Analysis
-
max time kernel
66s -
max time network
121s -
platform
windows10_x64 -
resource
win10 -
submitted
13-08-2020 12:24
Static task
static1
Behavioral task
behavioral1
Sample
docs096.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
docs096.exe
Resource
win10
General
-
Target
docs096.exe
-
Size
970KB
-
MD5
cbdffd8eea94a96dd18766ed722023a3
-
SHA1
807bf4989f87a03a5e2869446ee50b0c6ec7fa9b
-
SHA256
f7c399554c57d028fb64973e5787137e96feb1dff9275cc13e6298e013671648
-
SHA512
42f224ee514c94a1a7db2114ff48d81aceeb1df08003754dd3dd83e7a33b9ba8c6b7b50a2e1779a4d363ab39d6095b5e73cf5f0e4d7d557f1096445f601e5c35
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 1624 created 3812 1624 WerFault.exe ieinstal.exe -
ServiceHost packer 7 IoCs
Detects ServiceHost packer used for .NET malware
Processes:
resource yara_rule behavioral2/memory/3812-2-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/3812-4-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/3812-6-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/3812-7-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/3812-8-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/3812-9-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/3812-10-0x0000000000000000-mapping.dmp servicehost -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
docs096.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zcvf = "C:\\Users\\Admin\\AppData\\Local\\Zcvf.url" docs096.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1624 3812 WerFault.exe ieinstal.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1624 WerFault.exe Token: SeBackupPrivilege 1624 WerFault.exe Token: SeDebugPrivilege 1624 WerFault.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
docs096.exedescription pid process target process PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe PID 3872 wrote to memory of 3812 3872 docs096.exe ieinstal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\docs096.exe"C:\Users\Admin\AppData\Local\Temp\docs096.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵PID:3812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3812 -s 5643⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-