Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
caf0e62aaa4fb1662bb3ea31fe671d6a
-
Size
667KB
-
Sample
240315-kb61raca21
-
MD5
caf0e62aaa4fb1662bb3ea31fe671d6a
-
SHA1
f345b2fb71158df79b31823cc4376909807a1ae5
-
SHA256
9f716d49785e9cd8ea6f56885146f847f7641aec7c670dc72a52c881b6afcd5b
-
SHA512
3bba2e30c40263f79d000783a4bfd81e865c8ec1a62547d3160eeedeef61a2c1645eb0d077b0dbd7c570d78c954c973a55f934fa518e28fe683498b0642f4e2c
-
SSDEEP
12288:WbMqmgEEb4E9F/ATyGv4XKGQi2lJLm1Giizl6oAlpxElrW1A:WI2EEb4Ev/ATEXKGVnGTzpA1Ec1A
Behavioral task
behavioral1
Sample
caf0e62aaa4fb1662bb3ea31fe671d6a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
caf0e62aaa4fb1662bb3ea31fe671d6a.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
caf0e62aaa4fb1662bb3ea31fe671d6a
-
Size
667KB
-
MD5
caf0e62aaa4fb1662bb3ea31fe671d6a
-
SHA1
f345b2fb71158df79b31823cc4376909807a1ae5
-
SHA256
9f716d49785e9cd8ea6f56885146f847f7641aec7c670dc72a52c881b6afcd5b
-
SHA512
3bba2e30c40263f79d000783a4bfd81e865c8ec1a62547d3160eeedeef61a2c1645eb0d077b0dbd7c570d78c954c973a55f934fa518e28fe683498b0642f4e2c
-
SSDEEP
12288:WbMqmgEEb4E9F/ATyGv4XKGQi2lJLm1Giizl6oAlpxElrW1A:WI2EEb4Ev/ATEXKGVnGTzpA1Ec1A
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies security service
-
Modifies visiblity of hidden/system files in Explorer
-
ModiLoader Second Stage
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
6