Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
247s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe
Resource
win10v2004-20221111-en
General
-
Target
b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe
-
Size
183KB
-
MD5
47197a222c8269da3e25248c0eb85020
-
SHA1
2203c2aacdd4bb9e53a40cb11ea9c229395c850c
-
SHA256
b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c
-
SHA512
7c299805338bfa5711d0c46602f7dc319880732f14b2a58f91436e83036e6753801b2cacfe0b3e7151510408ba38753895ae86357e21e9b5aea902b74d7af008
-
SSDEEP
3072:la5bDM8UfVhLuQIReRCoT4o3SfLRrQY+jRSOnhRVE6B2mQ6Z:0M8UE8pqLuYoSahRV72YZ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/988-70-0x0000000002EB0000-0x0000000002ED3000-memory.dmp modiloader_stage2 behavioral1/memory/2040-71-0x00000000003D0000-0x00000000003F3000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2040 6VkcVNHqBQnLCEusHPrg.exe -
Loads dropped DLL 4 IoCs
pid Process 528 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 528 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 2040 6VkcVNHqBQnLCEusHPrg.exe 988 IEXPLORE.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll 6VkcVNHqBQnLCEusHPrg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "1878752322" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0068f5a4e79cc201 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000023b64a3964675b45a225302c88b0affd00000000020000000000106600000001000020000000a7cc6758793ec2b9cff7396ab6decd74cd3e0db893458d3ebc79d6476cf0ac24000000000e8000000002000020000000064f8ba470293b138063457c068fe3ea02c0c6201ef53275a6317679c242e8d920000000976b44ae47535cc4b8dd514dcb468ed7f64fbbad2bc2e71991b910387707e597400000001b4ba2e36f2fdf2cd760a5d1750424e41f6c571c80524086318ea761d1fb2824e0a9cb8d52ad6d16ff3cbe883c2036421806388a13bc090a07765988cf07e76b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD228011-08DA-11D7-BAC4-4ADA2A0CA6C6} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2040 6VkcVNHqBQnLCEusHPrg.exe 2040 6VkcVNHqBQnLCEusHPrg.exe 2040 6VkcVNHqBQnLCEusHPrg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 2040 6VkcVNHqBQnLCEusHPrg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1304 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 528 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 2040 6VkcVNHqBQnLCEusHPrg.exe 1304 iexplore.exe 1304 iexplore.exe 988 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 528 wrote to memory of 2040 528 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 28 PID 528 wrote to memory of 2040 528 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 28 PID 528 wrote to memory of 2040 528 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 28 PID 528 wrote to memory of 2040 528 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 28 PID 528 wrote to memory of 1304 528 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 29 PID 528 wrote to memory of 1304 528 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 29 PID 528 wrote to memory of 1304 528 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 29 PID 528 wrote to memory of 1304 528 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 29 PID 1304 wrote to memory of 988 1304 iexplore.exe 31 PID 1304 wrote to memory of 988 1304 iexplore.exe 31 PID 1304 wrote to memory of 988 1304 iexplore.exe 31 PID 1304 wrote to memory of 988 1304 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe"C:\Users\Admin\AppData\Local\Temp\b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\6VkcVNHqBQnLCEusHPrg.exe"C:\Users\Admin\AppData\Local\Temp\6VkcVNHqBQnLCEusHPrg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RKyTbpj2SFVZv2xU4g13.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1304 CREDAT:275457 /prefetch:23⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD53bd58f86298b8fda0fdd00c78eb7050c
SHA1d2951529c7517882979c459803710a8e98b4826b
SHA25635d970dbeba260c12a6a787aa481da7d4628550d02728d08bc6a0805164b53ea
SHA51272a6c4fb5cfb32800f131c3ad917549372e582f536550d485dd6b73121aebae63381dc9b7b68fbf8367b8c66de8b9af05270b3200ac3060ea5bffd47ecba1d9d
-
Filesize
37KB
MD53e41b107bd3d043d2a26f2192a7b9331
SHA1d55babe838b43e7d28808cec16667b271175e5c4
SHA2561297d577f5043365da90a5a623b4ffa7a3ea66ad217b7df1493206a04726e874
SHA512f852b2d4acb61d282601ead153631aeb5bd440867ee1a0be15514f778f4e57eca4a4eaaab8fba0e663c3ffa36990825f18035b31e99564de2ff4d0b0d2f9f718
-
Filesize
37KB
MD53e41b107bd3d043d2a26f2192a7b9331
SHA1d55babe838b43e7d28808cec16667b271175e5c4
SHA2561297d577f5043365da90a5a623b4ffa7a3ea66ad217b7df1493206a04726e874
SHA512f852b2d4acb61d282601ead153631aeb5bd440867ee1a0be15514f778f4e57eca4a4eaaab8fba0e663c3ffa36990825f18035b31e99564de2ff4d0b0d2f9f718
-
Filesize
38KB
MD548148c5809f32d3fbf12cfc915db5960
SHA13ee2b8f75bf1e0b0aa82a1e9b3cec98b90e47088
SHA2561dcb074c90fb70d2c759318d58488016d896e9849579b07254c34480c5ae781c
SHA512e18270085f4e530422231ad205495d2d9df6e902746ab4716a109d6eabfe3823a244ab816fe932ab395279b4753531f77d001943fc4d8a55ad6434742cc48ffd
-
Filesize
20KB
MD53bd58f86298b8fda0fdd00c78eb7050c
SHA1d2951529c7517882979c459803710a8e98b4826b
SHA25635d970dbeba260c12a6a787aa481da7d4628550d02728d08bc6a0805164b53ea
SHA51272a6c4fb5cfb32800f131c3ad917549372e582f536550d485dd6b73121aebae63381dc9b7b68fbf8367b8c66de8b9af05270b3200ac3060ea5bffd47ecba1d9d
-
Filesize
20KB
MD53bd58f86298b8fda0fdd00c78eb7050c
SHA1d2951529c7517882979c459803710a8e98b4826b
SHA25635d970dbeba260c12a6a787aa481da7d4628550d02728d08bc6a0805164b53ea
SHA51272a6c4fb5cfb32800f131c3ad917549372e582f536550d485dd6b73121aebae63381dc9b7b68fbf8367b8c66de8b9af05270b3200ac3060ea5bffd47ecba1d9d
-
Filesize
37KB
MD53e41b107bd3d043d2a26f2192a7b9331
SHA1d55babe838b43e7d28808cec16667b271175e5c4
SHA2561297d577f5043365da90a5a623b4ffa7a3ea66ad217b7df1493206a04726e874
SHA512f852b2d4acb61d282601ead153631aeb5bd440867ee1a0be15514f778f4e57eca4a4eaaab8fba0e663c3ffa36990825f18035b31e99564de2ff4d0b0d2f9f718
-
Filesize
37KB
MD53e41b107bd3d043d2a26f2192a7b9331
SHA1d55babe838b43e7d28808cec16667b271175e5c4
SHA2561297d577f5043365da90a5a623b4ffa7a3ea66ad217b7df1493206a04726e874
SHA512f852b2d4acb61d282601ead153631aeb5bd440867ee1a0be15514f778f4e57eca4a4eaaab8fba0e663c3ffa36990825f18035b31e99564de2ff4d0b0d2f9f718