Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/12/2024, 16:52

General

  • Target

    Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmd

  • Size

    3.2MB

  • MD5

    5f351f07b94613764a8bc09970bbcd58

  • SHA1

    47fcfcac926a0007010b7afb776671d2276b8b81

  • SHA256

    2a81c419a9fcd1eb9f778dba6911c366586b0ae9a5cf2cd25155413bfbff9eea

  • SHA512

    49ddfcc8f58117ec824e35b1a2bf6928cf580e4337a8f9aa1d7d4dc62a6e93bb811702d0ed2c970f1f0a08b013ffc5ba6dcc6951c6d59f9a0d7915c3b9f3baae

  • SSDEEP

    24576:/EldPvpS3bi8Kz95FnA8S21f063u9vsk/ZkSgR+lY1Q7FZU1n9dJCNUeE1Zperr8:/ARo3biB55HSwTBvfbb

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Executes dropped EXE 8 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4936
    • C:\Windows\System32\extrac32.exe
      C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
      2⤵
        PID:4136
      • C:\Users\Public\alpha.exe
        C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:728
        • C:\Windows\system32\extrac32.exe
          extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
          3⤵
            PID:2884
        • C:\Users\Public\alpha.exe
          C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmd" "C:\\Users\\Public\\AnyDesk.jpeg" 9
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3184
          • C:\Users\Public\kn.exe
            C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmd" "C:\\Users\\Public\\AnyDesk.jpeg" 9
            3⤵
            • Executes dropped EXE
            PID:2208
        • C:\Users\Public\alpha.exe
          C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:5004
          • C:\Users\Public\kn.exe
            C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12
            3⤵
            • Executes dropped EXE
            PID:2180
        • C:\Users\Public\Libraries\AnyDesk.PIF
          C:\Users\Public\Libraries\AnyDesk.PIF
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3088
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 1476
            3⤵
            • Program crash
            PID:728
        • C:\Users\Public\alpha.exe
          C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
          2⤵
          • Executes dropped EXE
          PID:3204
        • C:\Users\Public\alpha.exe
          C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\AnyDesk.jpeg" / A / F / Q / S
          2⤵
          • Executes dropped EXE
          PID:1728
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3088 -ip 3088
        1⤵
          PID:4488

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Public\AnyDesk.jpeg

          Filesize

          2.3MB

          MD5

          04ad7e38aa2f399b5862e6267697632a

          SHA1

          a30e9c94bb215f0b96a651432f8f74f4a06284de

          SHA256

          da4101eba193661f3016d2b4b6328cf8d0cb16ac58c1470683bc07d8baf34ebe

          SHA512

          b7cacc98c0d5c7b3f03cde8b294cb6534be25c560e78c6cf5304285774b56493e98346152a587162d1347eddc7f751bd164a78dd257383b0b59b37d89d6ba5a8

        • C:\Users\Public\Libraries\AnyDesk.PIF

          Filesize

          1.2MB

          MD5

          2ef70d96354cc04d9168e8f69e7b17a0

          SHA1

          92eee1bb5de4f4d50805101b83e4a3a1a602856b

          SHA256

          5842b3e5271efed831bf21f4821431bb1a7dcc94bafab135b62d34bfdb32f503

          SHA512

          3c46f059b5e2c806efdfea71dad8bcc236bfc753dc3b15e637d6697231313b68232d0f4bc6921b41ed76f2471891718678ec7b6c6dda0a5d7c9f7ae8a57580b3

        • C:\Users\Public\alpha.exe

          Filesize

          283KB

          MD5

          8a2122e8162dbef04694b9c3e0b6cdee

          SHA1

          f1efb0fddc156e4c61c5f78a54700e4e7984d55d

          SHA256

          b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

          SHA512

          99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

        • C:\Users\Public\kn.exe

          Filesize

          1.6MB

          MD5

          bd8d9943a9b1def98eb83e0fa48796c2

          SHA1

          70e89852f023ab7cde0173eda1208dbb580f1e4f

          SHA256

          8de7b4eb1301d6cbe4ea2c8d13b83280453eb64e3b3c80756bbd1560d65ca4d2

          SHA512

          95630fdddad5db60cc97ec76ee1ca02dbb00ee3de7d6957ecda8968570e067ab2a9df1cc07a3ce61161a994acbe8417c83661320b54d04609818009a82552f7b

        • memory/3088-28-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-30-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-32-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-36-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-47-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-58-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-46-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-45-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-44-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-43-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-51-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-42-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-50-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-41-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-48-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-49-0x0000000000400000-0x0000000000535000-memory.dmp

          Filesize

          1.2MB

        • memory/3088-40-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-39-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-38-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-37-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-35-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-34-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-33-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-59-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-78-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-91-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-90-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-88-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-87-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-86-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-85-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-83-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-82-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-81-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-80-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-79-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-77-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-76-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-75-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-70-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-68-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-67-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-65-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-64-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-92-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-63-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-89-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-84-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-60-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-74-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-57-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-73-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-56-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-72-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-71-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-55-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-69-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-54-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-53-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-66-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-52-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-62-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB

        • memory/3088-61-0x0000000002DC0000-0x0000000003DC0000-memory.dmp

          Filesize

          16.0MB