Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/12/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
a297af323f6f088bfd429e16f2e42c0c5781d1456c7a7fbb36fd66b2e810e26b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a297af323f6f088bfd429e16f2e42c0c5781d1456c7a7fbb36fd66b2e810e26b.exe
Resource
win10v2004-20241007-en
General
-
Target
a297af323f6f088bfd429e16f2e42c0c5781d1456c7a7fbb36fd66b2e810e26b.exe
-
Size
999KB
-
MD5
cc51809989809e6f161ebe95b9c409c4
-
SHA1
a15d2a28d813c0ee017c2dcca2f89297d9165c23
-
SHA256
a297af323f6f088bfd429e16f2e42c0c5781d1456c7a7fbb36fd66b2e810e26b
-
SHA512
77c548562f57093220483507845440b7b6b33f266154e7b8d3c9b593a58bd1dd43345f328ba15a9ab0133648cf843c70cee602c18e1aa27520f4bb521af77eb1
-
SSDEEP
24576:YN/BUBb+tYjBFHryjPrjrjhtXRfktHs5BzdUOMYyS:cpUlRhcDjrjhtXRMOOS
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/files/0x00080000000186f2-38.dat modiloader_stage2 behavioral1/memory/2968-49-0x0000000000400000-0x000000000046A000-memory.dmp modiloader_stage2 behavioral1/memory/2968-50-0x0000000000400000-0x000000000046A000-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
pid Process 2300 lolowkdwqadaefdfasdffsd.exe 2540 lol1.exe 2968 lol.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\WinDefend lol.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc lol.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power lol.exe -
Loads dropped DLL 7 IoCs
pid Process 2648 cmd.exe 2300 lolowkdwqadaefdfasdffsd.exe 2300 lolowkdwqadaefdfasdffsd.exe 2300 lolowkdwqadaefdfasdffsd.exe 2540 lol1.exe 2540 lol1.exe 2540 lol1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\lol.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lol.exe" lol.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a297af323f6f088bfd429e16f2e42c0c5781d1456c7a7fbb36fd66b2e810e26b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lolowkdwqadaefdfasdffsd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lol1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lol.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe 2968 lol.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2968 lol.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2648 3068 a297af323f6f088bfd429e16f2e42c0c5781d1456c7a7fbb36fd66b2e810e26b.exe 30 PID 3068 wrote to memory of 2648 3068 a297af323f6f088bfd429e16f2e42c0c5781d1456c7a7fbb36fd66b2e810e26b.exe 30 PID 3068 wrote to memory of 2648 3068 a297af323f6f088bfd429e16f2e42c0c5781d1456c7a7fbb36fd66b2e810e26b.exe 30 PID 3068 wrote to memory of 2648 3068 a297af323f6f088bfd429e16f2e42c0c5781d1456c7a7fbb36fd66b2e810e26b.exe 30 PID 2648 wrote to memory of 2300 2648 cmd.exe 32 PID 2648 wrote to memory of 2300 2648 cmd.exe 32 PID 2648 wrote to memory of 2300 2648 cmd.exe 32 PID 2648 wrote to memory of 2300 2648 cmd.exe 32 PID 2300 wrote to memory of 2540 2300 lolowkdwqadaefdfasdffsd.exe 33 PID 2300 wrote to memory of 2540 2300 lolowkdwqadaefdfasdffsd.exe 33 PID 2300 wrote to memory of 2540 2300 lolowkdwqadaefdfasdffsd.exe 33 PID 2300 wrote to memory of 2540 2300 lolowkdwqadaefdfasdffsd.exe 33 PID 2540 wrote to memory of 2968 2540 lol1.exe 34 PID 2540 wrote to memory of 2968 2540 lol1.exe 34 PID 2540 wrote to memory of 2968 2540 lol1.exe 34 PID 2540 wrote to memory of 2968 2540 lol1.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a297af323f6f088bfd429e16f2e42c0c5781d1456c7a7fbb36fd66b2e810e26b.exe"C:\Users\Admin\AppData\Local\Temp\a297af323f6f088bfd429e16f2e42c0c5781d1456c7a7fbb36fd66b2e810e26b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\cmd.cmd" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\lolowkdwqadaefdfasdffsd.exelolowkdwqadaefdfasdffsd.exe -p1323⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\lol1.exe"C:\Users\Admin\AppData\Local\Temp\lol1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\lol.exe"C:\Users\Admin\AppData\Local\Temp\lol.exe"5⤵
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2968
-
-
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39B
MD54b9d51163be5a8f47b0120239c50443a
SHA1078be1bb76cd2e50f6602fa4376456203045ff6c
SHA256a79443eb354257843d2b03450e1363c6a792c2c0cadde1e2a4258861ca74d876
SHA512b7e4b42310d957550641460663135107c9edebc937172be625425dad0c3c4398fb2d9a80e60cdc825acab08e29b5fdcc0ba69d95ab3c93778b8ecd70139839a2
-
Filesize
521KB
MD56b5c0770e74e8449b50dac816eff2702
SHA1a5a569f3365ad017a88629d984d3626f48b3df83
SHA2563fea9d4dee2f892d5d21b6df7141f149ad772e5d10827f3d15255f6a53fd50dc
SHA51233631d2434130556de3f8d2b6cba3af43e8f0d2a9648385f0ac3d3aa0098f43c75662e5c8efb57d05b2ba16dab9e171958dd6e23b1f189d9a4b644e853765a7d
-
Filesize
397KB
MD561fc1593c52193d1dad618118d1a2755
SHA13a170a48de81b9ca4b96f7204806857123925b85
SHA256155998a2d38712697799ead332b6022df6f5e057242b5bc0f31134d38a4716b5
SHA512ffd876a23388f693a62c8cbbb903b659fc36be8da704a66a4be8db26b7d8f7387ed7a7d824c96c0c3242104f93d12d4665e6aecafb8b7f686f73b26a0749d292
-
Filesize
704KB
MD53b5d0257561b76baa84d00a3589c6fc8
SHA13ec6384ba63f15e916510c8f2852e3509c8732b0
SHA2560b770d7e3a29f9a20542ef42be88decb17962022f5303b075ae4b12c53f711dc
SHA5120a3761456990956ddb905b981b0053a86f47acf61d6fc2b5d2fb4c3b7b711125c457ae7234ffbc1e9329b0b1c0db234a08454af642892e802d3d096a5e6ffcc3