Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    113s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/01/2025, 11:33 UTC

General

  • Target

    aa240cf2419b9fbed13bb7f2dc89520be9b878ae2cd5bfafd13bffcf2144492eN.exe

  • Size

    109KB

  • MD5

    7a08d563069578fa0ada87f827675fa0

  • SHA1

    1f997c6c528599df4c44f9fec52b008f8824bfdc

  • SHA256

    aa240cf2419b9fbed13bb7f2dc89520be9b878ae2cd5bfafd13bffcf2144492e

  • SHA512

    215618118510d1879cd51cae97a35060a3d66495d45bf20f1c9b0f8d0963ebc8c0af9934c1bdda2e583a1b9cffe56015a9c834bb1b8d7c54f665976d9ced6c4b

  • SSDEEP

    3072:Koy8j7VnNdrPHaSekwi+mW+2LCK+AMScoutL:68jZ7rvaU3+mWr2K+3ScoSL

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 13 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa240cf2419b9fbed13bb7f2dc89520be9b878ae2cd5bfafd13bffcf2144492eN.exe
    "C:\Users\Admin\AppData\Local\Temp\aa240cf2419b9fbed13bb7f2dc89520be9b878ae2cd5bfafd13bffcf2144492eN.exe"
    1⤵
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Windows\mstwain32.exe
      "C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\aa240cf2419b9fbed13bb7f2dc89520be9b878ae2cd5bfafd13bffcf2144492eN.exe"
      2⤵
      • UAC bypass
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1188
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1944

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    149.220.183.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    149.220.183.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    arraia.no-ip.org
    mstwain32.exe
    Remote address:
    8.8.8.8:53
    Request
    arraia.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    134.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    134.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    28.118.140.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    28.118.140.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    28.118.140.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    28.118.140.52.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    28.118.140.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    28.118.140.52.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    arraia.no-ip.org
    mstwain32.exe
    Remote address:
    8.8.8.8:53
    Request
    arraia.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    arraia.no-ip.org
    mstwain32.exe
    Remote address:
    8.8.8.8:53
    Request
    arraia.no-ip.org
    IN A
  • flag-us
    DNS
    50.23.12.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.23.12.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    50.23.12.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.23.12.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    arraia.no-ip.org
    mstwain32.exe
    Remote address:
    8.8.8.8:53
    Request
    arraia.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    arraia.no-ip.org
    mstwain32.exe
    Remote address:
    8.8.8.8:53
    Request
    arraia.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    86.49.80.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.49.80.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    86.49.80.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.49.80.91.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    92.12.20.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    92.12.20.2.in-addr.arpa
    IN PTR
    Response
    92.12.20.2.in-addr.arpa
    IN PTR
    a2-20-12-92deploystaticakamaitechnologiescom
  • flag-us
    DNS
    92.12.20.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    92.12.20.2.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    arraia.no-ip.org
    mstwain32.exe
    Remote address:
    8.8.8.8:53
    Request
    arraia.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    arraia.no-ip.org
    mstwain32.exe
    Remote address:
    8.8.8.8:53
    Request
    arraia.no-ip.org
    IN A
  • flag-us
    DNS
    arraia.no-ip.org
    mstwain32.exe
    Remote address:
    8.8.8.8:53
    Request
    arraia.no-ip.org
    IN A
  • flag-us
    DNS
    arraia.no-ip.org
    mstwain32.exe
    Remote address:
    8.8.8.8:53
    Request
    arraia.no-ip.org
    IN A
  • flag-us
    DNS
    31.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    31.243.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    31.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    31.243.111.52.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    arraia.no-ip.org
    mstwain32.exe
    Remote address:
    8.8.8.8:53
    Request
    arraia.no-ip.org
    IN A
    Response
No results found
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    149.220.183.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    149.220.183.52.in-addr.arpa

  • 8.8.8.8:53
    arraia.no-ip.org
    dns
    mstwain32.exe
    62 B
    122 B
    1
    1

    DNS Request

    arraia.no-ip.org

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    134.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    134.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    28.118.140.52.in-addr.arpa
    dns
    216 B
    158 B
    3
    1

    DNS Request

    28.118.140.52.in-addr.arpa

    DNS Request

    28.118.140.52.in-addr.arpa

    DNS Request

    28.118.140.52.in-addr.arpa

  • 8.8.8.8:53
    arraia.no-ip.org
    dns
    mstwain32.exe
    124 B
    122 B
    2
    1

    DNS Request

    arraia.no-ip.org

    DNS Request

    arraia.no-ip.org

  • 8.8.8.8:53
    50.23.12.20.in-addr.arpa
    dns
    140 B
    156 B
    2
    1

    DNS Request

    50.23.12.20.in-addr.arpa

    DNS Request

    50.23.12.20.in-addr.arpa

  • 8.8.8.8:53
    arraia.no-ip.org
    dns
    mstwain32.exe
    62 B
    122 B
    1
    1

    DNS Request

    arraia.no-ip.org

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    arraia.no-ip.org
    dns
    mstwain32.exe
    62 B
    122 B
    1
    1

    DNS Request

    arraia.no-ip.org

  • 8.8.8.8:53
    86.49.80.91.in-addr.arpa
    dns
    140 B
    145 B
    2
    1

    DNS Request

    86.49.80.91.in-addr.arpa

    DNS Request

    86.49.80.91.in-addr.arpa

  • 8.8.8.8:53
    92.12.20.2.in-addr.arpa
    dns
    138 B
    131 B
    2
    1

    DNS Request

    92.12.20.2.in-addr.arpa

    DNS Request

    92.12.20.2.in-addr.arpa

  • 8.8.8.8:53
    arraia.no-ip.org
    dns
    mstwain32.exe
    248 B
    122 B
    4
    1

    DNS Request

    arraia.no-ip.org

    DNS Request

    arraia.no-ip.org

    DNS Request

    arraia.no-ip.org

    DNS Request

    arraia.no-ip.org

  • 8.8.8.8:53
    31.243.111.52.in-addr.arpa
    dns
    144 B
    158 B
    2
    1

    DNS Request

    31.243.111.52.in-addr.arpa

    DNS Request

    31.243.111.52.in-addr.arpa

  • 8.8.8.8:53
    arraia.no-ip.org
    dns
    mstwain32.exe
    62 B
    122 B
    1
    1

    DNS Request

    arraia.no-ip.org

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\cmsetac.dll

    Filesize

    33KB

    MD5

    7c3ff4d4d394fde7c693d04c488a55f8

    SHA1

    ae2b2acc7e91a910f9075e0e095b528e97827ba4

    SHA256

    4878bf71fd37ffac1fd6f5153357298544d0ef1f3a114c1f0451befcb85c59a8

    SHA512

    33c601d9e706cff0c3dce8280b040c361aa51004fd20b51946469b6a02453def5a7aad1e5f58bec3435cc6e25470155d07f71dc0f81ec642efc53215d7be316a

  • C:\Windows\mstwain32.exe

    Filesize

    109KB

    MD5

    7a08d563069578fa0ada87f827675fa0

    SHA1

    1f997c6c528599df4c44f9fec52b008f8824bfdc

    SHA256

    aa240cf2419b9fbed13bb7f2dc89520be9b878ae2cd5bfafd13bffcf2144492e

    SHA512

    215618118510d1879cd51cae97a35060a3d66495d45bf20f1c9b0f8d0963ebc8c0af9934c1bdda2e583a1b9cffe56015a9c834bb1b8d7c54f665976d9ced6c4b

  • C:\Windows\ntdtcstp.dll

    Filesize

    7KB

    MD5

    67587e25a971a141628d7f07bd40ffa0

    SHA1

    76fcd014539a3bb247cc0b761225f68bd6055f6b

    SHA256

    e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378

    SHA512

    6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

  • memory/1188-29-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1188-31-0x0000000003220000-0x000000000322E000-memory.dmp

    Filesize

    56KB

  • memory/1188-20-0x0000000000510000-0x0000000000511000-memory.dmp

    Filesize

    4KB

  • memory/1188-59-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1188-24-0x0000000003220000-0x000000000322E000-memory.dmp

    Filesize

    56KB

  • memory/1188-27-0x00000000030D0000-0x00000000030D1000-memory.dmp

    Filesize

    4KB

  • memory/1188-28-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1188-56-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1188-30-0x0000000000520000-0x0000000000528000-memory.dmp

    Filesize

    32KB

  • memory/1188-53-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1188-32-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1188-35-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1188-38-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1188-41-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1188-44-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1188-47-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1188-50-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/4928-12-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/4928-0-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/4928-9-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.