Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
19855febe87d07f746f7809f3c0d7d24.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
19855febe87d07f746f7809f3c0d7d24.exe
Resource
win10v2004-20231222-en
General
-
Target
19855febe87d07f746f7809f3c0d7d24.exe
-
Size
611KB
-
MD5
19855febe87d07f746f7809f3c0d7d24
-
SHA1
1446bbb187148e458d39fb5d75f4653325b92300
-
SHA256
e3b460d725925124eebda2b6a08c641056db2dc5b4ffd957dc11361c1a6a2247
-
SHA512
700caa9f1b8925f76ba221666ecc28a0579514e15fbeaad2eb330b4ea45ed92ba8cc4d0386105d21c525cfda9c0ebf238ea0a95bbfbd0f8b70fc25fae6ff7d42
-
SSDEEP
12288:6DvQ93MYXE2RuwkBFAEaTGCYifEeYEvvwfwHF3Z4mxxcg4DE9YpKN2Fx:6DvQ9hXxVuFfpCY/ePvvwfwHQmXVZ9qL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/916-28-0x0000000000400000-0x000000000058F000-memory.dmp modiloader_stage2 behavioral2/memory/916-33-0x0000000000400000-0x000000000058F000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 19855febe87d07f746f7809f3c0d7d24.exe -
Executes dropped EXE 1 IoCs
pid Process 916 2008_serve.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\2008_serve.jpg 19855febe87d07f746f7809f3c0d7d24.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3224 wrote to memory of 916 3224 19855febe87d07f746f7809f3c0d7d24.exe 19 PID 3224 wrote to memory of 916 3224 19855febe87d07f746f7809f3c0d7d24.exe 19 PID 3224 wrote to memory of 916 3224 19855febe87d07f746f7809f3c0d7d24.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\19855febe87d07f746f7809f3c0d7d24.exe"C:\Users\Admin\AppData\Local\Temp\19855febe87d07f746f7809f3c0d7d24.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\program files\common files\microsoft shared\msinfo\2008_serve.exe"C:\program files\common files\microsoft shared\msinfo\2008_serve.exe"2⤵
- Executes dropped EXE
PID:916
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"1⤵PID:2920