Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
7c60b982e5f...18.exe
windows7-x64
7c60b982e5f...18.exe
windows10-2004-x64
7$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
5$PLUGINSDI...om.dll
windows10-2004-x64
5$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3flash.dll
windows7-x64
3flash.dll
windows10-2004-x64
3help.chm
windows7-x64
1help.chm
windows10-2004-x64
1order.htm
windows7-x64
3order.htm
windows10-2004-x64
3top flash ...eo.exe
windows7-x64
10top flash ...eo.exe
windows10-2004-x64
10uninst.exe
windows7-x64
8uninst.exe
windows10-2004-x64
8�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2024, 05:06
Behavioral task
behavioral1
Sample
c60b982e5f0cf6cf628404adb69569c6_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c60b982e5f0cf6cf628404adb69569c6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/locate.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/locate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
flash.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
flash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
help.chm
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
help.chm
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
order.htm
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
order.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
top flash to video.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
top flash to video.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
uninst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
ּ.url
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ּ.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
ⷴ.url
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ⷴ.url
Resource
win10v2004-20241007-en
General
-
Target
top flash to video.exe
-
Size
1.6MB
-
MD5
2aa4d2caa73ed5160cc34fba921236c1
-
SHA1
022d065ddb70ffa3bba898e183179772d7c484fd
-
SHA256
5e5ae825b31fa0863f8a3055379306e20ac9f3c554f121f4f0c29430f79e51cf
-
SHA512
3a3b0104b0005d1a158727ca51a797255616af0365090921db58cc70ec3a4a2cadb9a7630384af4cb7a5b134a9de5217bb7499cb02d13c9c92f6124a127fd7fd
-
SSDEEP
24576:G1tYL4dVpWK5GYFHGgGfqa2B7yzzLP0DTXYWCs/tSVmzvIPUrsj2WnkIdINwByd6:G1t5GYEaaD/YTKsVSVHPfnkII96
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral24/memory/1528-19-0x0000000000400000-0x0000000000CD8000-memory.dmp modiloader_stage2 behavioral24/memory/1528-24-0x0000000000400000-0x0000000000CD8000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 4436 CF06674C-EDA6-48df-B12C-F810984ACF54.exe -
Loads dropped DLL 4 IoCs
pid Process 1528 top flash to video.exe 1528 top flash to video.exe 1528 top flash to video.exe 1528 top flash to video.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1492 1528 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language top flash to video.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CF06674C-EDA6-48df-B12C-F810984ACF54.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1528 top flash to video.exe 1528 top flash to video.exe 1528 top flash to video.exe 1528 top flash to video.exe 1528 top flash to video.exe 1528 top flash to video.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1528 top flash to video.exe 1528 top flash to video.exe 1528 top flash to video.exe 1528 top flash to video.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4436 1528 top flash to video.exe 87 PID 1528 wrote to memory of 4436 1528 top flash to video.exe 87 PID 1528 wrote to memory of 4436 1528 top flash to video.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\top flash to video.exe"C:\Users\Admin\AppData\Local\Temp\top flash to video.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 8202⤵
- Program crash
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\CF06674C-EDA6-48df-B12C-F810984ACF54.exe"C:\Users\Admin\AppData\Local\Temp\CF06674C-EDA6-48df-B12C-F810984ACF54.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1528 -ip 15281⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c5be6b4274a62a7be11d1c018235a79b
SHA1a6e81b63a198fee34498cd95c78dec73b6957bcc
SHA256551a361bbfb5e01e7de1656059736c0bc0d119d85d020f1b6c61867abc0ca778
SHA512c06d6820c5998f13be5eabb8dd32c5cf2da27168d6ade1defa934ff464e05be276728a02f30d7d803dc6d64ce5eb22a80d2769b0fd6e6517c8351e631daadfde
-
Filesize
1KB
MD5f09be87202d5817120c8fbe46ccbea5e
SHA1d6417a20302afecaff6b5076ddef06100dc4f371
SHA2564fddf2db6fed4ba8712cb85b684f438648f08d21859748eed2160f8ce2eb4ee3
SHA512aac55dd50852fe41b2b3be2c826c155643521c5be4606324e70840a4d5df983d3ec616a3e68d542a2fb9edecbe3d4659d0b7de0df30e5125d919bf3b4c9b9dc2
-
Filesize
1KB
MD5ce49ea586115b986531f671cbb38d6ff
SHA10a0ab2fc21992937f89dd3639f2624c52d88f5dd
SHA256c146e621a9efb7d5ffbe24a36ca11a0a07edcd6341a77abb49dd1f04f88ab8a2
SHA512f4c32e1a584c0ff1fd414a58e40f5af77d2b9052e823ecc1ee0c37311c48de4a5a35f6b33d2d7580c79c2260b73fd652524b6174845f615cb426a5d7d173bd76
-
Filesize
1KB
MD519dc727886e5cf77151fecc6602b18e3
SHA1db0552406905cc6fb28ad17566313ea7059c70ce
SHA2563fd58ce91525999f79267507b364338ee0d193f7ad42508b7c253b7678f32046
SHA5126e35f482f142ba2fc86297694573f8bef3adb3c8db0e69371cc76ecce24338a872a5271af0ca1efe00ee40ca1a5788b6d23b9be0cb72413c9bef705794685b65