Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
032185fbaca47a4f4e6e61dde810715d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
032185fbaca47a4f4e6e61dde810715d.exe
Resource
win10v2004-20231215-en
General
-
Target
032185fbaca47a4f4e6e61dde810715d.exe
-
Size
744KB
-
MD5
032185fbaca47a4f4e6e61dde810715d
-
SHA1
dd7be1f4780d053c14a617872cdd03802d5120d2
-
SHA256
01056966c39bc71d4cead1f28689d02f211ca8be360bdc58dd0844ed3d03e77d
-
SHA512
8b614c17adeecdfe67d205c35769e660715efd77be412681bd0c8661632c987e431e9a21519f2dc2fe00cdd119f7561242bc3dbc373333e2bd49554fdde58f6d
-
SSDEEP
12288:vT+cEyQ6KDYOMwRCYrzqpiO+T6rdV9NdqDywi023t9MUCaCk30bj:vTnQ6SYOM6CUzqpiO+Taj9NdqDywyd9o
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 18 IoCs
resource yara_rule behavioral1/memory/620-0-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/620-2-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/620-13-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-16-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-24-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-25-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-26-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-28-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-29-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-31-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-32-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-33-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-34-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-35-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-36-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-37-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-38-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 behavioral1/memory/2464-39-0x0000000000400000-0x00000000004E8000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2464 mstwain32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 032185fbaca47a4f4e6e61dde810715d.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mstwain32.exe 032185fbaca47a4f4e6e61dde810715d.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe File created C:\Windows\mstwain32.exe 032185fbaca47a4f4e6e61dde810715d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 620 032185fbaca47a4f4e6e61dde810715d.exe Token: SeBackupPrivilege 2096 vssvc.exe Token: SeRestorePrivilege 2096 vssvc.exe Token: SeAuditPrivilege 2096 vssvc.exe Token: SeDebugPrivilege 2464 mstwain32.exe Token: SeDebugPrivilege 2464 mstwain32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 620 032185fbaca47a4f4e6e61dde810715d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2464 mstwain32.exe 2464 mstwain32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 620 wrote to memory of 2464 620 032185fbaca47a4f4e6e61dde810715d.exe 31 PID 620 wrote to memory of 2464 620 032185fbaca47a4f4e6e61dde810715d.exe 31 PID 620 wrote to memory of 2464 620 032185fbaca47a4f4e6e61dde810715d.exe 31 PID 620 wrote to memory of 2464 620 032185fbaca47a4f4e6e61dde810715d.exe 31 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\032185fbaca47a4f4e6e61dde810715d.exe"C:\Users\Admin\AppData\Local\Temp\032185fbaca47a4f4e6e61dde810715d.exe"1⤵
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2464
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2096
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD5032185fbaca47a4f4e6e61dde810715d
SHA1dd7be1f4780d053c14a617872cdd03802d5120d2
SHA25601056966c39bc71d4cead1f28689d02f211ca8be360bdc58dd0844ed3d03e77d
SHA5128b614c17adeecdfe67d205c35769e660715efd77be412681bd0c8661632c987e431e9a21519f2dc2fe00cdd119f7561242bc3dbc373333e2bd49554fdde58f6d