Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
13-07-2020 06:37
Static task
static1
Behavioral task
behavioral1
Sample
order confirmation PO#1912679,rar.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
order confirmation PO#1912679,rar.exe
Resource
win10
General
-
Target
order confirmation PO#1912679,rar.exe
-
Size
1.3MB
-
MD5
0fffcf232ba8b08e1036a01c66d22f54
-
SHA1
7222e9903ec892627197233498a6e0cede759630
-
SHA256
76fff401edfeb7279561b52d1e6486145600c6834d7ce8e7c46a571f1161eabe
-
SHA512
067a969a0084f1077652988d9a17bfa256127588a1af25b641afd737fb34bfae78816e86a6986bb9a84ab79e15d9eb112f0c351d630ab36f9ea28b0396bd19a0
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
order confirmation PO#1912679,rar.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Txcx = "C:\\Users\\Admin\\AppData\\Local\\Txcx\\Txcx.hta" order confirmation PO#1912679,rar.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
order confirmation PO#1912679,rar.exedescription pid process target process PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe PID 1296 wrote to memory of 1388 1296 order confirmation PO#1912679,rar.exe ieinstal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\order confirmation PO#1912679,rar.exe"C:\Users\Admin\AppData\Local\Temp\order confirmation PO#1912679,rar.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1296-3-0x0000000010530000-0x0000000010553000-memory.dmpFilesize
140KB
-
memory/1388-1-0x0000000000000000-mapping.dmp
-
memory/1388-0-0x0000000000000000-mapping.dmp
-
memory/1388-2-0x0000000000000000-mapping.dmp
-
memory/1388-4-0x0000000000000000-mapping.dmp