Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
186s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
b7791d1985f604a1e430db1a314d8e668a116368fbdbd1c0eec7c819f794572e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b7791d1985f604a1e430db1a314d8e668a116368fbdbd1c0eec7c819f794572e.exe
Resource
win10v2004-20221111-en
General
-
Target
b7791d1985f604a1e430db1a314d8e668a116368fbdbd1c0eec7c819f794572e.exe
-
Size
369KB
-
MD5
a9f53f717119d87ef37cd69455bdf7c8
-
SHA1
558d1d89590e28d305ad31c3dde0e3b1dd4a9d92
-
SHA256
b7791d1985f604a1e430db1a314d8e668a116368fbdbd1c0eec7c819f794572e
-
SHA512
3168b45551e29474a0c5d267de367c5d343336aa8372e77974f73840fd4f5289a2140134710f7e723cd38033e79016f5a34109269874f6169a6479892882a6d0
-
SSDEEP
6144:0YKgiBqURlqw4FVSa1IOi8ms255DlQMX8Pn6YWiRI716L17Ab:49BqW49jKO8pKMXcnl9RI71u1Ub
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/5116-143-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 behavioral2/memory/5116-144-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 behavioral2/memory/5116-146-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 5016 winini.exe 5116 cvtres.exe -
resource yara_rule behavioral2/memory/5116-137-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/5116-141-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/5116-142-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/5116-143-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/5116-144-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/5116-146-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation b7791d1985f604a1e430db1a314d8e668a116368fbdbd1c0eec7c819f794572e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Live = "C:\\Users\\Admin\\AppData\\winini.exe" winini.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5016 set thread context of 5116 5016 winini.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 5016 winini.exe 5016 winini.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe 5116 cvtres.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5016 winini.exe Token: SeDebugPrivilege 5016 winini.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1712 wrote to memory of 5016 1712 b7791d1985f604a1e430db1a314d8e668a116368fbdbd1c0eec7c819f794572e.exe 85 PID 1712 wrote to memory of 5016 1712 b7791d1985f604a1e430db1a314d8e668a116368fbdbd1c0eec7c819f794572e.exe 85 PID 1712 wrote to memory of 5016 1712 b7791d1985f604a1e430db1a314d8e668a116368fbdbd1c0eec7c819f794572e.exe 85 PID 5016 wrote to memory of 5116 5016 winini.exe 86 PID 5016 wrote to memory of 5116 5016 winini.exe 86 PID 5016 wrote to memory of 5116 5016 winini.exe 86 PID 5016 wrote to memory of 5116 5016 winini.exe 86 PID 5016 wrote to memory of 5116 5016 winini.exe 86 PID 5016 wrote to memory of 5116 5016 winini.exe 86 PID 5016 wrote to memory of 5116 5016 winini.exe 86 PID 5016 wrote to memory of 5116 5016 winini.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7791d1985f604a1e430db1a314d8e668a116368fbdbd1c0eec7c819f794572e.exe"C:\Users\Admin\AppData\Local\Temp\b7791d1985f604a1e430db1a314d8e668a116368fbdbd1c0eec7c819f794572e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\winini.exe"C:\Users\Admin\AppData\winini.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\cvtres.exeC:\Users\Admin\AppData\Local\Temp\\cvtres.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5e118330b4629b12368d91b9df6488be0
SHA1ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA2563a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0
-
Filesize
34KB
MD5e118330b4629b12368d91b9df6488be0
SHA1ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA2563a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0
-
Filesize
81KB
MD5aef8b712ff626582b9d987ffbf9d8418
SHA1105c24ca1d448040ddfdf69ac48438f3c0ce8ca1
SHA256b4278a8b73e26acf0c97fcfcc4f04cb1ec63fceb25aa22028908e7f0bd858997
SHA512d5a99fb67f38a347b0c58b35c5b37e8cda3d2e2b23acef7d743d69bee1b3e357ded05351f20f03786098f7731c29e7b5442f60dfd8f0940b283f92d195143666
-
Filesize
81KB
MD5aef8b712ff626582b9d987ffbf9d8418
SHA1105c24ca1d448040ddfdf69ac48438f3c0ce8ca1
SHA256b4278a8b73e26acf0c97fcfcc4f04cb1ec63fceb25aa22028908e7f0bd858997
SHA512d5a99fb67f38a347b0c58b35c5b37e8cda3d2e2b23acef7d743d69bee1b3e357ded05351f20f03786098f7731c29e7b5442f60dfd8f0940b283f92d195143666