Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe
Resource
win10v2004-20240802-en
General
-
Target
a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe
-
Size
112KB
-
MD5
7cc845de423ee379dfb5d2505c9c22c0
-
SHA1
29a77472c12665633587df771a8512feb6af21f6
-
SHA256
a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8
-
SHA512
7e27b437b9eaa99cf87c45f6fcf2c08ecceed7c82a32f81495b32a87a5263ae5959f4d37a92fc788eb7cae679109e9215f58931119d52e15c0b8addaa0d7219b
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJ:tVIr7zI+fAceoGxSKKo5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/3168-65-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3168-66-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3168-68-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3168-72-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe -
Executes dropped EXE 3 IoCs
pid Process 4756 WAMain.exe 768 WAMain.exe 3168 WAMain.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows WA = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\WAMain.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3436 set thread context of 3164 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 83 PID 3436 set thread context of 3716 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 84 PID 4756 set thread context of 1120 4756 WAMain.exe 90 PID 4756 set thread context of 768 4756 WAMain.exe 91 PID 4756 set thread context of 3168 4756 WAMain.exe 93 -
resource yara_rule behavioral2/memory/3716-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3716-19-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3716-14-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3716-50-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3168-65-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3168-59-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3168-66-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3168-68-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3168-63-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3716-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/768-71-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3168-72-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4240 1120 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe 3164 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe Token: SeDebugPrivilege 768 WAMain.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 3164 svchost.exe 3716 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 4756 WAMain.exe 768 WAMain.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 3436 wrote to memory of 3164 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 83 PID 3436 wrote to memory of 3164 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 83 PID 3436 wrote to memory of 3164 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 83 PID 3436 wrote to memory of 3164 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 83 PID 3436 wrote to memory of 3164 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 83 PID 3436 wrote to memory of 3164 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 83 PID 3436 wrote to memory of 3164 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 83 PID 3436 wrote to memory of 3164 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 83 PID 3436 wrote to memory of 3164 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 83 PID 3436 wrote to memory of 3716 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 84 PID 3436 wrote to memory of 3716 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 84 PID 3436 wrote to memory of 3716 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 84 PID 3436 wrote to memory of 3716 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 84 PID 3436 wrote to memory of 3716 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 84 PID 3436 wrote to memory of 3716 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 84 PID 3436 wrote to memory of 3716 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 84 PID 3436 wrote to memory of 3716 3436 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 84 PID 3716 wrote to memory of 3908 3716 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 85 PID 3716 wrote to memory of 3908 3716 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 85 PID 3716 wrote to memory of 3908 3716 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 85 PID 3908 wrote to memory of 2640 3908 cmd.exe 88 PID 3908 wrote to memory of 2640 3908 cmd.exe 88 PID 3908 wrote to memory of 2640 3908 cmd.exe 88 PID 3716 wrote to memory of 4756 3716 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 89 PID 3716 wrote to memory of 4756 3716 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 89 PID 3716 wrote to memory of 4756 3716 a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe 89 PID 4756 wrote to memory of 1120 4756 WAMain.exe 90 PID 4756 wrote to memory of 1120 4756 WAMain.exe 90 PID 4756 wrote to memory of 1120 4756 WAMain.exe 90 PID 4756 wrote to memory of 1120 4756 WAMain.exe 90 PID 4756 wrote to memory of 768 4756 WAMain.exe 91 PID 4756 wrote to memory of 768 4756 WAMain.exe 91 PID 4756 wrote to memory of 768 4756 WAMain.exe 91 PID 4756 wrote to memory of 768 4756 WAMain.exe 91 PID 4756 wrote to memory of 768 4756 WAMain.exe 91 PID 4756 wrote to memory of 768 4756 WAMain.exe 91 PID 4756 wrote to memory of 768 4756 WAMain.exe 91 PID 4756 wrote to memory of 768 4756 WAMain.exe 91 PID 4756 wrote to memory of 3168 4756 WAMain.exe 93 PID 4756 wrote to memory of 3168 4756 WAMain.exe 93 PID 4756 wrote to memory of 3168 4756 WAMain.exe 93 PID 4756 wrote to memory of 3168 4756 WAMain.exe 93 PID 4756 wrote to memory of 3168 4756 WAMain.exe 93 PID 4756 wrote to memory of 3168 4756 WAMain.exe 93 PID 4756 wrote to memory of 3168 4756 WAMain.exe 93 PID 4756 wrote to memory of 3168 4756 WAMain.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe"C:\Users\Admin\AppData\Local\Temp\a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe"C:\Users\Admin\AppData\Local\Temp\a202c95c698f1b46b9d11213b6453cf5e08b2b633645594e002c605d17f73fd8N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DHCKV.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 845⤵
- Program crash
PID:4240
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:768
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3168
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1120 -ip 11201⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD5777d5c9c3641057f778b076e3c6e6df3
SHA1d5f42803d96b70aa7e95c49ed15594ef8206470a
SHA25663f780b8f2cc180068194cbd6ea55911cf993e7c6f7c6f2b5e6842eda4fe642b
SHA512d06afc069cb944104b01660f1189a396e07e19cc153d9e26077ff8558c01e0e74b2a51b274f0f479033f9084b39805b1c3c832891650aba40b8d5a5e127f362c