Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 09:05
Behavioral task
behavioral1
Sample
deca4fcd630c05bc38ffafd6db01c763.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
deca4fcd630c05bc38ffafd6db01c763.dll
Resource
win10v2004-20240226-en
General
-
Target
deca4fcd630c05bc38ffafd6db01c763.dll
-
Size
147KB
-
MD5
deca4fcd630c05bc38ffafd6db01c763
-
SHA1
8beee205091c6bf53154dbb065fda3e4be18cb14
-
SHA256
77d0a1fe879a8398006b83ad851e1a9afdf7bb5d0e7130426ac6767546d75951
-
SHA512
f40de4bb519a9057ab3add4577bf7990f4ac3bd554a7663f931dd57fff46b923f0af0fe34c183d5729dc4b12c44df663ff547c1e43a537867d9dd479d0b9e3fb
-
SSDEEP
3072:OMF/+pKv731j6km3ZwqKKfnjSngs0OWuB7cW+ydLbmtTzMSsz:DB1TFj6km3fSnKuBcWxoMd
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1208-0-0x0000000000230000-0x0000000000281000-memory.dmp modiloader_stage2 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\5.dll rundll32.exe File created C:\Windows\0.idx rundll32.exe File opened for modification C:\Windows\1.dat rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2304 wrote to memory of 1208 2304 rundll32.exe 28 PID 2304 wrote to memory of 1208 2304 rundll32.exe 28 PID 2304 wrote to memory of 1208 2304 rundll32.exe 28 PID 2304 wrote to memory of 1208 2304 rundll32.exe 28 PID 2304 wrote to memory of 1208 2304 rundll32.exe 28 PID 2304 wrote to memory of 1208 2304 rundll32.exe 28 PID 2304 wrote to memory of 1208 2304 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deca4fcd630c05bc38ffafd6db01c763.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deca4fcd630c05bc38ffafd6db01c763.dll,#12⤵
- Drops file in Windows directory
PID:1208
-