Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    418s
  • max time network
    421s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26/09/2024, 18:28

General

  • Target

    https://bazaar.abuse.ch/sample/ba946ce742f0c1a802ef0b40a933f27ed7215baea0354f7c3b28b3f709308ba9/

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bazaar.abuse.ch/sample/ba946ce742f0c1a802ef0b40a933f27ed7215baea0354f7c3b28b3f709308ba9/
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa049bcc40,0x7ffa049bcc4c,0x7ffa049bcc58
      2⤵
        PID:4836
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,11484722182479559458,10919367469237178063,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1828 /prefetch:2
        2⤵
          PID:1380
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1380,i,11484722182479559458,10919367469237178063,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2116 /prefetch:3
          2⤵
            PID:2652
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,11484722182479559458,10919367469237178063,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2192 /prefetch:8
            2⤵
              PID:4840
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,11484722182479559458,10919367469237178063,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3104 /prefetch:1
              2⤵
                PID:1524
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,11484722182479559458,10919367469237178063,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3260 /prefetch:1
                2⤵
                  PID:3144
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3664,i,11484722182479559458,10919367469237178063,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4272 /prefetch:1
                  2⤵
                    PID:2160
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4908,i,11484722182479559458,10919367469237178063,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4976 /prefetch:8
                    2⤵
                      PID:1612
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3508,i,11484722182479559458,10919367469237178063,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5088 /prefetch:8
                      2⤵
                      • NTFS ADS
                      PID:436
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:5080
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:1248
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:1252
                        • C:\Program Files\7-Zip\7zG.exe
                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap25970:190:7zEvent29493
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          PID:3992
                        • C:\Users\Admin\Downloads\ba946ce742f0c1a802ef0b40a933f27ed7215baea0354f7c3b28b3f709308ba9.exe
                          "C:\Users\Admin\Downloads\ba946ce742f0c1a802ef0b40a933f27ed7215baea0354f7c3b28b3f709308ba9.exe"
                          1⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:1696

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                          Filesize

                          649B

                          MD5

                          df7beb105b275bdb614b5def4e1561e5

                          SHA1

                          65088931c0461dccb64faaeffcbd4a44f5224065

                          SHA256

                          1a670a77a33eddf3703c54e174db7771070edbcf0979b613d05db15f25d1340f

                          SHA512

                          accc1d4cda33abde9b925a0c1b2ac9315286969fa6e99b4c513b02dad09be9265c315416eaaeef65bf96036d0c44fbb1369e39d0d76cea0d460cbc7e92a8cded

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007

                          Filesize

                          213KB

                          MD5

                          f942900ff0a10f251d338c612c456948

                          SHA1

                          4a283d3c8f3dc491e43c430d97c3489ee7a3d320

                          SHA256

                          38b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6

                          SHA512

                          9b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          480B

                          MD5

                          f954180a100641f09078571a672794d4

                          SHA1

                          dda6504ab89274bbda6da420c86dfe71d2a807e1

                          SHA256

                          715dcc674f2c035c17bf000afceb2cbcb3472e5c77976f8a3b10dfd39aa340d5

                          SHA512

                          c4ea557504e49f9af9b6b9cdd3f70197d4cb1b52eca1b7378861695faad62bd799096f666947a8fd80471103a0d241ec0923eaee0f3831d5bbc612dcd8cdb621

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          a95be6cbd3b52ea7e9d7ba814d4569cf

                          SHA1

                          cccdbcac20afa3cdb67b4f086fedfef0d333fe7a

                          SHA256

                          7a82485e91c8f7a66d913407000c16e58466d17d83d047d9920d1e3c2ac9c3dd

                          SHA512

                          5ee3754b3c6d4b294c77def7fe6397946c11e63561b23aad51edac5e1cd5759657e7cca25f895c58ae3ae0e240a971c0184dd7a6936c5fcdd67c9ec8f32cd251

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          a876393027f619ea172fe972d7b32ad9

                          SHA1

                          e04836c770deecbf029b6a145af383f1eb06386e

                          SHA256

                          16cd80ea3d34094b4b5c359f6dee74e63f13e7533d4d3f45ef18d6817d155ec9

                          SHA512

                          f293754d0d352c2b8c412c1e77c03877d5389041ae6df0ee3fe331ea0484773790655b54af985aed751f5acd5fb3c4f0349af9ea850c6fb6d92cda6757b5e32d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          686B

                          MD5

                          ec083745f27d77db2c2d42f5e5a34037

                          SHA1

                          3b9a40c6bcbb935df42718311d952f09f22b6c23

                          SHA256

                          6f4e0353a23331ad19170fc0b45662c4862a80b2565f4b76bc19087a0e1d4d14

                          SHA512

                          4d1722d94cce277413e4967b62ea933d3154071823dc0bd5af416e2c19b94b36a0c7152c6823f3f0273ca3b2e61d71de6cc36ae9aff33792fe918c3a87df4aad

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          686B

                          MD5

                          cdaad0030fcfdd3b6827cf400427bcbd

                          SHA1

                          27a85299ccf16770b3e714002748738e9f98d7bf

                          SHA256

                          879e141a443bfc308e09beade253ebb0f7f8a455a069a607f15ff979530554a3

                          SHA512

                          4eb0ee93385cff7a0948fb381f08d51b01cad1b8b55141f190ee08ecf46868228f54e64950fef4c7aa155d22bebb3926da7d8f39cb4a3b901baeec564b9925a5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          686B

                          MD5

                          233303196eed34bf0fd81d8b4908114e

                          SHA1

                          17ed465a5284dc6d2a7b739b0f5d864592096efe

                          SHA256

                          3de4c24974693fe35a28bd40ce8f377e81402787304688dbbdaf6e3e6ba288cc

                          SHA512

                          49b21cab301b1da2463c0c70f0cf8c71b83b327bd92e63625406e6265b6b82348698534db53794ec6de4c0b7e1332f9864c13e3fd98fb39eb10fc177b5276f0c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          92f7e04f9b5c8abc8a1edeae7eeeb21d

                          SHA1

                          bff23ad775e0b555e1aa86bbc80fbff2cb585cd3

                          SHA256

                          3dc83b278abe235005933e5c872881091b8087bae5fb2fd92730bf1aeea002eb

                          SHA512

                          ac2af4dd0c2856f90fb80b118c3d9673c74b076beda282fb9fdabecab4bbf2523bc9811bb28d353da53fd99e448b959f1ff040578112cab0c20c172c86e0559b

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          be43844c42d5d0df19ce75cc4653875c

                          SHA1

                          38b9a3f8630d80da91a0c3c9aaa9a502d2a37da3

                          SHA256

                          1ed4b3db1c0db6ebbf0c916ccf3de900e8f10dbdbae617169a85ffceb8bd5138

                          SHA512

                          897332887e53e93022e7d32df01ad7ed5cf85853c779e2b5c43c3c37bef7644485a0220cf0d464835a40f6758973867b97e6d6f60acd3ffe83cef4798ac7088f

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          f421f860ed75bcef3b26512a19f5dde8

                          SHA1

                          fd872dd18f130b5ef89a580763ad801dbf8da40f

                          SHA256

                          22010d7e310ce58aa3bfb5f47c5124288d4b45db5f2ccf07c07f6baa7b463cca

                          SHA512

                          5c219298d239c4d04b299fe1dbfb99016f1a6bec63f55a894bfdc7c7f56ce114247e90cd9d168a911636d532227ef2d9b7dccdd0f360be44061449793d6e0148

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          101KB

                          MD5

                          fe729ef1252df7a59d63a3f8beba3855

                          SHA1

                          cc0a32b2fe0300a0373b61ad6855dc7635efb85e

                          SHA256

                          e9129dbd383b3e36720a63a0c501d2aa7e33d11b0e4e0c6053f718a5cc597b3e

                          SHA512

                          679fdf0db20c58eeac3b1c36d56d22e189dc99be115b647ddc1b95ef65d44eded2c04bda80be95884d690c532642512018446c510deb3eb8eceb1af268e734d3

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          101KB

                          MD5

                          f18b9b0dc3f5e7cbd8ca30e5a0f928e7

                          SHA1

                          b4468599a63f026aec3d06cb785f8799e34bdf61

                          SHA256

                          6ac6392d4fdf5546f846d96bb9685d278b5f66d4c815847f6b215ba06f132aac

                          SHA512

                          6c42984d9be2ed5d99cacb689f6d568ca456c7e94dd4d233a406df0eb7173ea9a3558bfa7b00d03a39ea0d37e734086fcf9978dc1d2d313cfac22e000934c4e4

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          101KB

                          MD5

                          c7fb82874ca17d1529cd291b42b7a35a

                          SHA1

                          baeb55defa09bc3d26db13a449369fdfa999b4ad

                          SHA256

                          243bb4909dbaa58aac4d6f596c511435d6453403a531061043ab7675a66c31c1

                          SHA512

                          bd0cd0369512bf1a95736105763381a3f8b9b064ec56c4f8b8e9c05cff89bf6326c47b2284f1b566f98c4e8a49187bbd86d6d582c6fb10543d28c43bd1bc25cc

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                          Filesize

                          264KB

                          MD5

                          f50f89a0a91564d0b8a211f8921aa7de

                          SHA1

                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                          SHA256

                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                          SHA512

                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                        • C:\Users\Admin\Downloads\ba946ce742f0c1a802ef0b40a933f27ed7215baea0354f7c3b28b3f709308ba9.exe

                          Filesize

                          1.1MB

                          MD5

                          9660374700b5c2eecc2efb7e2b63a3c3

                          SHA1

                          a887cd88cbf6b9262441758db842d48a7d8d8c12

                          SHA256

                          ba946ce742f0c1a802ef0b40a933f27ed7215baea0354f7c3b28b3f709308ba9

                          SHA512

                          d49fdf780bf86cc69c4c669f3e6c4e4ccce76352a4b60b330a73d540d734104560c0e51625ba2b940e0ca3a733f0272c09c5d7d3d27eb19c08e2f5a16644ab16

                        • C:\Users\Admin\Downloads\ba946ce742f0c1a802ef0b40a933f27ed7215baea0354f7c3b28b3f709308ba9.zip

                          Filesize

                          505KB

                          MD5

                          d05933d270b0317008dbcc3143175ceb

                          SHA1

                          9ed29b62a3b1b2da5803cc8cf8aaf266ed9a6c11

                          SHA256

                          344a226330191b4fb12249c76cad6af79bc2e4b8c037fb29d43af2d6cda317bf

                          SHA512

                          2521ccc9639bdb54e77b334dba4871fbe42ac8a9128dc5693ad618eb02b275670bb361ca98d3fb86a83b07a505d9840be2c0b690b3f8e3fc49473f91ca13675d

                        • C:\Users\Admin\Downloads\ba946ce742f0c1a802ef0b40a933f27ed7215baea0354f7c3b28b3f709308ba9.zip:Zone.Identifier

                          Filesize

                          26B

                          MD5

                          fbccf14d504b7b2dbcb5a5bda75bd93b

                          SHA1

                          d59fc84cdd5217c6cf74785703655f78da6b582b

                          SHA256

                          eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                          SHA512

                          aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                        • memory/1696-260-0x00000000023D0000-0x00000000023D1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1696-261-0x0000000002E40000-0x0000000003E40000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/1696-263-0x0000000002E40000-0x0000000003E40000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/1696-265-0x00000000023D0000-0x00000000023D1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1696-264-0x0000000000400000-0x000000000051F000-memory.dmp

                          Filesize

                          1.1MB