Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    08-12-2020 08:02

General

  • Target

    PO#4500139207.exe

  • Size

    670KB

  • MD5

    25ca0ed917887698786dbb93369e44d7

  • SHA1

    4058478a25e6ec602f2b5f361a4c07e9faff423f

  • SHA256

    f862eb253778c7b1c35349d798736124d7ee97db446217b2e5962fe2431d1e46

  • SHA512

    461b704157c3872ea60d98fd50c6905e704da4a6fc61cead098759d08c7e8b14e68ab6611b47cf9cfab36c54d40f80909d776654eb380bc22f4c3c519a9f990e

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO#4500139207.exe
    "C:\Users\Admin\AppData\Local\Temp\PO#4500139207.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Program Files (x86)\internet explorer\ieinstal.exe
      "C:\Program Files (x86)\internet explorer\ieinstal.exe"
      2⤵
        PID:1144

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1144-7-0x0000000000000000-mapping.dmp
    • memory/1144-6-0x0000000000D40000-0x0000000000D41000-memory.dmp
      Filesize

      4KB

    • memory/1144-8-0x0000000001000000-0x0000000001001000-memory.dmp
      Filesize

      4KB

    • memory/1144-9-0x0000000000000000-mapping.dmp
    • memory/1144-11-0x0000000000000000-mapping.dmp
    • memory/1144-13-0x0000000000D60000-0x0000000000D61000-memory.dmp
      Filesize

      4KB

    • memory/1144-14-0x0000000000000000-mapping.dmp
    • memory/1156-2-0x0000000002610000-0x000000000263B000-memory.dmp
      Filesize

      172KB

    • memory/1156-4-0x00000000046A0000-0x00000000046EB000-memory.dmp
      Filesize

      300KB

    • memory/1156-12-0x0000000010550000-0x0000000010586000-memory.dmp
      Filesize

      216KB