Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe
Resource
win10v2004-20231215-en
General
-
Target
SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe
-
Size
279KB
-
MD5
03a2cf836e01c4bbda317dff5f0bc869
-
SHA1
9f0746dc4f9698b7b5916f4327bfb50e27ef73d8
-
SHA256
ed68d679c7ebc0a1b23b215cda2d370a0da53ca08a8d296ffda986a434ff6596
-
SHA512
aeb876ed448acd8a11d4d5da22fc92c1d755990bac4ac8935bfd52bd431d4c96a94c517c1d74f62be74a429c3eebc52e3d9d922919de66d8c7e1c0566e14c4db
-
SSDEEP
6144:nR0XMxh2JejPu6nDSCejtRbxZaBwoJjkE5Mx7xSw33V0dLOwm:OXMxhMebBDnSxE7jkIImFdm
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/1900-30-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 behavioral1/memory/2732-32-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 behavioral1/memory/1900-40-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 QQ.exe -
Loads dropped DLL 5 IoCs
pid Process 1900 SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe 1900 SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\A: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\B: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\G: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\H: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\I: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\J: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\L: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\N: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\O: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\S: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\W: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\Y: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\Z: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\E: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\P: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\R: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\T: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\U: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\M: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\Q: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\V: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened (read-only) \??\X: SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\AutoRun.inf SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened for modification C:\AutoRun.inf SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File created F:\AutoRun.inf SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File opened for modification F:\AutoRun.inf SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\QQ.exe SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\_QQ.exe QQ.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\_QQ.exe QQ.exe File created C:\Program Files\Delet.bat SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe File created C:\Program Files\QQ.exe SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2736 2732 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2732 1900 SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe 28 PID 1900 wrote to memory of 2732 1900 SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe 28 PID 1900 wrote to memory of 2732 1900 SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe 28 PID 1900 wrote to memory of 2732 1900 SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe 28 PID 2732 wrote to memory of 2736 2732 QQ.exe 29 PID 2732 wrote to memory of 2736 2732 QQ.exe 29 PID 2732 wrote to memory of 2736 2732 QQ.exe 29 PID 2732 wrote to memory of 2736 2732 QQ.exe 29 PID 1900 wrote to memory of 2648 1900 SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe 30 PID 1900 wrote to memory of 2648 1900 SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe 30 PID 1900 wrote to memory of 2648 1900 SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe 30 PID 1900 wrote to memory of 2648 1900 SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Pigeon.17327.27136.20853.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files\QQ.exe"C:\Program Files\QQ.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Delet.bat""2⤵
- Deletes itself
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220B
MD52d5749d74d0113331064453e1a7c2296
SHA10c33571595324a85fd550676787e8e99c10798b1
SHA256c766530e24601e41b436e628fbd7e1d40b8d862cfbadb4813f92e55c7592ec71
SHA5126f6029d8738a3cdeae11aa02574787cd11d32d4ecb3371ee7b6c5c90746396abba0927c02d631ab96e33ff6851fe33db716d8ac65d22e289bba51c30ad149ff8
-
Filesize
279KB
MD503a2cf836e01c4bbda317dff5f0bc869
SHA19f0746dc4f9698b7b5916f4327bfb50e27ef73d8
SHA256ed68d679c7ebc0a1b23b215cda2d370a0da53ca08a8d296ffda986a434ff6596
SHA512aeb876ed448acd8a11d4d5da22fc92c1d755990bac4ac8935bfd52bd431d4c96a94c517c1d74f62be74a429c3eebc52e3d9d922919de66d8c7e1c0566e14c4db