Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/12/2024, 08:36 UTC

General

  • Target

    040807dc6c64493920f7a8d0a476add6f0a23702cb7ca2a3082a6b266912afd5N.exe

  • Size

    112KB

  • MD5

    9a31fe27d79afa3866155fdfee44f600

  • SHA1

    f6557e01697bdd43a8530d6e8b11aeba50efe952

  • SHA256

    040807dc6c64493920f7a8d0a476add6f0a23702cb7ca2a3082a6b266912afd5

  • SHA512

    ff37de6cbddc8843430fea30a82fb6a2c57c3fbb3e025e669f8956372b96f96c9b72177ca012a3d94915cf1e5161b2b3504d2247377e7453aaddcd9ec72109ed

  • SSDEEP

    1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJa:tVIr7zI+fAceoGxSKKo5a

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\040807dc6c64493920f7a8d0a476add6f0a23702cb7ca2a3082a6b266912afd5N.exe
    "C:\Users\Admin\AppData\Local\Temp\040807dc6c64493920f7a8d0a476add6f0a23702cb7ca2a3082a6b266912afd5N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:320
    • C:\Users\Admin\AppData\Local\Temp\040807dc6c64493920f7a8d0a476add6f0a23702cb7ca2a3082a6b266912afd5N.exe
      "C:\Users\Admin\AppData\Local\Temp\040807dc6c64493920f7a8d0a476add6f0a23702cb7ca2a3082a6b266912afd5N.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:576
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\RFGBC.bat" "
        3⤵
          PID:2456
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f
            4⤵
              PID:1864
          • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"
            3⤵
              PID:2820
              • C:\Windows\SysWOW64\svchost.exe
                "C:\Windows\system32\svchost.exe"
                4⤵
                  PID:1548
                • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"
                  4⤵
                    PID:704
                  • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"
                    4⤵
                      PID:856

              Network

              • flag-us
                DNS
                billabong4102.no-ip.biz
                Remote address:
                8.8.8.8:53
                Request
                billabong4102.no-ip.biz
                IN A
                Response
              No results found
              • 8.8.8.8:53
                billabong4102.no-ip.biz
                dns
                69 B
                129 B
                1
                1

                DNS Request

                billabong4102.no-ip.biz

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\RFGBC.bat

                Filesize

                148B

                MD5

                3a4614705555abb049c3298e61170b7f

                SHA1

                c8686410756f346d9551256a5b878b04770950ba

                SHA256

                cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b

                SHA512

                65ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007

              • \Users\Admin\AppData\Roaming\Microsoft\WAMain.exe

                Filesize

                112KB

                MD5

                9a31fe27d79afa3866155fdfee44f600

                SHA1

                f6557e01697bdd43a8530d6e8b11aeba50efe952

                SHA256

                040807dc6c64493920f7a8d0a476add6f0a23702cb7ca2a3082a6b266912afd5

                SHA512

                ff37de6cbddc8843430fea30a82fb6a2c57c3fbb3e025e669f8956372b96f96c9b72177ca012a3d94915cf1e5161b2b3504d2247377e7453aaddcd9ec72109ed

              • memory/320-90-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/320-287-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/320-125-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/320-107-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/320-92-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/320-96-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/320-100-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/320-98-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/320-94-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/576-124-0x0000000000400000-0x000000000040B000-memory.dmp

                Filesize

                44KB

              • memory/576-286-0x0000000000400000-0x000000000040B000-memory.dmp

                Filesize

                44KB

              • memory/704-288-0x0000000000400000-0x000000000040B000-memory.dmp

                Filesize

                44KB

              • memory/856-281-0x0000000000400000-0x0000000000414000-memory.dmp

                Filesize

                80KB

              • memory/856-289-0x0000000000400000-0x0000000000414000-memory.dmp

                Filesize

                80KB

              • memory/2644-51-0x0000000000430000-0x0000000000432000-memory.dmp

                Filesize

                8KB

              • memory/2644-38-0x0000000000420000-0x0000000000422000-memory.dmp

                Filesize

                8KB

              • memory/2644-32-0x00000000003E0000-0x00000000003E1000-memory.dmp

                Filesize

                4KB

              • memory/2644-28-0x00000000003C0000-0x00000000003C1000-memory.dmp

                Filesize

                4KB

              • memory/2644-20-0x0000000000360000-0x0000000000361000-memory.dmp

                Filesize

                4KB

              • memory/2644-2-0x0000000000230000-0x0000000000231000-memory.dmp

                Filesize

                4KB

              • memory/2644-14-0x0000000000300000-0x0000000000301000-memory.dmp

                Filesize

                4KB

              • memory/2644-8-0x00000000002D0000-0x00000000002D1000-memory.dmp

                Filesize

                4KB

              • memory/2644-80-0x0000000000490000-0x0000000000491000-memory.dmp

                Filesize

                4KB

              • memory/2644-50-0x0000000000420000-0x0000000000422000-memory.dmp

                Filesize

                8KB

              • memory/2644-4-0x0000000000230000-0x0000000000231000-memory.dmp

                Filesize

                4KB

              • memory/2644-89-0x0000000002480000-0x0000000002482000-memory.dmp

                Filesize

                8KB

              • memory/2644-88-0x0000000000480000-0x0000000000482000-memory.dmp

                Filesize

                8KB

              We care about your privacy.

              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.