Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2023, 08:17

General

  • Target

    BOQ-523-2022 R01.pdf.exe

  • Size

    723KB

  • MD5

    7bfb43461dc7e45a2d2019202453f437

  • SHA1

    24092359be8e8957d45a5f912e8011ec2310c657

  • SHA256

    3ae59bff704751af19ea535dd681e1549cceaafcd053f41d64c982235c8e4148

  • SHA512

    85ce8e41ffa0aa3c4db5602fe0ff8eceaae23fcc0b836f2ca25bc1ae8d497f91bc1c05d6abdcca90724f1aa286a9f42b090747f7818ff56c9e1b6a006d7a5e06

  • SSDEEP

    12288:NhrRcQ1GIjHQK1dbre1I8wtBzvoRcbM3VBcO9zJkF5kVn27jvTyUiats:jNGIjHX1re1I8YMRcb+VBcO9zu5S2/vS

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:484
      • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:660
        • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
          "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1800
          • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
            "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:796
            • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
              "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1548
              • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
                "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:436
                • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
                  "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
                  8⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:852
                  • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
                    "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
                    9⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:1788
                    • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
                      "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
                      10⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:1636
                      • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
                        "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
                        11⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:1964
                        • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
                          "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
                          12⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of WriteProcessMemory
                          PID:1524
                          • C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe
                            "C:\Users\Admin\AppData\Local\Temp\BOQ-523-2022 R01.pdf.exe"
                            13⤵
                              PID:2020

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/436-79-0x0000000000390000-0x00000000003BC000-memory.dmp

      Filesize

      176KB

    • memory/484-59-0x00000000002A0000-0x00000000002CC000-memory.dmp

      Filesize

      176KB

    • memory/660-63-0x0000000000280000-0x00000000002AC000-memory.dmp

      Filesize

      176KB

    • memory/796-71-0x00000000003B0000-0x00000000003DC000-memory.dmp

      Filesize

      176KB

    • memory/852-83-0x00000000002E0000-0x000000000030C000-memory.dmp

      Filesize

      176KB

    • memory/1244-55-0x00000000004C0000-0x00000000004EC000-memory.dmp

      Filesize

      176KB

    • memory/1244-54-0x0000000075291000-0x0000000075293000-memory.dmp

      Filesize

      8KB

    • memory/1524-99-0x00000000002B0000-0x00000000002DC000-memory.dmp

      Filesize

      176KB

    • memory/1548-75-0x0000000000290000-0x00000000002BC000-memory.dmp

      Filesize

      176KB

    • memory/1636-91-0x0000000000330000-0x000000000035C000-memory.dmp

      Filesize

      176KB

    • memory/1964-95-0x0000000000350000-0x000000000037C000-memory.dmp

      Filesize

      176KB