Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
7s -
max time network
79s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 09:47
Behavioral task
behavioral1
Sample
c71ae363dc38caca1d40acd0c5802c75.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c71ae363dc38caca1d40acd0c5802c75.exe
Resource
win10v2004-20231215-en
General
-
Target
c71ae363dc38caca1d40acd0c5802c75.exe
-
Size
651KB
-
MD5
c71ae363dc38caca1d40acd0c5802c75
-
SHA1
d31673edc216cb167a05a1bf5bc193ae2c8ec179
-
SHA256
36a7ecf0b280491cfbf8a51b44d40ee56c9722f47067e5c7f05bef55918e779b
-
SHA512
6210d749fb9812c17a62cbdf76e3e3c1ace29ce08a0ee3eeff80f984479a4149fd61d84051d3b55866ebe8fd5786fe975d96437e96e51490b1f3f1e36cb55cde
-
SSDEEP
12288:kpyZT1/rCxu/mDwLRI6BxcDqp9aqCcajVuD3Z7BPQGMWYur0s0D:kUx1/jOD3SxcDDcNDqWYurL0
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 9 IoCs
resource yara_rule behavioral2/memory/5052-8-0x0000000000400000-0x0000000000507000-memory.dmp modiloader_stage2 behavioral2/memory/5052-7-0x0000000000400000-0x0000000000507000-memory.dmp modiloader_stage2 behavioral2/memory/5052-6-0x0000000000400000-0x0000000000507000-memory.dmp modiloader_stage2 behavioral2/memory/3912-4-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2724-61-0x0000000000400000-0x000000000041B000-memory.dmp modiloader_stage2 behavioral2/memory/3388-71-0x0000000000400000-0x000000000041B000-memory.dmp modiloader_stage2 behavioral2/memory/5052-73-0x0000000000400000-0x0000000000507000-memory.dmp modiloader_stage2 behavioral2/memory/4876-89-0x0000000000400000-0x000000000041B000-memory.dmp modiloader_stage2 behavioral2/memory/5052-121-0x0000000000400000-0x0000000000507000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1968 dHY4IvP3.exe -
resource yara_rule behavioral2/memory/5052-0-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral2/memory/5052-5-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral2/memory/5052-8-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral2/memory/5052-7-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral2/memory/5052-6-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral2/memory/5052-1-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral2/memory/5052-73-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral2/memory/2824-76-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2824-78-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2824-74-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2824-67-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2824-66-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3740-91-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3740-90-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3740-87-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3740-83-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3740-82-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2824-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/5052-121-0x0000000000400000-0x0000000000507000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3912 set thread context of 5052 3912 c71ae363dc38caca1d40acd0c5802c75.exe 71 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3096 3740 WerFault.exe 23 -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3764 tasklist.exe 4868 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1968 dHY4IvP3.exe 1968 dHY4IvP3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5052 c71ae363dc38caca1d40acd0c5802c75.exe 1968 dHY4IvP3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3912 wrote to memory of 5052 3912 c71ae363dc38caca1d40acd0c5802c75.exe 71 PID 3912 wrote to memory of 5052 3912 c71ae363dc38caca1d40acd0c5802c75.exe 71 PID 3912 wrote to memory of 5052 3912 c71ae363dc38caca1d40acd0c5802c75.exe 71 PID 3912 wrote to memory of 5052 3912 c71ae363dc38caca1d40acd0c5802c75.exe 71 PID 3912 wrote to memory of 5052 3912 c71ae363dc38caca1d40acd0c5802c75.exe 71 PID 3912 wrote to memory of 5052 3912 c71ae363dc38caca1d40acd0c5802c75.exe 71 PID 3912 wrote to memory of 5052 3912 c71ae363dc38caca1d40acd0c5802c75.exe 71 PID 3912 wrote to memory of 5052 3912 c71ae363dc38caca1d40acd0c5802c75.exe 71 PID 3912 wrote to memory of 5052 3912 c71ae363dc38caca1d40acd0c5802c75.exe 71 PID 5052 wrote to memory of 1968 5052 c71ae363dc38caca1d40acd0c5802c75.exe 89 PID 5052 wrote to memory of 1968 5052 c71ae363dc38caca1d40acd0c5802c75.exe 89 PID 5052 wrote to memory of 1968 5052 c71ae363dc38caca1d40acd0c5802c75.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c71ae363dc38caca1d40acd0c5802c75.exe"C:\Users\Admin\AppData\Local\Temp\c71ae363dc38caca1d40acd0c5802c75.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\c71ae363dc38caca1d40acd0c5802c75.exec71ae363dc38caca1d40acd0c5802c75.exe2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\dHY4IvP3.exeC:\Users\Admin\dHY4IvP3.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del dHY4IvP3.exe4⤵PID:1368
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3764
-
-
-
C:\Users\Admin\vaitueh.exe"C:\Users\Admin\vaitueh.exe"4⤵PID:1172
-
-
-
C:\Users\Admin\azhost.exeC:\Users\Admin\azhost.exe3⤵PID:2724
-
C:\Users\Admin\azhost.exeazhost.exe4⤵PID:440
-
-
-
C:\Users\Admin\bzhost.exeC:\Users\Admin\bzhost.exe3⤵PID:3388
-
C:\Users\Admin\bzhost.exebzhost.exe4⤵PID:2824
-
-
-
C:\Users\Admin\czhost.exeC:\Users\Admin\czhost.exe3⤵PID:4876
-
C:\Users\Admin\czhost.execzhost.exe4⤵PID:3740
-
-
-
C:\Users\Admin\dzhost.exeC:\Users\Admin\dzhost.exe3⤵PID:2140
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:4732
-
-
-
C:\Users\Admin\ezhost.exeC:\Users\Admin\ezhost.exe3⤵PID:512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del c71ae363dc38caca1d40acd0c5802c75.exe3⤵PID:4320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3740 -ip 37401⤵PID:3356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 2201⤵
- Program crash
PID:3096
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD56ecc8728fa847f4facec503939472ff0
SHA1eef3fb9832e3f3d1bed5ae402236d5c7518f63fb
SHA256b7a57cfe5490b325a145d2c65a470a01f54a733fe12633d0f54f989d4850ff45
SHA512633ad6b02caddc635d89d56d70932ac10c316b771dcee05cb65bb91772fe185a06bbd6e744e1761fe3e398493c27812d6838d41ddf55037cff1cf296b5c76a03
-
Filesize
18KB
MD517615b2d8a39bf80a370f03d003ad9b5
SHA17abaafe270de32a29e06164890204d0c1c2f3984
SHA25686cfbea923613aba39a8ad1c51fe400ade3cab4084438367ab84feb0f29065ba
SHA512e73d1204b3fb27348785a44f0697a542ae62201a3043997c210f37f315c8efcbd85594a45e2ac2beb4a6d6676cbd8f6898865b60fbf02895556c2ffe2d4598f3