Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 01:50
Behavioral task
behavioral1
Sample
2365e5ae55ff69806a18f70f0802d8e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2365e5ae55ff69806a18f70f0802d8e3.exe
Resource
win10v2004-20231222-en
General
-
Target
2365e5ae55ff69806a18f70f0802d8e3.exe
-
Size
392KB
-
MD5
2365e5ae55ff69806a18f70f0802d8e3
-
SHA1
19f5493319b988c950482f749901846fdb2f676f
-
SHA256
6e6aef49afd787d07ac598538f2c83e8690a0d7f4a79da6944b2b70e90b1b9eb
-
SHA512
50dd7a5991592454f2373daf8d5bbd2ebe2bf1fe2097c8c372771a709c2f512ba44709ad8181bf1a9d9a24bbf28dc9591e36fe606d0711231bece4d7e47cf89e
-
SSDEEP
6144:1bx1JNRm9uXcUy8yp8imvbkaKNjOG6O65s0mjY5WwAYa7zQ07qKLwkaupcP2BJDY:xJNRmOc6fbkvAGpPLjxzUuiPIsBH
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe ZReload.scr" csrss.exe -
ModiLoader Second Stage 12 IoCs
resource yara_rule behavioral1/memory/2404-1-0x0000000000010000-0x0000000000079000-memory.dmp modiloader_stage2 behavioral1/files/0x000d0000000122cf-5.dat modiloader_stage2 behavioral1/memory/2404-15-0x0000000000010000-0x0000000000079000-memory.dmp modiloader_stage2 behavioral1/memory/2656-17-0x00000000005B0000-0x000000000065D000-memory.dmp modiloader_stage2 behavioral1/memory/2656-18-0x0000000000430000-0x00000000004DA000-memory.dmp modiloader_stage2 behavioral1/files/0x0028000000015596-22.dat modiloader_stage2 behavioral1/files/0x0028000000015596-24.dat modiloader_stage2 behavioral1/files/0x0028000000015596-41.dat modiloader_stage2 behavioral1/memory/2976-44-0x0000000000010000-0x0000000000079000-memory.dmp modiloader_stage2 behavioral1/memory/2596-46-0x0000000000460000-0x000000000050A000-memory.dmp modiloader_stage2 behavioral1/memory/2656-33-0x0000000000430000-0x00000000004DA000-memory.dmp modiloader_stage2 behavioral1/memory/2596-79-0x0000000000460000-0x000000000050A000-memory.dmp modiloader_stage2 -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\services.exe csrss.exe -
Executes dropped EXE 3 IoCs
pid Process 2976 csrss.exe 2596 csrss.exe 2800 services.exe -
Loads dropped DLL 4 IoCs
pid Process 2404 2365e5ae55ff69806a18f70f0802d8e3.exe 2976 csrss.exe 2596 csrss.exe 2596 csrss.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ZReload.scr csrss.exe File created C:\Windows\SysWOW64\rlog.dllx csrss.exe File created C:\Windows\SysWOW64\ZReload.scrx csrss.exe File created C:\Windows\SysWOW64\Zreload.scr csrss.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2404 set thread context of 2656 2404 2365e5ae55ff69806a18f70f0802d8e3.exe 21 PID 2976 set thread context of 2596 2976 csrss.exe 33 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\csrss.exe cmd.exe File opened for modification C:\Windows\csrss.exe csrss.exe File created C:\Windows\csrss.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2800 services.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2656 2404 2365e5ae55ff69806a18f70f0802d8e3.exe 21 PID 2404 wrote to memory of 2656 2404 2365e5ae55ff69806a18f70f0802d8e3.exe 21 PID 2404 wrote to memory of 2656 2404 2365e5ae55ff69806a18f70f0802d8e3.exe 21 PID 2404 wrote to memory of 2656 2404 2365e5ae55ff69806a18f70f0802d8e3.exe 21 PID 2404 wrote to memory of 2656 2404 2365e5ae55ff69806a18f70f0802d8e3.exe 21 PID 2404 wrote to memory of 2656 2404 2365e5ae55ff69806a18f70f0802d8e3.exe 21 PID 2656 wrote to memory of 2784 2656 2365e5ae55ff69806a18f70f0802d8e3.exe 28 PID 2656 wrote to memory of 2784 2656 2365e5ae55ff69806a18f70f0802d8e3.exe 28 PID 2656 wrote to memory of 2784 2656 2365e5ae55ff69806a18f70f0802d8e3.exe 28 PID 2656 wrote to memory of 2784 2656 2365e5ae55ff69806a18f70f0802d8e3.exe 28 PID 2656 wrote to memory of 2976 2656 2365e5ae55ff69806a18f70f0802d8e3.exe 31 PID 2656 wrote to memory of 2976 2656 2365e5ae55ff69806a18f70f0802d8e3.exe 31 PID 2656 wrote to memory of 2976 2656 2365e5ae55ff69806a18f70f0802d8e3.exe 31 PID 2656 wrote to memory of 2976 2656 2365e5ae55ff69806a18f70f0802d8e3.exe 31 PID 2976 wrote to memory of 2596 2976 csrss.exe 33 PID 2976 wrote to memory of 2596 2976 csrss.exe 33 PID 2976 wrote to memory of 2596 2976 csrss.exe 33 PID 2976 wrote to memory of 2596 2976 csrss.exe 33 PID 2976 wrote to memory of 2596 2976 csrss.exe 33 PID 2976 wrote to memory of 2596 2976 csrss.exe 33 PID 2596 wrote to memory of 2800 2596 csrss.exe 32 PID 2596 wrote to memory of 2800 2596 csrss.exe 32 PID 2596 wrote to memory of 2800 2596 csrss.exe 32 PID 2596 wrote to memory of 2800 2596 csrss.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2365e5ae55ff69806a18f70f0802d8e3.exe"C:\Users\Admin\AppData\Local\Temp\2365e5ae55ff69806a18f70f0802d8e3.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\2365e5ae55ff69806a18f70f0802d8e3.exeC:\Users\Admin\AppData\Local\Temp\2365e5ae55ff69806a18f70f0802d8e3.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c copy "C:\Users\Admin\AppData\Local\Temp\2365e5ae55ff69806a18f70f0802d8e3.exe" "C:\Windows\csrss.exe"3⤵
- Drops file in Windows directory
PID:2784
-
-
C:\Windows\csrss.exe"C:\Windows\csrss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\csrss.exeC:\Windows\csrss.exe4⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2596
-
-
-
-
C:\Windows\SysWOW64\drivers\services.exeC:\Windows\system32\drivers\services.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5ddb56c87d10647289236f9fe752d80cd
SHA1e698b332a1a05bab72eb9f8f25d7e98314ae0124
SHA256bd2e3f399610c873da9bc27204024524f481b10a22947193f6558246f05fae15
SHA512c97e78ca6562a285270966b4af35e5103b8b9005a9c0b7c741cb58b941ab18ce2a6894c06087c0e7e0adae0a36113609583dbdc99a803dba0c63fbe3a768998c
-
Filesize
14KB
MD56abb069dc49bd126d961a5f6a86f6476
SHA1ed739f57de5865f50e2d45c6ff561a7dac1d9aba
SHA2565b8472a155319b7efb5c1014ac2e496a5d8d1983cf03c01109e5f9fc84856d11
SHA512eb655772d493654a15a4ac43b5d26d4e17b934e720f0ea434177bf5cb3c4432ce3d0d4e5813b5da7925cedde729305bc4d8cb263ee20e618dc389dbd4bb0a246
-
Filesize
17KB
MD50a1fddec35b3b40756a26c044e22dbe1
SHA1017d4e673666088307951a7cdc7bce85a351faaf
SHA256a8da23fe337876557631d6122ae1ea0ab4fb1fd02f2c2b2c18317b53cd0c81b7
SHA5127a3c30fa5cf5ea19774c094c54627a18beb7f21570710808d1c10e43aebcca654c13192617d027a264807fa4171cb2f52204642fd1be841a15d231bf75cf074b
-
Filesize
340KB
MD592c1e910b7f031a8a0b5cc7190154951
SHA10b97f4275e5283db5d92dfa2f586b883b6eb84d2
SHA2568b676005fa1a12047a8dea8c003ddda302b175715d9e744fee6b815c8f39782c
SHA5126123858de8a54d1f8df7adbfbab1950d5f593a748d4c66d7f0615e59b688a41503cffc85d87df66f814edb33ab12b1adc58673b5d44f1d53e14ba2ff79ccd856
-
Filesize
355KB
MD545f6cf6fb3320478f178eecbbfbbf12f
SHA1bf1dc79e6ad663d72d0f11143d71769909e7511e
SHA256f6a8ddaa98fd827969282755e0be5bb8fafcba2ca025c92c0853ad961b4f4c06
SHA512419b5763a1bb2db396b1a0706f10fb76c0448ad3c8f1dc6d1b3a526c4fe0415ad17e62ddacde83a348f66aa4d35042c14cc96fe2d97d7fc2b9f56648d63acad4
-
Filesize
340KB
MD575ab8bc25c3308e7486b011efa5124e0
SHA13e2ab9db6f5bea5a0321d4b40e1d0e3e12b5230a
SHA256e261e6a36eaa7d714653d6fec0109019a58d4756e47682777e6194fa47a8c44b
SHA5124908c79a0ada744ab1a80e89b72b0c3f9490143b3655c20744ea26588b5df7746f80b3ad4eab876ee39e9f4a0100ea0c1d9739c000b01af1eeb3857fc17b2fab
-
Filesize
19KB
MD5dda37de6068ad16771e3a6464bb8778b
SHA1903317703bfcd07e9bea7246920de98916017e08
SHA256e5fa2290f69a152c53dec772142ddb3d4c04cb2ee25ad05b0ec97ab202361f11
SHA5121d38ba967b34c6d48b8048bf282484bc6c8d6f3644a127a8102d3edbcf5dd854744da7e8f15b10b93b6124db634a7c891c1c175fca8a7b2e6810fc204132ea05