Analysis

  • max time kernel
    97s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    23-08-2021 06:11

General

  • Target

    290321 de bon de commande,pdf.exe

  • Size

    689KB

  • MD5

    efa94719f0d14b3f8f330e5c7949dd2f

  • SHA1

    6232070998c6d992941b4a5be9008efaf4af2370

  • SHA256

    98f868900b27ba82ac18f919dc551ea15dc310813eb1538ebf2d0ab3afaa8328

  • SHA512

    084f16cb4697e46744442c482c40a79f67262b2887087f3d21994aa24106d843ff7f4ecedfd4296e2922ccbcdfddb029a3130c6c493dfb1aa5b843e84f56acca

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\290321 de bon de commande,pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\290321 de bon de commande,pdf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Program Files (x86)\internet explorer\ieinstal.exe
      "C:\Program Files (x86)\internet explorer\ieinstal.exe"
      2⤵
        PID:1476

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/784-114-0x0000000000610000-0x0000000000611000-memory.dmp
      Filesize

      4KB

    • memory/1476-115-0x0000000000000000-mapping.dmp
    • memory/1476-117-0x0000000000ED0000-0x0000000000ED1000-memory.dmp
      Filesize

      4KB

    • memory/1476-116-0x0000000000E70000-0x0000000000E71000-memory.dmp
      Filesize

      4KB

    • memory/1476-118-0x0000000010550000-0x0000000010586000-memory.dmp
      Filesize

      216KB

    • memory/1476-119-0x0000000000BB0000-0x0000000000BB1000-memory.dmp
      Filesize

      4KB

    • memory/1476-120-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB