Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
bbf710c83246092a538128620853d4fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bbf710c83246092a538128620853d4fd.exe
Resource
win10v2004-20240802-en
General
-
Target
bbf710c83246092a538128620853d4fd.exe
-
Size
1.0MB
-
MD5
bbf710c83246092a538128620853d4fd
-
SHA1
95338f06c76178de31b5e8453f92c43f970ea9f9
-
SHA256
7ad64f279e3fa6a7d0ef2916240f1337584c5b5176fb56089771164f2905554f
-
SHA512
a609d92fe0d25e7db140c731af4b241d47cdaddfe735d9f7575c982ef790ab01d7f969038546e6054101b745e8c208f74e41faf246173ca0722c7b994cf94001
-
SSDEEP
24576:ZUfEsM2Vlh4rSmqEhbhuJ2GH7JeUPUd6Yq7+gyQxy/Z:ZC4m/H7UU
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/812-3-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-6-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-7-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-8-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-9-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-10-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-13-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-17-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-20-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-24-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-47-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-68-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-67-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-11-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-66-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-65-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-64-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-63-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-62-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-61-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-60-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-59-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-58-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-57-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-56-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-55-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-54-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-53-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-52-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-51-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-50-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-49-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-48-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-46-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-45-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-44-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-43-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-42-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-41-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-40-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-39-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-38-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-37-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-36-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-35-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-34-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-33-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-32-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-31-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-30-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-29-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-28-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-27-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-26-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-25-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-23-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-22-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-21-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-19-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-16-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 behavioral1/memory/812-14-0x0000000003120000-0x0000000004120000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 1256 812 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbf710c83246092a538128620853d4fd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 812 wrote to memory of 1256 812 bbf710c83246092a538128620853d4fd.exe 30 PID 812 wrote to memory of 1256 812 bbf710c83246092a538128620853d4fd.exe 30 PID 812 wrote to memory of 1256 812 bbf710c83246092a538128620853d4fd.exe 30 PID 812 wrote to memory of 1256 812 bbf710c83246092a538128620853d4fd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbf710c83246092a538128620853d4fd.exe"C:\Users\Admin\AppData\Local\Temp\bbf710c83246092a538128620853d4fd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 7122⤵
- Program crash
PID:1256
-