Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe
Resource
win10v2004-20220901-en
General
-
Target
b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe
-
Size
958KB
-
MD5
05aba4cc82b80da0e989dde8a7740d8b
-
SHA1
01a42eeb2e13b6214d0db6af7d6daa6fdda3f818
-
SHA256
b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1
-
SHA512
19c40937f1c3f92eb20e32dded9a4305e02f92e09d463fa2cf55d5049144150b9766caf9fb9dcad12ea49c388091a72bce341154f97f6ef2bedec32562630675
-
SSDEEP
12288:BOz6myAFq+8MU0nQ0yWg7CfKaEtRIzkdF4Tm8cHPa9qgbcLARXkS/3Ce/aL4/wcr:BUNH9QYg7htj4ePaE9kKS/3Ce/9TZs
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral2/memory/3116-133-0x0000000000400000-0x000000000086A000-memory.dmp modiloader_stage2 behavioral2/memory/3116-139-0x0000000000400000-0x000000000086A000-memory.dmp modiloader_stage2 behavioral2/memory/1672-140-0x0000000000400000-0x000000000086A000-memory.dmp modiloader_stage2 behavioral2/memory/1672-141-0x0000000000400000-0x000000000086A000-memory.dmp modiloader_stage2 behavioral2/memory/1672-142-0x0000000000400000-0x000000000086A000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1672 camfrags.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 1672 camfrags.exe 1672 camfrags.exe 1672 camfrags.exe 1672 camfrags.exe 1672 camfrags.exe 1672 camfrags.exe 1672 camfrags.exe 1672 camfrags.exe 1672 camfrags.exe 1672 camfrags.exe 1672 camfrags.exe 1672 camfrags.exe 1672 camfrags.exe 1672 camfrags.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\camfrags.exe b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe File opened for modification C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\camfrags.exe b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3116 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 1672 camfrags.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3116 wrote to memory of 1672 3116 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 80 PID 3116 wrote to memory of 1672 3116 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 80 PID 3116 wrote to memory of 1672 3116 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 80 PID 3116 wrote to memory of 5096 3116 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 81 PID 3116 wrote to memory of 5096 3116 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 81 PID 3116 wrote to memory of 5096 3116 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe"C:\Users\Admin\AppData\Local\Temp\b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\camfrags.exeC:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\camfrags.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe"2⤵PID:5096
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
958KB
MD505aba4cc82b80da0e989dde8a7740d8b
SHA101a42eeb2e13b6214d0db6af7d6daa6fdda3f818
SHA256b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1
SHA51219c40937f1c3f92eb20e32dded9a4305e02f92e09d463fa2cf55d5049144150b9766caf9fb9dcad12ea49c388091a72bce341154f97f6ef2bedec32562630675
-
Filesize
958KB
MD505aba4cc82b80da0e989dde8a7740d8b
SHA101a42eeb2e13b6214d0db6af7d6daa6fdda3f818
SHA256b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1
SHA51219c40937f1c3f92eb20e32dded9a4305e02f92e09d463fa2cf55d5049144150b9766caf9fb9dcad12ea49c388091a72bce341154f97f6ef2bedec32562630675