Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
7s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 09:47
Behavioral task
behavioral1
Sample
c71ae363dc38caca1d40acd0c5802c75.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c71ae363dc38caca1d40acd0c5802c75.exe
Resource
win10v2004-20231215-en
General
-
Target
c71ae363dc38caca1d40acd0c5802c75.exe
-
Size
651KB
-
MD5
c71ae363dc38caca1d40acd0c5802c75
-
SHA1
d31673edc216cb167a05a1bf5bc193ae2c8ec179
-
SHA256
36a7ecf0b280491cfbf8a51b44d40ee56c9722f47067e5c7f05bef55918e779b
-
SHA512
6210d749fb9812c17a62cbdf76e3e3c1ace29ce08a0ee3eeff80f984479a4149fd61d84051d3b55866ebe8fd5786fe975d96437e96e51490b1f3f1e36cb55cde
-
SSDEEP
12288:kpyZT1/rCxu/mDwLRI6BxcDqp9aqCcajVuD3Z7BPQGMWYur0s0D:kUx1/jOD3SxcDDcNDqWYurL0
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 10 IoCs
resource yara_rule behavioral1/memory/2348-14-0x0000000000400000-0x0000000000507000-memory.dmp modiloader_stage2 behavioral1/memory/2348-13-0x0000000000400000-0x0000000000507000-memory.dmp modiloader_stage2 behavioral1/memory/2360-10-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral1/memory/1576-68-0x0000000000400000-0x000000000041B000-memory.dmp modiloader_stage2 behavioral1/memory/2348-78-0x0000000000400000-0x0000000000507000-memory.dmp modiloader_stage2 behavioral1/memory/1960-92-0x0000000000400000-0x000000000041B000-memory.dmp modiloader_stage2 behavioral1/memory/1636-119-0x0000000000400000-0x000000000041B000-memory.dmp modiloader_stage2 behavioral1/memory/2348-138-0x00000000026E0000-0x0000000002744000-memory.dmp modiloader_stage2 behavioral1/memory/2348-139-0x00000000026E0000-0x0000000002744000-memory.dmp modiloader_stage2 behavioral1/memory/2348-207-0x0000000000400000-0x0000000000507000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2136 dHY4IvP3.exe -
Loads dropped DLL 2 IoCs
pid Process 2348 c71ae363dc38caca1d40acd0c5802c75.exe 2348 c71ae363dc38caca1d40acd0c5802c75.exe -
resource yara_rule behavioral1/memory/2348-14-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral1/memory/2348-13-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral1/memory/2348-12-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral1/memory/2348-6-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral1/memory/2348-4-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral1/memory/2348-2-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral1/memory/2348-78-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral1/memory/2720-98-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2720-97-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2720-96-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2720-95-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2720-87-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2720-84-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2720-82-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2700-126-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2700-123-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2700-122-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2700-114-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2700-111-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2700-109-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2348-207-0x0000000000400000-0x0000000000507000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 2348 2360 c71ae363dc38caca1d40acd0c5802c75.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 1436 2700 WerFault.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2004 tasklist.exe 2740 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2136 dHY4IvP3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2348 c71ae363dc38caca1d40acd0c5802c75.exe 2136 dHY4IvP3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2348 2360 c71ae363dc38caca1d40acd0c5802c75.exe 28 PID 2360 wrote to memory of 2348 2360 c71ae363dc38caca1d40acd0c5802c75.exe 28 PID 2360 wrote to memory of 2348 2360 c71ae363dc38caca1d40acd0c5802c75.exe 28 PID 2360 wrote to memory of 2348 2360 c71ae363dc38caca1d40acd0c5802c75.exe 28 PID 2360 wrote to memory of 2348 2360 c71ae363dc38caca1d40acd0c5802c75.exe 28 PID 2360 wrote to memory of 2348 2360 c71ae363dc38caca1d40acd0c5802c75.exe 28 PID 2360 wrote to memory of 2348 2360 c71ae363dc38caca1d40acd0c5802c75.exe 28 PID 2360 wrote to memory of 2348 2360 c71ae363dc38caca1d40acd0c5802c75.exe 28 PID 2348 wrote to memory of 2136 2348 c71ae363dc38caca1d40acd0c5802c75.exe 29 PID 2348 wrote to memory of 2136 2348 c71ae363dc38caca1d40acd0c5802c75.exe 29 PID 2348 wrote to memory of 2136 2348 c71ae363dc38caca1d40acd0c5802c75.exe 29 PID 2348 wrote to memory of 2136 2348 c71ae363dc38caca1d40acd0c5802c75.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c71ae363dc38caca1d40acd0c5802c75.exe"C:\Users\Admin\AppData\Local\Temp\c71ae363dc38caca1d40acd0c5802c75.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\c71ae363dc38caca1d40acd0c5802c75.exec71ae363dc38caca1d40acd0c5802c75.exe2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\dHY4IvP3.exeC:\Users\Admin\dHY4IvP3.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del dHY4IvP3.exe4⤵PID:2736
-
-
C:\Users\Admin\kfnom.exe"C:\Users\Admin\kfnom.exe"4⤵PID:2744
-
-
-
C:\Users\Admin\azhost.exeC:\Users\Admin\azhost.exe3⤵PID:1576
-
C:\Users\Admin\azhost.exeazhost.exe4⤵PID:2524
-
-
-
C:\Users\Admin\bzhost.exeC:\Users\Admin\bzhost.exe3⤵PID:1960
-
C:\Users\Admin\bzhost.exebzhost.exe4⤵PID:2720
-
-
-
C:\Users\Admin\czhost.exeC:\Users\Admin\czhost.exe3⤵PID:1636
-
C:\Users\Admin\czhost.execzhost.exe4⤵PID:2700
-
-
-
C:\Users\Admin\dzhost.exeC:\Users\Admin\dzhost.exe3⤵PID:2984
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:1204
-
-
-
C:\Users\Admin\ezhost.exeC:\Users\Admin\ezhost.exe3⤵PID:2112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del c71ae363dc38caca1d40acd0c5802c75.exe3⤵PID:2924
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:2004
-
-
-
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
PID:2740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 881⤵
- Program crash
PID:1436