Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
werty.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
werty.exe
Resource
win10v2004-20231215-en
General
-
Target
werty.exe
-
Size
1.0MB
-
MD5
0c5bfdf29140cee7c34fa6166a1755c8
-
SHA1
adbc915a64c49396e67c6d2b6aaaeda987bd9eb5
-
SHA256
9a9f94e9ff3046494728f6f9d12d4da6700b57b38d1a151d24b903f4d41758cd
-
SHA512
cd1b303b9cbdcae35c91f5f5e9efe3f532bde69189fe146f271c84bd258e60e0a66a347fd59247ead197c0abd7d4d208fec895a12aabf51f282d907e4b353f99
-
SSDEEP
24576:IWBKQmXDpp02onnUhfH36pnBDoRUsujZdI/4XPU7eGAzxczoueZ7Z1:IMmTL0Vn2sUud+4XPr4ox
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/files/0x000d0000000122e4-42.dat modiloader_stage2 behavioral1/memory/2652-54-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\Beep.sys werty.exe File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys werty.exe -
Executes dropped EXE 1 IoCs
pid Process 2652 2009_server.exe -
Loads dropped DLL 2 IoCs
pid Process 2416 werty.exe 2416 werty.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt 2009_server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 464 Process not Found 464 Process not Found -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2652 2416 werty.exe 28 PID 2416 wrote to memory of 2652 2416 werty.exe 28 PID 2416 wrote to memory of 2652 2416 werty.exe 28 PID 2416 wrote to memory of 2652 2416 werty.exe 28 PID 2652 wrote to memory of 2084 2652 2009_server.exe 29 PID 2652 wrote to memory of 2084 2652 2009_server.exe 29 PID 2652 wrote to memory of 2084 2652 2009_server.exe 29 PID 2652 wrote to memory of 2084 2652 2009_server.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\werty.exe"C:\Users\Admin\AppData\Local\Temp\werty.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\2009_server.exe"C:\Users\Admin\AppData\Local\Temp\2009_server.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
688KB
MD533a42b59d3e63577a706273e910a8868
SHA104b60b57e9a3b4882c4ccdb16975ce4e11d07ddf
SHA25629f9aa3363a2ea83c4010e07ce277e448059f61c6f4b9882e64561d93815ed87
SHA512049c88aad522e8e4bce6cde525eae5ccd4ed8c774df01f7a866d952fa74ceffb2cd38bcdce5b980859f758685be8f230ad2bf2b79f74bcc5a78a5c917c2fde14