Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 16:11
Behavioral task
behavioral1
Sample
NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe
-
Size
112KB
-
MD5
1420b7348a453ccbcd1b249e6067d7d0
-
SHA1
307b47994c84b9eb3a2373fb9a807b9c6c69730a
-
SHA256
62ba77eac3136b0ecf90f0bd8655b7318eb3ca5512c26658b955a4b8b69c3fa5
-
SHA512
1f12f93928f9a0649fd1e0ee85b0e1a59e868f433c9cea4a5f8bf30d3ed562cb4047138fec92ba28be4ad3d58dfd18597857f4f57b5e76a84a91fa747eb7d260
-
SSDEEP
1536:OxSq3EDGvJCUCMAzZi8300d6c0+FvmgyIhmchKwC:OPAGJCUCrs8k0d6cegr1hKw
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/files/0x0006000000022e0c-1.dat modiloader_stage2 behavioral2/files/0x0006000000022e0c-3.dat modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2696 Registry.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Registry service = "C:\\Windows\\Registry.exe" NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Registry.exe NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe File created C:\Windows\Registry.exe NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4580 NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe 4580 NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4580 wrote to memory of 2696 4580 NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe 91 PID 4580 wrote to memory of 2696 4580 NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe 91 PID 4580 wrote to memory of 2696 4580 NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1420b7348a453ccbcd1b249e6067d7d0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\Registry.exeC:\Windows\Registry.exe2⤵
- Executes dropped EXE
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD51420b7348a453ccbcd1b249e6067d7d0
SHA1307b47994c84b9eb3a2373fb9a807b9c6c69730a
SHA25662ba77eac3136b0ecf90f0bd8655b7318eb3ca5512c26658b955a4b8b69c3fa5
SHA5121f12f93928f9a0649fd1e0ee85b0e1a59e868f433c9cea4a5f8bf30d3ed562cb4047138fec92ba28be4ad3d58dfd18597857f4f57b5e76a84a91fa747eb7d260
-
Filesize
112KB
MD51420b7348a453ccbcd1b249e6067d7d0
SHA1307b47994c84b9eb3a2373fb9a807b9c6c69730a
SHA25662ba77eac3136b0ecf90f0bd8655b7318eb3ca5512c26658b955a4b8b69c3fa5
SHA5121f12f93928f9a0649fd1e0ee85b0e1a59e868f433c9cea4a5f8bf30d3ed562cb4047138fec92ba28be4ad3d58dfd18597857f4f57b5e76a84a91fa747eb7d260