Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
183s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 16:16
Behavioral task
behavioral1
Sample
888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe
Resource
win10v2004-20220812-en
General
-
Target
888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe
-
Size
645KB
-
MD5
a05c0a0282db7dbd7aa46d08a1cfe446
-
SHA1
8d08aeb8dba49db71ab414ab9d24eed6416733ab
-
SHA256
888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe
-
SHA512
d732b8de5f7a587de27f3242148d31a6f96c19ef281e3b83f40fef3023ce55049dc61637caf127f484b1651cd92af398c0fc38025ef7acf9bd351eb091cbca94
-
SSDEEP
12288:TjkArEN249AyE/rbaMct4bO2/Vx8afeLdZkdIwcK0rOXc1JEpG7ppakmYSkJ:YFE//Tct4bOsHn4cdcK0qXcDelwJ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral1/files/0x000d0000000054a8-56.dat modiloader_stage2 behavioral1/files/0x000d0000000054a8-57.dat modiloader_stage2 behavioral1/files/0x000d0000000054a8-59.dat modiloader_stage2 behavioral1/files/0x000d0000000054a8-61.dat modiloader_stage2 behavioral1/files/0x000d0000000054a8-62.dat modiloader_stage2 behavioral1/files/0x000800000001339d-64.dat modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 1064 decrypted.exe 2036 mstwain32.exe -
resource yara_rule behavioral1/memory/1432-55-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral1/memory/1432-66-0x0000000000400000-0x00000000004E7000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 1432 888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe 1432 888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe 1064 decrypted.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ mstwain32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA decrypted.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1432-66-0x0000000000400000-0x00000000004E7000-memory.dmp autoit_exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\mstwain32.exe decrypted.exe File opened for modification C:\Windows\mstwain32.exe decrypted.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1064 decrypted.exe Token: SeDebugPrivilege 2036 mstwain32.exe Token: SeDebugPrivilege 2036 mstwain32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 mstwain32.exe 2036 mstwain32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1432 wrote to memory of 1064 1432 888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe 28 PID 1432 wrote to memory of 1064 1432 888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe 28 PID 1432 wrote to memory of 1064 1432 888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe 28 PID 1432 wrote to memory of 1064 1432 888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe 28 PID 1064 wrote to memory of 2036 1064 decrypted.exe 29 PID 1064 wrote to memory of 2036 1064 decrypted.exe 29 PID 1064 wrote to memory of 2036 1064 decrypted.exe 29 PID 1064 wrote to memory of 2036 1064 decrypted.exe 29 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe"C:\Users\Admin\AppData\Local\Temp\888e8631ef70f2d293c13c7220c2880f8ded7dc0eba3bcc9b9e9406837b79fbe.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\decrypted.exeC:\Users\Admin\AppData\Local\Temp\decrypted.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\decrypted.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2036
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD5b86a4a683904ca29be166305d4687a42
SHA156de0d615e83dd8fb3a9968499f006fb4b6b0cbd
SHA2567bef64f152f0aaebf645e1e5623ef283bb62b12b75225f43b53c5d80f01eec6a
SHA512592cff2eeb521c374fdcdab5fb38a6525b041e92c6173007cdd8ad6dd12e137bc877a49418a3d33dd707ba5089c2ee42246ec69dd72cc58a42cd2832cc4e3b63
-
Filesize
270KB
MD5b86a4a683904ca29be166305d4687a42
SHA156de0d615e83dd8fb3a9968499f006fb4b6b0cbd
SHA2567bef64f152f0aaebf645e1e5623ef283bb62b12b75225f43b53c5d80f01eec6a
SHA512592cff2eeb521c374fdcdab5fb38a6525b041e92c6173007cdd8ad6dd12e137bc877a49418a3d33dd707ba5089c2ee42246ec69dd72cc58a42cd2832cc4e3b63
-
Filesize
270KB
MD5b86a4a683904ca29be166305d4687a42
SHA156de0d615e83dd8fb3a9968499f006fb4b6b0cbd
SHA2567bef64f152f0aaebf645e1e5623ef283bb62b12b75225f43b53c5d80f01eec6a
SHA512592cff2eeb521c374fdcdab5fb38a6525b041e92c6173007cdd8ad6dd12e137bc877a49418a3d33dd707ba5089c2ee42246ec69dd72cc58a42cd2832cc4e3b63
-
Filesize
270KB
MD5b86a4a683904ca29be166305d4687a42
SHA156de0d615e83dd8fb3a9968499f006fb4b6b0cbd
SHA2567bef64f152f0aaebf645e1e5623ef283bb62b12b75225f43b53c5d80f01eec6a
SHA512592cff2eeb521c374fdcdab5fb38a6525b041e92c6173007cdd8ad6dd12e137bc877a49418a3d33dd707ba5089c2ee42246ec69dd72cc58a42cd2832cc4e3b63
-
Filesize
270KB
MD5b86a4a683904ca29be166305d4687a42
SHA156de0d615e83dd8fb3a9968499f006fb4b6b0cbd
SHA2567bef64f152f0aaebf645e1e5623ef283bb62b12b75225f43b53c5d80f01eec6a
SHA512592cff2eeb521c374fdcdab5fb38a6525b041e92c6173007cdd8ad6dd12e137bc877a49418a3d33dd707ba5089c2ee42246ec69dd72cc58a42cd2832cc4e3b63
-
Filesize
270KB
MD5b86a4a683904ca29be166305d4687a42
SHA156de0d615e83dd8fb3a9968499f006fb4b6b0cbd
SHA2567bef64f152f0aaebf645e1e5623ef283bb62b12b75225f43b53c5d80f01eec6a
SHA512592cff2eeb521c374fdcdab5fb38a6525b041e92c6173007cdd8ad6dd12e137bc877a49418a3d33dd707ba5089c2ee42246ec69dd72cc58a42cd2832cc4e3b63