Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
30-03-2021 13:06
Static task
static1
Behavioral task
behavioral1
Sample
d5852dca87eaa4df0cf21616a30be33b.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
d5852dca87eaa4df0cf21616a30be33b.exe
Resource
win10v20201028
General
-
Target
d5852dca87eaa4df0cf21616a30be33b.exe
-
Size
617KB
-
MD5
d5852dca87eaa4df0cf21616a30be33b
-
SHA1
895f766ba9cf537ba5446e5482046e88fe4a7e10
-
SHA256
fee06f1a31cdd93b91bf8d0a5991023b2bf6d0ed2957c3bc0f40f05609eb689b
-
SHA512
2b691a7e356a395b772198006e87cbfcf9b807ec0d0e0e8ac7c300e3a6f5a7653a9c05ca484f1b1fbf6f0f8f968f6dc6659e4674122ea6f7dc797bd45de889da
Malware Config
Extracted
remcos
official.myq-see.com:2310
official.ydns.eu:2310
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d5852dca87eaa4df0cf21616a30be33b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nsrgar = "C:\\Users\\Public\\Libraries\\ragrsN.url" d5852dca87eaa4df0cf21616a30be33b.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ieinstal.exepid process 1728 ieinstal.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
d5852dca87eaa4df0cf21616a30be33b.exedescription pid process target process PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe PID 1656 wrote to memory of 1728 1656 d5852dca87eaa4df0cf21616a30be33b.exe ieinstal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5852dca87eaa4df0cf21616a30be33b.exe"C:\Users\Admin\AppData\Local\Temp\d5852dca87eaa4df0cf21616a30be33b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1656-2-0x00000000765A1000-0x00000000765A3000-memory.dmpFilesize
8KB
-
memory/1656-3-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1728-4-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB
-
memory/1728-5-0x0000000000000000-mapping.dmp
-
memory/1728-6-0x0000000000110000-0x0000000000111000-memory.dmpFilesize
4KB
-
memory/1728-8-0x0000000000180000-0x0000000000181000-memory.dmpFilesize
4KB
-
memory/1728-14-0x0000000010590000-0x000000001060B000-memory.dmpFilesize
492KB
-
memory/1728-15-0x00000000002B0000-0x0000000000328000-memory.dmpFilesize
480KB