Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-03-2021 17:30
Static task
static1
Behavioral task
behavioral1
Sample
e0cdfc07fda1d67f20d9e22439550795.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
e0cdfc07fda1d67f20d9e22439550795.exe
Resource
win10v20201028
General
-
Target
e0cdfc07fda1d67f20d9e22439550795.exe
-
Size
1.5MB
-
MD5
e0cdfc07fda1d67f20d9e22439550795
-
SHA1
38e753f0331e6bd2dcb39b87532e41253d4872e1
-
SHA256
73b2da5f6faf24a5ab452699c277de166e2daf0a6b1b54c24f826004d9d09cc7
-
SHA512
09eecf64c0b2cbeb01c063bc328848a20e3442c46fbf261100c5a26cf375baa9c5407e726314bed639975959548a2dede17f31eaba882fb958b758e62c4a84e4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 3 IoCs
Processes:
resource yara_rule behavioral2/memory/936-15-0x0000000000400000-0x000000000045A000-memory.dmp modiloader_stage1 behavioral2/memory/936-16-0x0000000000443148-mapping.dmp modiloader_stage1 behavioral2/memory/936-17-0x0000000000400000-0x000000000045A000-memory.dmp modiloader_stage1 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
e0cdfc07fda1d67f20d9e22439550795.exedescription ioc process File opened for modification \??\PhysicalDrive0 e0cdfc07fda1d67f20d9e22439550795.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e0cdfc07fda1d67f20d9e22439550795.exedescription pid process target process PID 4804 set thread context of 936 4804 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
e0cdfc07fda1d67f20d9e22439550795.exedescription pid process target process PID 4804 wrote to memory of 596 4804 e0cdfc07fda1d67f20d9e22439550795.exe schtasks.exe PID 4804 wrote to memory of 596 4804 e0cdfc07fda1d67f20d9e22439550795.exe schtasks.exe PID 4804 wrote to memory of 596 4804 e0cdfc07fda1d67f20d9e22439550795.exe schtasks.exe PID 4804 wrote to memory of 936 4804 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 4804 wrote to memory of 936 4804 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 4804 wrote to memory of 936 4804 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 4804 wrote to memory of 936 4804 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 4804 wrote to memory of 936 4804 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 4804 wrote to memory of 936 4804 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 4804 wrote to memory of 936 4804 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 4804 wrote to memory of 936 4804 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 4804 wrote to memory of 936 4804 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 4804 wrote to memory of 936 4804 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe PID 4804 wrote to memory of 936 4804 e0cdfc07fda1d67f20d9e22439550795.exe e0cdfc07fda1d67f20d9e22439550795.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0cdfc07fda1d67f20d9e22439550795.exe"C:\Users\Admin\AppData\Local\Temp\e0cdfc07fda1d67f20d9e22439550795.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BqVOBoTRRj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1B1.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\e0cdfc07fda1d67f20d9e22439550795.exe"C:\Users\Admin\AppData\Local\Temp\e0cdfc07fda1d67f20d9e22439550795.exe"2⤵
- Writes to the Master Boot Record (MBR)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp1B1.tmpMD5
9b54be7243e9401435d4af6f4c2c21d1
SHA12a1cfc602f3d0fceab2534f20f0e1a1cd89c4865
SHA25674ee4620d44d0cfc0e78a7cea41b1d52c8ef6db10fce2cf33a42ab22cc586c2f
SHA512f611cf1c248f64bfa42de6e177e526728305b65628ec16c4758dbf3dbe23cbf754222465e55f5910a58d3a295f3d67451c31847df6dd82c1ec98efc454f18528
-
memory/596-13-0x0000000000000000-mapping.dmp
-
memory/936-17-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/936-16-0x0000000000443148-mapping.dmp
-
memory/936-15-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/4804-9-0x0000000004BC0000-0x0000000004BC1000-memory.dmpFilesize
4KB
-
memory/4804-2-0x0000000073A70000-0x000000007415E000-memory.dmpFilesize
6.9MB
-
memory/4804-10-0x0000000004B00000-0x0000000004B07000-memory.dmpFilesize
28KB
-
memory/4804-11-0x0000000004D80000-0x0000000004D81000-memory.dmpFilesize
4KB
-
memory/4804-12-0x00000000056B0000-0x0000000005733000-memory.dmpFilesize
524KB
-
memory/4804-8-0x0000000004990000-0x0000000004991000-memory.dmpFilesize
4KB
-
memory/4804-7-0x0000000004B20000-0x0000000004B21000-memory.dmpFilesize
4KB
-
memory/4804-6-0x0000000004F80000-0x0000000004F81000-memory.dmpFilesize
4KB
-
memory/4804-5-0x00000000049E0000-0x00000000049E1000-memory.dmpFilesize
4KB
-
memory/4804-3-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB