Analysis
-
max time kernel
126s -
max time network
126s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
22-03-2021 20:14
Static task
static1
Behavioral task
behavioral1
Sample
b305d95fa833495eca1fa9ab824a25e0.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b305d95fa833495eca1fa9ab824a25e0.exe
Resource
win10v20201028
General
-
Target
b305d95fa833495eca1fa9ab824a25e0.exe
-
Size
5.2MB
-
MD5
b305d95fa833495eca1fa9ab824a25e0
-
SHA1
18a87991e98013678713cf231f37787ab0c87512
-
SHA256
4d71bbe32ad8828d3ed66fb0ea352086181390391bab0960298fad620b61eee7
-
SHA512
51ac574dd06ae8d267f400005b1c698fd2c3f1a50dc27afcc554bf7e836046f0fea6808f8e4cc4ebc827530bdbe6bc3cd949c27672e7770070e3aafdaa42110f
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 3 IoCs
Processes:
resource yara_rule behavioral1/memory/472-28-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage1 behavioral1/memory/472-29-0x0000000000443144-mapping.dmp modiloader_stage1 behavioral1/memory/472-30-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage1 -
Executes dropped EXE 2 IoCs
Processes:
dowbuxaafml.comdowbuxaafml.compid process 1032 dowbuxaafml.com 1520 dowbuxaafml.com -
Loads dropped DLL 1 IoCs
Processes:
dowbuxaafml.compid process 1032 dowbuxaafml.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
notepad.exedescription ioc process File opened for modification \??\PhysicalDrive0 notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
dowbuxaafml.comdescription pid process target process PID 1520 set thread context of 472 1520 dowbuxaafml.com notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 1856 PING.EXE 1216 PING.EXE 1528 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
dowbuxaafml.compid process 1032 dowbuxaafml.com -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
dowbuxaafml.comdowbuxaafml.compid process 1032 dowbuxaafml.com 1032 dowbuxaafml.com 1520 dowbuxaafml.com 1520 dowbuxaafml.com -
Suspicious use of FindShellTrayWindow 13 IoCs
Processes:
dowbuxaafml.comdowbuxaafml.compid process 1032 dowbuxaafml.com 1032 dowbuxaafml.com 1520 dowbuxaafml.com 1520 dowbuxaafml.com 1032 dowbuxaafml.com 1520 dowbuxaafml.com 1032 dowbuxaafml.com 1520 dowbuxaafml.com 1032 dowbuxaafml.com 1520 dowbuxaafml.com 1520 dowbuxaafml.com 1520 dowbuxaafml.com 1520 dowbuxaafml.com -
Suspicious use of SendNotifyMessage 13 IoCs
Processes:
dowbuxaafml.comdowbuxaafml.compid process 1032 dowbuxaafml.com 1032 dowbuxaafml.com 1520 dowbuxaafml.com 1520 dowbuxaafml.com 1032 dowbuxaafml.com 1520 dowbuxaafml.com 1032 dowbuxaafml.com 1520 dowbuxaafml.com 1032 dowbuxaafml.com 1520 dowbuxaafml.com 1520 dowbuxaafml.com 1520 dowbuxaafml.com 1520 dowbuxaafml.com -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
b305d95fa833495eca1fa9ab824a25e0.execmd.execmd.exedowbuxaafml.comdowbuxaafml.comdescription pid process target process PID 1740 wrote to memory of 1988 1740 b305d95fa833495eca1fa9ab824a25e0.exe cmd.exe PID 1740 wrote to memory of 1988 1740 b305d95fa833495eca1fa9ab824a25e0.exe cmd.exe PID 1740 wrote to memory of 1988 1740 b305d95fa833495eca1fa9ab824a25e0.exe cmd.exe PID 1740 wrote to memory of 1964 1740 b305d95fa833495eca1fa9ab824a25e0.exe cmd.exe PID 1740 wrote to memory of 1964 1740 b305d95fa833495eca1fa9ab824a25e0.exe cmd.exe PID 1740 wrote to memory of 1964 1740 b305d95fa833495eca1fa9ab824a25e0.exe cmd.exe PID 1964 wrote to memory of 1832 1964 cmd.exe cmd.exe PID 1964 wrote to memory of 1832 1964 cmd.exe cmd.exe PID 1964 wrote to memory of 1832 1964 cmd.exe cmd.exe PID 1832 wrote to memory of 1856 1832 cmd.exe PING.EXE PID 1832 wrote to memory of 1856 1832 cmd.exe PING.EXE PID 1832 wrote to memory of 1856 1832 cmd.exe PING.EXE PID 1832 wrote to memory of 1824 1832 cmd.exe certutil.exe PID 1832 wrote to memory of 1824 1832 cmd.exe certutil.exe PID 1832 wrote to memory of 1824 1832 cmd.exe certutil.exe PID 1832 wrote to memory of 1504 1832 cmd.exe certutil.exe PID 1832 wrote to memory of 1504 1832 cmd.exe certutil.exe PID 1832 wrote to memory of 1504 1832 cmd.exe certutil.exe PID 1832 wrote to memory of 1032 1832 cmd.exe dowbuxaafml.com PID 1832 wrote to memory of 1032 1832 cmd.exe dowbuxaafml.com PID 1832 wrote to memory of 1032 1832 cmd.exe dowbuxaafml.com PID 1832 wrote to memory of 1032 1832 cmd.exe dowbuxaafml.com PID 1832 wrote to memory of 1216 1832 cmd.exe PING.EXE PID 1832 wrote to memory of 1216 1832 cmd.exe PING.EXE PID 1832 wrote to memory of 1216 1832 cmd.exe PING.EXE PID 1032 wrote to memory of 1520 1032 dowbuxaafml.com dowbuxaafml.com PID 1032 wrote to memory of 1520 1032 dowbuxaafml.com dowbuxaafml.com PID 1032 wrote to memory of 1520 1032 dowbuxaafml.com dowbuxaafml.com PID 1032 wrote to memory of 1520 1032 dowbuxaafml.com dowbuxaafml.com PID 1832 wrote to memory of 1528 1832 cmd.exe PING.EXE PID 1832 wrote to memory of 1528 1832 cmd.exe PING.EXE PID 1832 wrote to memory of 1528 1832 cmd.exe PING.EXE PID 1520 wrote to memory of 472 1520 dowbuxaafml.com notepad.exe PID 1520 wrote to memory of 472 1520 dowbuxaafml.com notepad.exe PID 1520 wrote to memory of 472 1520 dowbuxaafml.com notepad.exe PID 1520 wrote to memory of 472 1520 dowbuxaafml.com notepad.exe PID 1520 wrote to memory of 472 1520 dowbuxaafml.com notepad.exe PID 1520 wrote to memory of 472 1520 dowbuxaafml.com notepad.exe PID 1520 wrote to memory of 472 1520 dowbuxaafml.com notepad.exe PID 1520 wrote to memory of 472 1520 dowbuxaafml.com notepad.exe PID 1520 wrote to memory of 472 1520 dowbuxaafml.com notepad.exe PID 1520 wrote to memory of 472 1520 dowbuxaafml.com notepad.exe PID 1520 wrote to memory of 472 1520 dowbuxaafml.com notepad.exe PID 1520 wrote to memory of 472 1520 dowbuxaafml.com notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b305d95fa833495eca1fa9ab824a25e0.exe"C:\Users\Admin\AppData\Local\Temp\b305d95fa833495eca1fa9ab824a25e0.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo xbghltrocu2⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < pxcljaquz.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping -n 1 duzihnfxa4⤵
- Runs ping.exe
-
C:\Windows\system32\certutil.execertutil -decode yhecylzwzug.com dowbuxaafml.com4⤵
-
C:\Windows\system32\certutil.execertutil -decode vctcuhs.com jwpeqie.com4⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\dowbuxaafml.comdowbuxaafml.com jwpeqie.com4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\dowbuxaafml.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\dowbuxaafml.com "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\jwpeqie.com"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"6⤵
- Writes to the Master Boot Record (MBR)
-
C:\Windows\system32\PING.EXEping -n 1 duzihnfxa4⤵
- Runs ping.exe
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 64⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\crwoewlcvehk.comMD5
6b56d8e939b35f2f576bc19bcd5bd4bc
SHA170163bd1fb51e60edaf6a5eee029902f1adc0fb3
SHA256497527b85e287c573c75b6d4697c01ecd1d39a60c6729ab8cb7fa5e08e3813f3
SHA5124ee2549425c533f107b6521fb8d3e695039250c2393fa37c60cf692b911dc578d6c6a4923dbcb63ea89efe07ab99bf4f7d0c71eddd1c94c7813357a910f2c6d3
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\dowbuxaafml.comMD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\dowbuxaafml.comMD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\dowbuxaafml.comMD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\jwpeqie.comMD5
b3bf39a799e47dabc1f9bbfc875c3beb
SHA1c213f0aaf2cb82037d74aa47dfdd05163b8f58a7
SHA25616a1d90aafa2b3ad392eea747b9d5ece20c59f72099285e9605e8eacc291b291
SHA51242f375ce1b92528599d37ce69358e07342a231b39058c90cdfe3cefac2fee6fbec81e893ca4068671643a1ab02b7633a5b6fca8de6a1809c48f9a8b9eb0ec6c4
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\kviuahpf.comMD5
8b73801eca92aa565964e7955979fa0f
SHA1819947d189c50698adb023e3b2d4da70b8bccb0d
SHA256f0f55933069518edf43ec78c6f7fff1f78bb701f2ed666979b5ea5febd9a4e95
SHA5121b927c1c0bf77e11734f5f79a543903e5eb131f1557e96545f89e0df3181afa669251c72a4801047d78fff2aba6ead8e8904a96d6f5b1be7511e8bca4d1638fd
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\pxcljaquz.comMD5
ea769126afef2db6b4803a1d02c80e59
SHA15dca069e32cd5e36bf440de757046f628b95f637
SHA256166a6abd42e29c20441f8479d7b229bb645d9bb978876240e777c795a3db0104
SHA512f870f9151110db637f121f0dc2ab03e8f7d9d31ddb7891d29ff67b38d253618cdc400a0732a4ad641fec1bf0d53e295e25ef229157bb07c45bf64bb45e8dd2c4
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\vctcuhs.comMD5
7893426a4fd8580f23a37ae1287f5be9
SHA1968fe3f180974b39b50447f9ce2ec8847fecc1a7
SHA2564fa5a55c00871a39396e97f28dab217678188acd6c040d1f85043f403c2f2e2b
SHA512efd9e58e496534ea2c6014288a48040d1f5f947d99d77b60e05d168d92f1fb225198def5fd26016f7a6adacecd6f462b95a16b4614e9259a8ed813caee08bc2c
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\yhecylzwzug.comMD5
468700e94b5acaa2a3f3f397797eb77c
SHA1ac8e8380961148536e567f5b0861e3562c5c13a6
SHA25691ca23d7ae9492210e92652f79f406f8c5be5debdd31d6ba91cca8e7720b03b9
SHA512621f3da4d3db5866be441fd8608e90db4cb88dbc30c06b5d694ba45519012d442202e9ece1f7e6878b7534ef2c9cf07f0c60e9638f9ab6be7fbca7f907c2d152
-
\Users\Admin\AppData\Local\Temp\7ZipSfx.000\dowbuxaafml.comMD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
memory/472-28-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/472-29-0x0000000000443144-mapping.dmp
-
memory/472-30-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/1032-16-0x0000000000000000-mapping.dmp
-
memory/1032-19-0x00000000766F1000-0x00000000766F3000-memory.dmpFilesize
8KB
-
memory/1216-18-0x0000000000000000-mapping.dmp
-
memory/1504-12-0x0000000000000000-mapping.dmp
-
memory/1504-13-0x00000000FFC61000-0x00000000FFC63000-memory.dmpFilesize
8KB
-
memory/1520-22-0x0000000000000000-mapping.dmp
-
memory/1528-25-0x0000000000000000-mapping.dmp
-
memory/1740-2-0x0000000140000000-0x0000000140073000-memory.dmpFilesize
460KB
-
memory/1740-3-0x000007FEFBDE1000-0x000007FEFBDE3000-memory.dmpFilesize
8KB
-
memory/1824-10-0x00000000FF7A1000-0x00000000FF7A3000-memory.dmpFilesize
8KB
-
memory/1824-9-0x0000000000000000-mapping.dmp
-
memory/1832-7-0x0000000000000000-mapping.dmp
-
memory/1856-8-0x0000000000000000-mapping.dmp
-
memory/1964-5-0x0000000000000000-mapping.dmp
-
memory/1988-4-0x0000000000000000-mapping.dmp