Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2024, 19:33 UTC

General

  • Target

    8a5a4b5ccd43ff006320ef9e33aaf74f.dll

  • Size

    130KB

  • MD5

    8a5a4b5ccd43ff006320ef9e33aaf74f

  • SHA1

    945cec466f21e15201ea7ad569e7345a95216a2b

  • SHA256

    38aa2b27a45d3bcb3670eed4a2bee6cd5bafb7815d0f1eee7475dfb6d42d73a1

  • SHA512

    07b8763cb4e8fa984fd8765a3c5f8568cd703249d9d9aa33d562d4c2891858b75815a96175e5d8951ab5fa112c212f931f7293edadf00eed2194c0786e330adb

  • SSDEEP

    3072:B7KsteHhq8WNeyKmxx1u/5cgYTEXREFcBjBrp:BuTkbNfX31yc4xLr

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8a5a4b5ccd43ff006320ef9e33aaf74f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8a5a4b5ccd43ff006320ef9e33aaf74f.dll,#1
      2⤵
      • Drops file in Windows directory
      PID:4692
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 724
        3⤵
        • Program crash
        PID:3308
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 996
        3⤵
        • Program crash
        PID:2360
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4692 -ip 4692
    1⤵
      PID:732
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4692 -ip 4692
      1⤵
        PID:4152

      Network

      • flag-us
        DNS
        97.17.167.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        97.17.167.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        240.221.184.93.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        240.221.184.93.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        71.31.126.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        71.31.126.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        79.121.231.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        79.121.231.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        57.110.18.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        57.110.18.2.in-addr.arpa
        IN PTR
        Response
        57.110.18.2.in-addr.arpa
        IN PTR
        a2-18-110-57deploystaticakamaitechnologiescom
      • flag-us
        DNS
        104.219.191.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        104.219.191.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        103.169.127.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        103.169.127.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        15.164.165.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        15.164.165.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        137.71.91.104.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        137.71.91.104.in-addr.arpa
        IN PTR
        Response
        137.71.91.104.in-addr.arpa
        IN PTR
        a104-91-71-137deploystaticakamaitechnologiescom
      • flag-us
        DNS
        31.243.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        31.243.111.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        209.78.101.95.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        209.78.101.95.in-addr.arpa
        IN PTR
        Response
        209.78.101.95.in-addr.arpa
        IN PTR
        a95-101-78-209deploystaticakamaitechnologiescom
      • flag-us
        DNS
        200.64.52.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        200.64.52.20.in-addr.arpa
        IN PTR
        Response
      • 52.142.223.178:80
        52 B
        1
      • 8.8.8.8:53
        97.17.167.52.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        97.17.167.52.in-addr.arpa

      • 8.8.8.8:53
        240.221.184.93.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        240.221.184.93.in-addr.arpa

      • 8.8.8.8:53
        71.31.126.40.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        71.31.126.40.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        79.121.231.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        79.121.231.20.in-addr.arpa

      • 8.8.8.8:53
        57.110.18.2.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        57.110.18.2.in-addr.arpa

      • 8.8.8.8:53
        104.219.191.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        104.219.191.52.in-addr.arpa

      • 8.8.8.8:53
        103.169.127.40.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        103.169.127.40.in-addr.arpa

      • 8.8.8.8:53
        15.164.165.52.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        15.164.165.52.in-addr.arpa

      • 8.8.8.8:53
        137.71.91.104.in-addr.arpa
        dns
        72 B
        137 B
        1
        1

        DNS Request

        137.71.91.104.in-addr.arpa

      • 8.8.8.8:53
        31.243.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        31.243.111.52.in-addr.arpa

      • 8.8.8.8:53
        209.78.101.95.in-addr.arpa
        dns
        72 B
        137 B
        1
        1

        DNS Request

        209.78.101.95.in-addr.arpa

      • 8.8.8.8:53
        200.64.52.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        200.64.52.20.in-addr.arpa

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4692-1-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.