Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
werty.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
werty.exe
Resource
win10v2004-20231215-en
General
-
Target
werty.exe
-
Size
1.0MB
-
MD5
0c5bfdf29140cee7c34fa6166a1755c8
-
SHA1
adbc915a64c49396e67c6d2b6aaaeda987bd9eb5
-
SHA256
9a9f94e9ff3046494728f6f9d12d4da6700b57b38d1a151d24b903f4d41758cd
-
SHA512
cd1b303b9cbdcae35c91f5f5e9efe3f532bde69189fe146f271c84bd258e60e0a66a347fd59247ead197c0abd7d4d208fec895a12aabf51f282d907e4b353f99
-
SSDEEP
24576:IWBKQmXDpp02onnUhfH36pnBDoRUsujZdI/4XPU7eGAzxczoueZ7Z1:IMmTL0Vn2sUud+4XPr4ox
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/files/0x0009000000023143-51.dat modiloader_stage2 behavioral2/memory/3352-60-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral2/files/0x0009000000023143-55.dat modiloader_stage2 behavioral2/files/0x0009000000023143-54.dat modiloader_stage2 -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\Beep.sys werty.exe File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys werty.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation werty.exe -
Executes dropped EXE 1 IoCs
pid Process 3352 2009_server.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt 2009_server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 664 Process not Found 664 Process not Found -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4312 wrote to memory of 3352 4312 werty.exe 34 PID 4312 wrote to memory of 3352 4312 werty.exe 34 PID 4312 wrote to memory of 3352 4312 werty.exe 34 PID 3352 wrote to memory of 5520 3352 2009_server.exe 33 PID 3352 wrote to memory of 5520 3352 2009_server.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\werty.exe"C:\Users\Admin\AppData\Local\Temp\werty.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\2009_server.exe"C:\Users\Admin\AppData\Local\Temp\2009_server.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3352
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"1⤵PID:5520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5f097c36eab94bfd2ab7234577067fd54
SHA12ee615a9a81c8c34040788b07517e803d71c889f
SHA2560fa22376dbc8479a6222f0aaa2db96b29dc15493566aefefda00b040f6291f39
SHA512d0b99442aec262e59a50b77e7b96c8a8f5f0348923994ea97365c3e88dabf1de7597d3a8f4bbbd2180d809e5294392b113d796e1bb0083df8d4d43202ba7d61d
-
Filesize
243KB
MD572ef67f3370891bfcb95ff02b021b7b9
SHA15bb6e3be928704b2fa2fc86a87a6d197d4b82b4e
SHA25678c5736eb8047f42f88cd2bfa1a60d4cc2fd05d38b185bfdada5d95b00d6faec
SHA512c84a2a9414f1e32311598f5695dc564af6fff4214ab48dfcebfc053f96000b1a7a0e7cae3d39b324925a4c656b3db93376c09b310efa4d124392f04ac2b6b5dd
-
Filesize
188KB
MD51f947cd7823ede2147d45ec584cd88f1
SHA1d142f8c2d210f9bb2f94f31ae37ddc147c7958ef
SHA256660581bf58b9b3bf80a07c1e5b2b896a46bcd7cf694a893105faf96d1f85d1aa
SHA5126125860b5f5a12fd1ac34255d4695dc8b913de20ebe58548b46f145201710a30d664d3954ec86feed1ee26bbc7d9a02e5d617eb3b2d189a61f2caca7079468c3