Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
03a2cf836e01c4bbda317dff5f0bc869.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03a2cf836e01c4bbda317dff5f0bc869.exe
Resource
win10v2004-20231215-en
General
-
Target
03a2cf836e01c4bbda317dff5f0bc869.exe
-
Size
279KB
-
MD5
03a2cf836e01c4bbda317dff5f0bc869
-
SHA1
9f0746dc4f9698b7b5916f4327bfb50e27ef73d8
-
SHA256
ed68d679c7ebc0a1b23b215cda2d370a0da53ca08a8d296ffda986a434ff6596
-
SHA512
aeb876ed448acd8a11d4d5da22fc92c1d755990bac4ac8935bfd52bd431d4c96a94c517c1d74f62be74a429c3eebc52e3d9d922919de66d8c7e1c0566e14c4db
-
SSDEEP
6144:nR0XMxh2JejPu6nDSCejtRbxZaBwoJjkE5Mx7xSw33V0dLOwm:OXMxhMebBDnSxE7jkIImFdm
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2208-32-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 behavioral1/memory/2004-34-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 behavioral1/memory/2208-42-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 284 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 QQ.exe -
Loads dropped DLL 5 IoCs
pid Process 2208 03a2cf836e01c4bbda317dff5f0bc869.exe 2208 03a2cf836e01c4bbda317dff5f0bc869.exe 2852 WerFault.exe 2852 WerFault.exe 2852 WerFault.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\T: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\V: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\W: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\E: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\G: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\J: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\K: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\N: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\O: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\Q: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\S: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\M: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\Z: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\A: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\H: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\I: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\L: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\Y: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\B: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\R: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\U: 03a2cf836e01c4bbda317dff5f0bc869.exe File opened (read-only) \??\X: 03a2cf836e01c4bbda317dff5f0bc869.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AutoRun.inf 03a2cf836e01c4bbda317dff5f0bc869.exe File created F:\AutoRun.inf 03a2cf836e01c4bbda317dff5f0bc869.exe File opened for modification F:\AutoRun.inf 03a2cf836e01c4bbda317dff5f0bc869.exe File created C:\AutoRun.inf 03a2cf836e01c4bbda317dff5f0bc869.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\QQ.exe 03a2cf836e01c4bbda317dff5f0bc869.exe File opened for modification C:\Program Files\QQ.exe 03a2cf836e01c4bbda317dff5f0bc869.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\_QQ.exe QQ.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\_QQ.exe QQ.exe File created C:\Program Files\Delet.bat 03a2cf836e01c4bbda317dff5f0bc869.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2852 2004 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2004 2208 03a2cf836e01c4bbda317dff5f0bc869.exe 28 PID 2208 wrote to memory of 2004 2208 03a2cf836e01c4bbda317dff5f0bc869.exe 28 PID 2208 wrote to memory of 2004 2208 03a2cf836e01c4bbda317dff5f0bc869.exe 28 PID 2208 wrote to memory of 2004 2208 03a2cf836e01c4bbda317dff5f0bc869.exe 28 PID 2004 wrote to memory of 2852 2004 QQ.exe 29 PID 2004 wrote to memory of 2852 2004 QQ.exe 29 PID 2004 wrote to memory of 2852 2004 QQ.exe 29 PID 2004 wrote to memory of 2852 2004 QQ.exe 29 PID 2208 wrote to memory of 284 2208 03a2cf836e01c4bbda317dff5f0bc869.exe 32 PID 2208 wrote to memory of 284 2208 03a2cf836e01c4bbda317dff5f0bc869.exe 32 PID 2208 wrote to memory of 284 2208 03a2cf836e01c4bbda317dff5f0bc869.exe 32 PID 2208 wrote to memory of 284 2208 03a2cf836e01c4bbda317dff5f0bc869.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\03a2cf836e01c4bbda317dff5f0bc869.exe"C:\Users\Admin\AppData\Local\Temp\03a2cf836e01c4bbda317dff5f0bc869.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files\QQ.exe"C:\Program Files\QQ.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 2923⤵
- Loads dropped DLL
- Program crash
PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Delet.bat""2⤵
- Deletes itself
PID:284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5ee0a7a8ec30438e0cbc5c5f919a152ac
SHA120abae314cdf81ec39745c7d98457557e883d7dc
SHA256e9727e76aedc97f4e189dd5d1c5fcfe3fd24f9613d464bccd08400855a3f1584
SHA51232b5011702396554439f7293aada7726518ecc8cabae3b8036b8945e269bb2c95d3523f99b527ad1211aa41367747d3c24273fd11d83998f307358f45b6b3618
-
Filesize
279KB
MD503a2cf836e01c4bbda317dff5f0bc869
SHA19f0746dc4f9698b7b5916f4327bfb50e27ef73d8
SHA256ed68d679c7ebc0a1b23b215cda2d370a0da53ca08a8d296ffda986a434ff6596
SHA512aeb876ed448acd8a11d4d5da22fc92c1d755990bac4ac8935bfd52bd431d4c96a94c517c1d74f62be74a429c3eebc52e3d9d922919de66d8c7e1c0566e14c4db