Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 19:33 UTC
Behavioral task
behavioral1
Sample
8a5a4b5ccd43ff006320ef9e33aaf74f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8a5a4b5ccd43ff006320ef9e33aaf74f.dll
Resource
win10v2004-20231215-en
General
-
Target
8a5a4b5ccd43ff006320ef9e33aaf74f.dll
-
Size
130KB
-
MD5
8a5a4b5ccd43ff006320ef9e33aaf74f
-
SHA1
945cec466f21e15201ea7ad569e7345a95216a2b
-
SHA256
38aa2b27a45d3bcb3670eed4a2bee6cd5bafb7815d0f1eee7475dfb6d42d73a1
-
SHA512
07b8763cb4e8fa984fd8765a3c5f8568cd703249d9d9aa33d562d4c2891858b75815a96175e5d8951ab5fa112c212f931f7293edadf00eed2194c0786e330adb
-
SSDEEP
3072:B7KsteHhq8WNeyKmxx1u/5cgYTEXREFcBjBrp:BuTkbNfX31yc4xLr
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4692-1-0x0000000000400000-0x000000000044D000-memory.dmp modiloader_stage2 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\0.idx rundll32.exe File created C:\Windows\1.idx rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3308 4692 WerFault.exe 83 2360 4692 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2144 wrote to memory of 4692 2144 rundll32.exe 83 PID 2144 wrote to memory of 4692 2144 rundll32.exe 83 PID 2144 wrote to memory of 4692 2144 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8a5a4b5ccd43ff006320ef9e33aaf74f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8a5a4b5ccd43ff006320ef9e33aaf74f.dll,#12⤵
- Drops file in Windows directory
PID:4692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 7243⤵
- Program crash
PID:3308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 9963⤵
- Program crash
PID:2360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4692 -ip 46921⤵PID:732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4692 -ip 46921⤵PID:4152
Network
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request71.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.110.18.2.in-addr.arpaIN PTRResponse57.110.18.2.in-addr.arpaIN PTRa2-18-110-57deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request137.71.91.104.in-addr.arpaIN PTRResponse137.71.91.104.in-addr.arpaIN PTRa104-91-71-137deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request31.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.78.101.95.in-addr.arpaIN PTRResponse209.78.101.95.in-addr.arpaIN PTRa95-101-78-209deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request200.64.52.20.in-addr.arpaIN PTRResponse
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
71.31.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
79.121.231.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
57.110.18.2.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
137.71.91.104.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
31.243.111.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
209.78.101.95.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
200.64.52.20.in-addr.arpa