Analysis

  • max time kernel
    69s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-12-2020 08:02

General

  • Target

    PO#4500139207.exe

  • Size

    670KB

  • MD5

    25ca0ed917887698786dbb93369e44d7

  • SHA1

    4058478a25e6ec602f2b5f361a4c07e9faff423f

  • SHA256

    f862eb253778c7b1c35349d798736124d7ee97db446217b2e5962fe2431d1e46

  • SHA512

    461b704157c3872ea60d98fd50c6905e704da4a6fc61cead098759d08c7e8b14e68ab6611b47cf9cfab36c54d40f80909d776654eb380bc22f4c3c519a9f990e

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO#4500139207.exe
    "C:\Users\Admin\AppData\Local\Temp\PO#4500139207.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Program Files (x86)\internet explorer\ieinstal.exe
      "C:\Program Files (x86)\internet explorer\ieinstal.exe"
      2⤵
        PID:1164

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1164-7-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/1164-8-0x0000000000000000-mapping.dmp
    • memory/1164-9-0x0000000000110000-0x0000000000111000-memory.dmp
      Filesize

      4KB

    • memory/1164-10-0x0000000000000000-mapping.dmp
    • memory/1164-12-0x0000000000000000-mapping.dmp
    • memory/1164-14-0x0000000000230000-0x0000000000231000-memory.dmp
      Filesize

      4KB

    • memory/1164-15-0x0000000000000000-mapping.dmp
    • memory/1656-2-0x00000000002D0000-0x00000000002FB000-memory.dmp
      Filesize

      172KB

    • memory/1656-5-0x0000000004310000-0x000000000435B000-memory.dmp
      Filesize

      300KB

    • memory/1656-13-0x0000000010550000-0x0000000010586000-memory.dmp
      Filesize

      216KB

    • memory/1680-4-0x000007FEF7BD0000-0x000007FEF7E4A000-memory.dmp
      Filesize

      2.5MB