Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    22s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 00:46

General

  • Target

    5166c071608a077ab1fa6d6c7c69f150072603fe33a7dca4558b8945842f0e34.exe

  • Size

    614KB

  • MD5

    64c4b060401081eb18598792c6cab6b9

  • SHA1

    ff1ee61e848a5ae6ae3e7c34bd5c7ae7ed965dab

  • SHA256

    5166c071608a077ab1fa6d6c7c69f150072603fe33a7dca4558b8945842f0e34

  • SHA512

    11730fd2df071641c1554a3e0f48e5784bec89f2d00216565fe3c966d40c562429563921bae38d422c9be63ba3c045fc17492dd2f908cdfd0fd82a0849fe9c0a

  • SSDEEP

    12288:iutrzh9xOXkyPaZf7eClizFGi4bOM/aKjhSVaiknpeOzR/0Oqvr0FJUL+LNinxg:iutr5OUyP0zeAAFG9H/aiSVaTpeYhzqW

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 12 IoCs
  • Executes dropped EXE 4 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5166c071608a077ab1fa6d6c7c69f150072603fe33a7dca4558b8945842f0e34.exe
    "C:\Users\Admin\AppData\Local\Temp\5166c071608a077ab1fa6d6c7c69f150072603fe33a7dca4558b8945842f0e34.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe
      "C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1436
      • C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe
        "C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1408
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C echo>"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe:Zone.Identifier"
          4⤵
          • Drops startup file
          PID:924
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:560
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1376

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\info300.xda

    Filesize

    39B

    MD5

    457fec66679f39ce2c1397241514cd92

    SHA1

    ca450296c8c9936837cf8b144dd463d9bfc51fe9

    SHA256

    01c7e8936ab6b5aae31b84977eb0498623ee0fc70b80a3e3baceb3164d364219

    SHA512

    6f26234577589095c81e2bc0cded79e22924c32f6710bef344b0183d10cc5953d323bf03d63c1075500d7235148125519b1d9eb0f8ac41ee478ff1c33446d386

  • C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • C:\Users\Admin\AppData\Roaming\info300.xda

    Filesize

    39B

    MD5

    457fec66679f39ce2c1397241514cd92

    SHA1

    ca450296c8c9936837cf8b144dd463d9bfc51fe9

    SHA256

    01c7e8936ab6b5aae31b84977eb0498623ee0fc70b80a3e3baceb3164d364219

    SHA512

    6f26234577589095c81e2bc0cded79e22924c32f6710bef344b0183d10cc5953d323bf03d63c1075500d7235148125519b1d9eb0f8ac41ee478ff1c33446d386

  • \Users\Admin\AppData\Local\Temp\ptpmcc.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • \Users\Admin\AppData\Local\Temp\ptpmcc.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • \Users\Admin\AppData\Local\Temp\ptpmcc.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • memory/1376-98-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/1376-101-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/1408-62-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/1408-74-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/1408-73-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/1408-71-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/1408-69-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/1408-67-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/1408-64-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/1408-100-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/1952-54-0x00000000762F1000-0x00000000762F3000-memory.dmp

    Filesize

    8KB