Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/11/2023, 16:11

General

  • Target

    NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe

  • Size

    112KB

  • MD5

    1420b7348a453ccbcd1b249e6067d7d0

  • SHA1

    307b47994c84b9eb3a2373fb9a807b9c6c69730a

  • SHA256

    62ba77eac3136b0ecf90f0bd8655b7318eb3ca5512c26658b955a4b8b69c3fa5

  • SHA512

    1f12f93928f9a0649fd1e0ee85b0e1a59e868f433c9cea4a5f8bf30d3ed562cb4047138fec92ba28be4ad3d58dfd18597857f4f57b5e76a84a91fa747eb7d260

  • SSDEEP

    1536:OxSq3EDGvJCUCMAzZi8300d6c0+FvmgyIhmchKwC:OPAGJCUCrs8k0d6cegr1hKw

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Windows\Registry.exe
      C:\Windows\Registry.exe
      2⤵
      • Executes dropped EXE
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Registry.exe

    Filesize

    112KB

    MD5

    1420b7348a453ccbcd1b249e6067d7d0

    SHA1

    307b47994c84b9eb3a2373fb9a807b9c6c69730a

    SHA256

    62ba77eac3136b0ecf90f0bd8655b7318eb3ca5512c26658b955a4b8b69c3fa5

    SHA512

    1f12f93928f9a0649fd1e0ee85b0e1a59e868f433c9cea4a5f8bf30d3ed562cb4047138fec92ba28be4ad3d58dfd18597857f4f57b5e76a84a91fa747eb7d260

  • C:\Windows\Registry.exe

    Filesize

    112KB

    MD5

    1420b7348a453ccbcd1b249e6067d7d0

    SHA1

    307b47994c84b9eb3a2373fb9a807b9c6c69730a

    SHA256

    62ba77eac3136b0ecf90f0bd8655b7318eb3ca5512c26658b955a4b8b69c3fa5

    SHA512

    1f12f93928f9a0649fd1e0ee85b0e1a59e868f433c9cea4a5f8bf30d3ed562cb4047138fec92ba28be4ad3d58dfd18597857f4f57b5e76a84a91fa747eb7d260