Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
2bff344cba5116badb0c46b76ded294d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2bff344cba5116badb0c46b76ded294d.exe
Resource
win10v2004-20231215-en
General
-
Target
2bff344cba5116badb0c46b76ded294d.exe
-
Size
665KB
-
MD5
2bff344cba5116badb0c46b76ded294d
-
SHA1
dbd3cd8902d2ca439a887dff575d059512671058
-
SHA256
ae1b55aa3f0c75be1762c9b24d08f8e6a60f07432d902db0d91f780c85c9b50e
-
SHA512
ef7227ecd9d60e280a4cb9cd5311b0199f6b199058c5cb5a8c3d397f1900a5da8ae9d6845eda17b320d8f4ff623be2c70e373ead8dc9c1cc3607aeab27b65229
-
SSDEEP
12288:Z6UdkreRflYDlYwG1X7L1UIOX+aoUhF3Z4mxxRDqVTVOCE:Z6UkSlYRYzL1UIyOUhQmXYVTzE
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral1/memory/2172-11-0x0000000003360000-0x0000000003417000-memory.dmp modiloader_stage2 behavioral1/memory/2172-21-0x00000000040B0000-0x00000000041C8000-memory.dmp modiloader_stage2 behavioral1/memory/2816-25-0x0000000000400000-0x0000000000518000-memory.dmp modiloader_stage2 behavioral1/memory/2172-27-0x0000000000400000-0x0000000000518000-memory.dmp modiloader_stage2 behavioral1/memory/2172-42-0x0000000000400000-0x0000000000518000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2952 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2816 sys.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\SxingDel.bat 2bff344cba5116badb0c46b76ded294d.exe File created C:\Windows\sys.exe 2bff344cba5116badb0c46b76ded294d.exe File opened for modification C:\Windows\sys.exe 2bff344cba5116badb0c46b76ded294d.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2708 2816 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2816 2172 2bff344cba5116badb0c46b76ded294d.exe 28 PID 2172 wrote to memory of 2816 2172 2bff344cba5116badb0c46b76ded294d.exe 28 PID 2172 wrote to memory of 2816 2172 2bff344cba5116badb0c46b76ded294d.exe 28 PID 2172 wrote to memory of 2816 2172 2bff344cba5116badb0c46b76ded294d.exe 28 PID 2816 wrote to memory of 2708 2816 sys.exe 29 PID 2816 wrote to memory of 2708 2816 sys.exe 29 PID 2816 wrote to memory of 2708 2816 sys.exe 29 PID 2816 wrote to memory of 2708 2816 sys.exe 29 PID 2172 wrote to memory of 2952 2172 2bff344cba5116badb0c46b76ded294d.exe 32 PID 2172 wrote to memory of 2952 2172 2bff344cba5116badb0c46b76ded294d.exe 32 PID 2172 wrote to memory of 2952 2172 2bff344cba5116badb0c46b76ded294d.exe 32 PID 2172 wrote to memory of 2952 2172 2bff344cba5116badb0c46b76ded294d.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bff344cba5116badb0c46b76ded294d.exe"C:\Users\Admin\AppData\Local\Temp\2bff344cba5116badb0c46b76ded294d.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\sys.exeC:\Windows\sys.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 3123⤵
- Program crash
PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\SxingDel.bat2⤵
- Deletes itself
PID:2952
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5a4020402b4ed59a04c92635f34b3277f
SHA109d66e29fc2bf75a1fb5f23546a45536debc6c5f
SHA256d4f0cceb6c9b09cb270736eb3d85da35ad915e899ba9e5e41665265c8c73f81f
SHA5129a09a25e5b797d925f14e894e611ba518aaf3b8c8d824c2e8ba792c7d19a7461f259c25622432e5207c49c5b49fbbfc1e47cff91f1dccb65bea9cd54912818a5
-
Filesize
665KB
MD52bff344cba5116badb0c46b76ded294d
SHA1dbd3cd8902d2ca439a887dff575d059512671058
SHA256ae1b55aa3f0c75be1762c9b24d08f8e6a60f07432d902db0d91f780c85c9b50e
SHA512ef7227ecd9d60e280a4cb9cd5311b0199f6b199058c5cb5a8c3d397f1900a5da8ae9d6845eda17b320d8f4ff623be2c70e373ead8dc9c1cc3607aeab27b65229