Analysis
-
max time kernel
66s -
max time network
121s -
platform
windows10_x64 -
resource
win10 -
submitted
13-08-2020 12:24
Static task
static1
Behavioral task
behavioral1
Sample
docs096.exe
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
docs096.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
docs096.exe
-
Size
970KB
-
MD5
cbdffd8eea94a96dd18766ed722023a3
-
SHA1
807bf4989f87a03a5e2869446ee50b0c6ec7fa9b
-
SHA256
f7c399554c57d028fb64973e5787137e96feb1dff9275cc13e6298e013671648
-
SHA512
42f224ee514c94a1a7db2114ff48d81aceeb1df08003754dd3dd83e7a33b9ba8c6b7b50a2e1779a4d363ab39d6095b5e73cf5f0e4d7d557f1096445f601e5c35
Score
10/10
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 1624 created 3812 1624 WerFault.exe 67 -
ServiceHost packer 7 IoCs
Detects ServiceHost packer used for .NET malware
resource yara_rule behavioral2/memory/3812-2-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/3812-4-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/3812-6-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/3812-7-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/3812-8-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/3812-9-0x0000000000000000-mapping.dmp servicehost behavioral2/memory/3812-10-0x0000000000000000-mapping.dmp servicehost -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zcvf = "C:\\Users\\Admin\\AppData\\Local\\Zcvf.url" docs096.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1624 3812 WerFault.exe 67 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1624 WerFault.exe Token: SeBackupPrivilege 1624 WerFault.exe Token: SeDebugPrivilege 1624 WerFault.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67 PID 3872 wrote to memory of 3812 3872 docs096.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\docs096.exe"C:\Users\Admin\AppData\Local\Temp\docs096.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵PID:3812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3812 -s 5643⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-