Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-03-2021 17:30
Static task
static1
Behavioral task
behavioral1
Sample
e0cdfc07fda1d67f20d9e22439550795.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
e0cdfc07fda1d67f20d9e22439550795.exe
Resource
win10v20201028
General
-
Target
e0cdfc07fda1d67f20d9e22439550795.exe
-
Size
1.5MB
-
MD5
e0cdfc07fda1d67f20d9e22439550795
-
SHA1
38e753f0331e6bd2dcb39b87532e41253d4872e1
-
SHA256
73b2da5f6faf24a5ab452699c277de166e2daf0a6b1b54c24f826004d9d09cc7
-
SHA512
09eecf64c0b2cbeb01c063bc328848a20e3442c46fbf261100c5a26cf375baa9c5407e726314bed639975959548a2dede17f31eaba882fb958b758e62c4a84e4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 3 IoCs
Processes:
resource yara_rule behavioral1/memory/808-10-0x0000000000400000-0x000000000045A000-memory.dmp modiloader_stage1 behavioral1/memory/808-11-0x0000000000443148-mapping.dmp modiloader_stage1 behavioral1/memory/808-12-0x0000000000400000-0x000000000045A000-memory.dmp modiloader_stage1 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
e0cdfc07fda1d67f20d9e22439550795.exedescription ioc process File opened for modification \??\PhysicalDrive0 e0cdfc07fda1d67f20d9e22439550795.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e0cdfc07fda1d67f20d9e22439550795.exedescription pid process target process PID 1044 set thread context of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
e0cdfc07fda1d67f20d9e22439550795.exedescription pid process target process PID 1044 wrote to memory of 732 1044 e0cdfc07fda1d67f20d9e22439550795.exe schtasks.exe PID 1044 wrote to memory of 732 1044 e0cdfc07fda1d67f20d9e22439550795.exe schtasks.exe PID 1044 wrote to memory of 732 1044 e0cdfc07fda1d67f20d9e22439550795.exe schtasks.exe PID 1044 wrote to memory of 732 1044 e0cdfc07fda1d67f20d9e22439550795.exe schtasks.exe PID 1044 wrote to memory of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 1044 wrote to memory of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 1044 wrote to memory of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 1044 wrote to memory of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 1044 wrote to memory of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 1044 wrote to memory of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 1044 wrote to memory of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 1044 wrote to memory of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 1044 wrote to memory of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 1044 wrote to memory of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 1044 wrote to memory of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 1044 wrote to memory of 808 1044 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0cdfc07fda1d67f20d9e22439550795.exe"C:\Users\Admin\AppData\Local\Temp\e0cdfc07fda1d67f20d9e22439550795.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BqVOBoTRRj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC8CB.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\e0cdfc07fda1d67f20d9e22439550795.exe"C:\Users\Admin\AppData\Local\Temp\e0cdfc07fda1d67f20d9e22439550795.exe"2⤵
- Writes to the Master Boot Record (MBR)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpC8CB.tmpMD5
52703984b84ba45e6f1b0aaca74b0ca6
SHA1a077983f4adb2f255170aba2b0c33247ca20bb28
SHA256b4ff2a6d7b04d40b382f4fe8dd7ac41007e35d8a94412425afa4a9d4924a4709
SHA512ed386cb2fbe27d2984d55650f1c5dfb637ac590aace61be1a3485503be1857bc9531d83af40e1e1d01c79b2bacb2a13178cb1a63a4e8013a98a30e348aea2f2a
-
memory/732-8-0x0000000000000000-mapping.dmp
-
memory/808-10-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/808-11-0x0000000000443148-mapping.dmp
-
memory/808-12-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/1044-2-0x0000000074110000-0x00000000747FE000-memory.dmpFilesize
6.9MB
-
memory/1044-3-0x00000000011B0000-0x00000000011B1000-memory.dmpFilesize
4KB
-
memory/1044-5-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/1044-6-0x00000000005C0000-0x00000000005C7000-memory.dmpFilesize
28KB
-
memory/1044-7-0x0000000005030000-0x00000000050B3000-memory.dmpFilesize
524KB