Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 11:35

General

  • Target

    40c1b54269a4ea770a51d2cfcdbb9eeb.exe

  • Size

    777KB

  • MD5

    40c1b54269a4ea770a51d2cfcdbb9eeb

  • SHA1

    b96fcb61a7f20c090f931d4a123250937b030d41

  • SHA256

    3cc9d68a2b59eccab8ede2b71539ef8e9b3b4e6941f5a78978c42265131d1340

  • SHA512

    9bbb30a6ade82418b21485c69d2de91444cef5485e263ce6f450e42b0644c6c60dafa166d36e69ccd81e5e8758341e7b2124560c5bc336718addbaed9b006a2b

  • SSDEEP

    12288:Bq+hQxVUzfvVYzSbAdmndFYw4tdN0a20JK2LMLGpH9gLWMccNt2wJVYSEg+rKZV:0+ykW8dFWAa2/6gGpdgLWMfN88V3Is

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 18 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 22 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40c1b54269a4ea770a51d2cfcdbb9eeb.exe
    "C:\Users\Admin\AppData\Local\Temp\40c1b54269a4ea770a51d2cfcdbb9eeb.exe"
    1⤵
    • Identifies Wine through registry keys
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Windows\mstwain32.exe
      "C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\40c1b54269a4ea770a51d2cfcdbb9eeb.exe"
      2⤵
      • UAC bypass
      • Deletes itself
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:588
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/588-45-0x0000000003FC0000-0x0000000003FC1000-memory.dmp

    Filesize

    4KB

  • memory/588-35-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-87-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-86-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-85-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-84-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-83-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-82-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-81-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-80-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-79-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-77-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-76-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-75-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-74-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-73-0x00000000768E0000-0x00000000769D0000-memory.dmp

    Filesize

    960KB

  • memory/588-72-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-71-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-40-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-63-0x00000000042C0000-0x00000000042C1000-memory.dmp

    Filesize

    4KB

  • memory/588-41-0x00000000047D0000-0x00000000047DE000-memory.dmp

    Filesize

    56KB

  • memory/588-42-0x0000000004140000-0x0000000004141000-memory.dmp

    Filesize

    4KB

  • memory/588-44-0x0000000004160000-0x0000000004161000-memory.dmp

    Filesize

    4KB

  • memory/588-51-0x0000000004280000-0x0000000004281000-memory.dmp

    Filesize

    4KB

  • memory/588-46-0x00000000041A0000-0x00000000041A1000-memory.dmp

    Filesize

    4KB

  • memory/588-36-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/588-47-0x00000000042F0000-0x00000000042F1000-memory.dmp

    Filesize

    4KB

  • memory/588-62-0x00000000041E0000-0x00000000041E1000-memory.dmp

    Filesize

    4KB

  • memory/588-48-0x0000000004290000-0x0000000004291000-memory.dmp

    Filesize

    4KB

  • memory/588-68-0x00000000006C0000-0x00000000006C1000-memory.dmp

    Filesize

    4KB

  • memory/588-70-0x0000000004780000-0x0000000004781000-memory.dmp

    Filesize

    4KB

  • memory/588-69-0x00000000768E0000-0x00000000769D0000-memory.dmp

    Filesize

    960KB

  • memory/588-67-0x0000000075370000-0x0000000075384000-memory.dmp

    Filesize

    80KB

  • memory/588-66-0x00000000042E0000-0x00000000042E1000-memory.dmp

    Filesize

    4KB

  • memory/588-65-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/588-64-0x0000000004250000-0x0000000004251000-memory.dmp

    Filesize

    4KB

  • memory/588-49-0x00000000041C0000-0x00000000041C1000-memory.dmp

    Filesize

    4KB

  • memory/588-61-0x0000000004180000-0x0000000004181000-memory.dmp

    Filesize

    4KB

  • memory/588-50-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB

  • memory/588-60-0x0000000004170000-0x0000000004171000-memory.dmp

    Filesize

    4KB

  • memory/588-59-0x0000000004240000-0x0000000004241000-memory.dmp

    Filesize

    4KB

  • memory/588-58-0x0000000004150000-0x0000000004151000-memory.dmp

    Filesize

    4KB

  • memory/588-57-0x0000000004210000-0x0000000004211000-memory.dmp

    Filesize

    4KB

  • memory/588-56-0x0000000004190000-0x0000000004191000-memory.dmp

    Filesize

    4KB

  • memory/588-55-0x0000000004200000-0x0000000004202000-memory.dmp

    Filesize

    8KB

  • memory/588-54-0x00000000041F0000-0x00000000041F1000-memory.dmp

    Filesize

    4KB

  • memory/588-53-0x0000000004230000-0x0000000004231000-memory.dmp

    Filesize

    4KB

  • memory/588-52-0x00000000042A0000-0x00000000042A1000-memory.dmp

    Filesize

    4KB

  • memory/2136-3-0x0000000004130000-0x0000000004131000-memory.dmp

    Filesize

    4KB

  • memory/2136-32-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/2136-1-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/2136-26-0x0000000004C00000-0x0000000004C10000-memory.dmp

    Filesize

    64KB

  • memory/2136-33-0x0000000005B90000-0x0000000005D4C000-memory.dmp

    Filesize

    1.7MB

  • memory/2136-34-0x0000000005B90000-0x0000000005D4C000-memory.dmp

    Filesize

    1.7MB

  • memory/2136-0-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/2136-21-0x00000000042B0000-0x00000000042B1000-memory.dmp

    Filesize

    4KB

  • memory/2136-22-0x0000000000710000-0x0000000000711000-memory.dmp

    Filesize

    4KB

  • memory/2136-2-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/2136-4-0x0000000004150000-0x0000000004151000-memory.dmp

    Filesize

    4KB

  • memory/2136-5-0x0000000004100000-0x0000000004101000-memory.dmp

    Filesize

    4KB

  • memory/2136-6-0x0000000004190000-0x0000000004191000-memory.dmp

    Filesize

    4KB

  • memory/2136-7-0x00000000042E0000-0x00000000042E1000-memory.dmp

    Filesize

    4KB

  • memory/2136-8-0x0000000004290000-0x0000000004291000-memory.dmp

    Filesize

    4KB

  • memory/2136-9-0x00000000041B0000-0x00000000041B1000-memory.dmp

    Filesize

    4KB

  • memory/2136-10-0x00000000041C0000-0x00000000041C1000-memory.dmp

    Filesize

    4KB

  • memory/2136-11-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/2136-12-0x0000000004230000-0x0000000004231000-memory.dmp

    Filesize

    4KB

  • memory/2136-13-0x00000000041E0000-0x00000000041E1000-memory.dmp

    Filesize

    4KB

  • memory/2136-14-0x0000000004200000-0x0000000004201000-memory.dmp

    Filesize

    4KB

  • memory/2136-15-0x0000000004180000-0x0000000004181000-memory.dmp

    Filesize

    4KB

  • memory/2136-16-0x0000000004140000-0x0000000004141000-memory.dmp

    Filesize

    4KB

  • memory/2136-17-0x0000000004240000-0x0000000004241000-memory.dmp

    Filesize

    4KB

  • memory/2136-18-0x0000000004170000-0x0000000004171000-memory.dmp

    Filesize

    4KB

  • memory/2136-19-0x0000000004160000-0x0000000004161000-memory.dmp

    Filesize

    4KB

  • memory/2136-20-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB