Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
192s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe
Resource
win10v2004-20221111-en
General
-
Target
b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe
-
Size
183KB
-
MD5
47197a222c8269da3e25248c0eb85020
-
SHA1
2203c2aacdd4bb9e53a40cb11ea9c229395c850c
-
SHA256
b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c
-
SHA512
7c299805338bfa5711d0c46602f7dc319880732f14b2a58f91436e83036e6753801b2cacfe0b3e7151510408ba38753895ae86357e21e9b5aea902b74d7af008
-
SSDEEP
3072:la5bDM8UfVhLuQIReRCoT4o3SfLRrQY+jRSOnhRVE6B2mQ6Z:0M8UE8pqLuYoSahRV72YZ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/3132-138-0x0000000000530000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral2/memory/3132-139-0x0000000000530000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral2/memory/3900-143-0x0000000002DF0000-0x0000000002E13000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 3132 pdbTmLaAYOAo8v5ScRfM.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe -
Loads dropped DLL 4 IoCs
pid Process 3132 pdbTmLaAYOAo8v5ScRfM.exe 3132 pdbTmLaAYOAo8v5ScRfM.exe 3900 IEXPLORE.EXE 3900 IEXPLORE.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll pdbTmLaAYOAo8v5ScRfM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007d7a79cee4b8944a9842641f07820366000000000200000000001066000000010000200000008fb576149c8b6ebde5a3cc037c958306585963516bd08e35705bad6e98c367b0000000000e8000000002000020000000dda07dceb0d60dcabfce02dda85e81132ac5214b37dfa4b21b79b59a8831054c20000000f139d1fe592d0c9448bd78f3488422dee18c1090237ee50599187256e377f0c2400000008d0067c287ee4a886bacb8914a735901b1b34a2032417a09db839082debe72dd698795ea6e841bf1caaa379f1f1e5d2c4aec084fff6d7af2239bbaac9ff49b0a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007d7a79cee4b8944a9842641f0782036600000000020000000000106600000001000020000000a0509e8b2edab16597f3f5a26eb98c1308f9522943dbbae5fc62b4b862528be8000000000e8000000002000020000000715b045591b605a1ff193b2b7cd3a7622a5ca25abc7960b45aa0ef3a3220a2292000000081c01325cedc81b047e2a3a10f2491ad8ec89714f7a1a545245e902160ee4180400000001398005c77feb7886d44a6b9625a482cf64d3406209670e2e0b17a832aae26323bcc05e26f74fa5dbbb58949bdcdeceaf6e6c7f3f06c75f67b0e283019eabe6f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9280528B-08DA-11D7-91A0-CA6849833421} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00297672e79cc201 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b8ee76e79cc201 iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3132 pdbTmLaAYOAo8v5ScRfM.exe 3132 pdbTmLaAYOAo8v5ScRfM.exe 3132 pdbTmLaAYOAo8v5ScRfM.exe 3132 pdbTmLaAYOAo8v5ScRfM.exe 3132 pdbTmLaAYOAo8v5ScRfM.exe 3132 pdbTmLaAYOAo8v5ScRfM.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 3132 pdbTmLaAYOAo8v5ScRfM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 204 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1524 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 3132 pdbTmLaAYOAo8v5ScRfM.exe 204 iexplore.exe 204 iexplore.exe 3900 IEXPLORE.EXE 3900 IEXPLORE.EXE 3900 IEXPLORE.EXE 3900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1524 wrote to memory of 3132 1524 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 82 PID 1524 wrote to memory of 3132 1524 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 82 PID 1524 wrote to memory of 3132 1524 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 82 PID 1524 wrote to memory of 204 1524 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 84 PID 1524 wrote to memory of 204 1524 b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe 84 PID 204 wrote to memory of 3900 204 iexplore.exe 87 PID 204 wrote to memory of 3900 204 iexplore.exe 87 PID 204 wrote to memory of 3900 204 iexplore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe"C:\Users\Admin\AppData\Local\Temp\b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\pdbTmLaAYOAo8v5ScRfM.exe"C:\Users\Admin\AppData\Local\Temp\pdbTmLaAYOAo8v5ScRfM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3132
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\iK4OfkKK0GIO8TCQUtW0.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:204 CREDAT:17410 /prefetch:23⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3900
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD53bd58f86298b8fda0fdd00c78eb7050c
SHA1d2951529c7517882979c459803710a8e98b4826b
SHA25635d970dbeba260c12a6a787aa481da7d4628550d02728d08bc6a0805164b53ea
SHA51272a6c4fb5cfb32800f131c3ad917549372e582f536550d485dd6b73121aebae63381dc9b7b68fbf8367b8c66de8b9af05270b3200ac3060ea5bffd47ecba1d9d
-
Filesize
20KB
MD53bd58f86298b8fda0fdd00c78eb7050c
SHA1d2951529c7517882979c459803710a8e98b4826b
SHA25635d970dbeba260c12a6a787aa481da7d4628550d02728d08bc6a0805164b53ea
SHA51272a6c4fb5cfb32800f131c3ad917549372e582f536550d485dd6b73121aebae63381dc9b7b68fbf8367b8c66de8b9af05270b3200ac3060ea5bffd47ecba1d9d
-
Filesize
20KB
MD53bd58f86298b8fda0fdd00c78eb7050c
SHA1d2951529c7517882979c459803710a8e98b4826b
SHA25635d970dbeba260c12a6a787aa481da7d4628550d02728d08bc6a0805164b53ea
SHA51272a6c4fb5cfb32800f131c3ad917549372e582f536550d485dd6b73121aebae63381dc9b7b68fbf8367b8c66de8b9af05270b3200ac3060ea5bffd47ecba1d9d
-
Filesize
20KB
MD53bd58f86298b8fda0fdd00c78eb7050c
SHA1d2951529c7517882979c459803710a8e98b4826b
SHA25635d970dbeba260c12a6a787aa481da7d4628550d02728d08bc6a0805164b53ea
SHA51272a6c4fb5cfb32800f131c3ad917549372e582f536550d485dd6b73121aebae63381dc9b7b68fbf8367b8c66de8b9af05270b3200ac3060ea5bffd47ecba1d9d
-
Filesize
20KB
MD53bd58f86298b8fda0fdd00c78eb7050c
SHA1d2951529c7517882979c459803710a8e98b4826b
SHA25635d970dbeba260c12a6a787aa481da7d4628550d02728d08bc6a0805164b53ea
SHA51272a6c4fb5cfb32800f131c3ad917549372e582f536550d485dd6b73121aebae63381dc9b7b68fbf8367b8c66de8b9af05270b3200ac3060ea5bffd47ecba1d9d
-
Filesize
38KB
MD548148c5809f32d3fbf12cfc915db5960
SHA13ee2b8f75bf1e0b0aa82a1e9b3cec98b90e47088
SHA2561dcb074c90fb70d2c759318d58488016d896e9849579b07254c34480c5ae781c
SHA512e18270085f4e530422231ad205495d2d9df6e902746ab4716a109d6eabfe3823a244ab816fe932ab395279b4753531f77d001943fc4d8a55ad6434742cc48ffd
-
Filesize
37KB
MD53e41b107bd3d043d2a26f2192a7b9331
SHA1d55babe838b43e7d28808cec16667b271175e5c4
SHA2561297d577f5043365da90a5a623b4ffa7a3ea66ad217b7df1493206a04726e874
SHA512f852b2d4acb61d282601ead153631aeb5bd440867ee1a0be15514f778f4e57eca4a4eaaab8fba0e663c3ffa36990825f18035b31e99564de2ff4d0b0d2f9f718
-
Filesize
37KB
MD53e41b107bd3d043d2a26f2192a7b9331
SHA1d55babe838b43e7d28808cec16667b271175e5c4
SHA2561297d577f5043365da90a5a623b4ffa7a3ea66ad217b7df1493206a04726e874
SHA512f852b2d4acb61d282601ead153631aeb5bd440867ee1a0be15514f778f4e57eca4a4eaaab8fba0e663c3ffa36990825f18035b31e99564de2ff4d0b0d2f9f718