Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10_x64 -
resource
win10 -
submitted
09/07/2020, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order #282762,pdf.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Purchase order #282762,pdf.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
Purchase order #282762,pdf.exe
-
Size
546KB
-
MD5
ad588deeb9bc85e8bab185d7ae0a3a41
-
SHA1
78af8c81b8970356368dbb889ed8c1e283c2ee26
-
SHA256
0067b722606e5742dfa241ea0684189ab4989ab495328a327569027577f8592c
-
SHA512
3cb271465140a8e2c1111b5da1e50ddfe29970657ddd612764cc74b82bd3d3ee893b90dd071f6c567a81f879863b142abf76580a5a89959c234c0592d106580e
Score
10/10
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fhgw = "C:\\Users\\Admin\\AppData\\Local\\Fhgw\\Fhgw.hta" Purchase order #282762,pdf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3940 ieinstal.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67 PID 3700 wrote to memory of 3940 3700 Purchase order #282762,pdf.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase order #282762,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order #282762,pdf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3940
-