Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 23:52

General

  • Target

    4477f18dd7c26460aac7ab05037856c9.exe

  • Size

    81KB

  • MD5

    4477f18dd7c26460aac7ab05037856c9

  • SHA1

    48aae5909f578099bad1550a6c7df1d428510caa

  • SHA256

    75f8698db4323f665414faf452d28c712773100b28e03864d9bc6f0954e3131f

  • SHA512

    ac95c879159ded4e69c06853627cd482a482abed0751b9b645a9cd96a4c2755184adcd6cdf1cf497dc9f5123f94ac1a85ee388ddec9053b924d8c3e25a43b94c

  • SSDEEP

    1536:NtfFlsrCnE036fjBpQoSoc7yNiDduR7Re8VJIx2nOnVk3BcW:NpqDfnQoPcCGsQ4JypVkC

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4477f18dd7c26460aac7ab05037856c9.exe
    "C:\Users\Admin\AppData\Local\Temp\4477f18dd7c26460aac7ab05037856c9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\server.pif
      "C:\Users\Admin\AppData\Local\Temp\server.pif"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3024
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1392
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:2092

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\get-6-2010-almlf_com_fx9m56hw.jpg

      Filesize

      39KB

      MD5

      f94798296ee887464332036a09f3d804

      SHA1

      e463dc58ccf9a07b356f20a8d9ee7cd856ec4f6d

      SHA256

      dd3ac32bee1c6b53f49c4252e2e932bc0fca9c81e328189b38bb1310a77dab3b

      SHA512

      9ce07d6dddad3bf28326f6877d16e68598b8d03d212b0857ccbc761b24ee96a0687d0db8d09849b309df3a2f5b7b13a48a7e221325d28549c014fd8381c62e42

    • \Users\Admin\AppData\Local\Temp\server.pif

      Filesize

      31KB

      MD5

      a97a2176643838c3ded803a19d0d9101

      SHA1

      9ffad5f242febd9c54bf95dc7b465c050f629945

      SHA256

      1af5b7abcaf0aa5f2eb53e76fe609f8a1b2ab7cd67da2d4651352d98a46e0bd5

      SHA512

      364bb17112522ffa2ba45257a00688249088c88d3509129cd882af5b1f307f2fea22196d8fc69d5373302c2f73b711008c86b73dc78c33a79d1f1dd802a4f29b

    • memory/1392-23-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

      Filesize

      4KB

    • memory/1392-19-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/2092-16-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/2092-33-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/2092-14-0x00000000001F0000-0x00000000001F2000-memory.dmp

      Filesize

      8KB

    • memory/3024-12-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3024-22-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/3024-32-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3060-15-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/3060-13-0x0000000002840000-0x0000000002842000-memory.dmp

      Filesize

      8KB

    • memory/3060-4-0x0000000002AF0000-0x0000000002AF9000-memory.dmp

      Filesize

      36KB

    • memory/3060-9-0x0000000002AF0000-0x0000000002AF9000-memory.dmp

      Filesize

      36KB