Analysis
-
max time kernel
52s -
max time network
59s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
13-08-2020 12:24
Static task
static1
Behavioral task
behavioral1
Sample
docs096.exe
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
docs096.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
docs096.exe
-
Size
970KB
-
MD5
cbdffd8eea94a96dd18766ed722023a3
-
SHA1
807bf4989f87a03a5e2869446ee50b0c6ec7fa9b
-
SHA256
f7c399554c57d028fb64973e5787137e96feb1dff9275cc13e6298e013671648
-
SHA512
42f224ee514c94a1a7db2114ff48d81aceeb1df08003754dd3dd83e7a33b9ba8c6b7b50a2e1779a4d363ab39d6095b5e73cf5f0e4d7d557f1096445f601e5c35
Score
10/10
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
docs096.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Zcvf = "C:\\Users\\Admin\\AppData\\Local\\Zcvf.url" docs096.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
docs096.exedescription pid process target process PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe PID 824 wrote to memory of 1808 824 docs096.exe ieinstal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\docs096.exe"C:\Users\Admin\AppData\Local\Temp\docs096.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵PID:1808
-