Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:32
Behavioral task
behavioral1
Sample
0a2a8452f3796c22a82d3720b0064fa9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a2a8452f3796c22a82d3720b0064fa9.exe
Resource
win10v2004-20231215-en
General
-
Target
0a2a8452f3796c22a82d3720b0064fa9.exe
-
Size
158KB
-
MD5
0a2a8452f3796c22a82d3720b0064fa9
-
SHA1
10efc92389432a1e4205ffe7464fa48d20c54b75
-
SHA256
42ece1468a2eaac7f6e5a1d5de69249e561197d645c5192065226b760e524fbb
-
SHA512
b27572282d90644a4becc0118af6d04f4b864c6777b03e24349e2842be6e7b647c11162b91c773c89eb025df3eccfd33ee7548b519a102856f4e3826aa813828
-
SSDEEP
3072:6zc2FfZhN4rNGvjxnZzPRo8SZp67e6uDQi3rFWT5z2ZFsq/sVkU/MIWNbNYvtI:n25ZziSXt3Sb3DQi3rFW16Hb0kF
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2948-0-0x0000000000400000-0x000000000046B000-memory.dmp modiloader_stage2 behavioral1/memory/2948-8-0x0000000000400000-0x000000000046B000-memory.dmp modiloader_stage2 behavioral1/memory/2948-9-0x0000000000400000-0x000000000046B000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral1/memory/2948-0-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2948-8-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2948-9-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\advpacck.dll 0a2a8452f3796c22a82d3720b0064fa9.exe File created C:\Windows\SysWOW64\FNTemper.exe 0a2a8452f3796c22a82d3720b0064fa9.exe File opened for modification C:\Windows\SysWOW64\FNTemper.exe 0a2a8452f3796c22a82d3720b0064fa9.exe File created C:\Windows\SysWOW64\advpacck.dll 0a2a8452f3796c22a82d3720b0064fa9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2948 0a2a8452f3796c22a82d3720b0064fa9.exe