3116 Explorer.EXE 93 PID 3116 wrote to memory of 1264 3116 Explorer.EXE 93 PID 1264 wrote to memory of 3840 1264 help.exe 94 PID 1264 wrote to memory of 3840 1264 help.exe 94 PID 1264 wrote to memory of 3840 1264 help.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\Wiprelyokcawpj.exe"C:\Users\Admin\AppData\Local\Temp\Wiprelyokcawpj.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\colorcpl.exeC:\Windows\System32\colorcpl.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1984
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\colorcpl.exe"3⤵PID:3840
-
-