Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    10/12/2021, 14:32

General

  • Target

    0f559c7ea254285bab84e60d2a5e8037.exe

  • Size

    922KB

  • MD5

    0f559c7ea254285bab84e60d2a5e8037

  • SHA1

    388cfbde34fcc37f5f334ef39d29b5f3e655fed0

  • SHA256

    2cbccb76adf567a82d9d6fcbf7a6c02bce157e1870df149af7391b20b9fdc672

  • SHA512

    9184568937a92cd99d4dc2981dae9bdad139781a1bce87c553b9dad6052654531f2f9ebfc72977e00d2bd4b24a11671317e5cd778150c5a915ec87b739b77ef0

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader First Stage 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f559c7ea254285bab84e60d2a5e8037.exe
    "C:\Users\Admin\AppData\Local\Temp\0f559c7ea254285bab84e60d2a5e8037.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Local\Temp\0f559c7ea254285bab84e60d2a5e8037.exe
      C:\Users\Admin\AppData\Local\Temp\0f559c7ea254285bab84e60d2a5e8037.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:428
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
        3⤵
        • Creates scheduled task(s)
        PID:1628
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {8BD94ECD-7AA2-4D4D-82B6-621CF6439D44} S-1-5-21-3846991908-3261386348-1409841751-1000:VQVVOAJK\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
          4⤵
          • Creates scheduled task(s)
          PID:1612
    • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
        3⤵
        • Executes dropped EXE
        PID:964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/428-63-0x0000000000020000-0x0000000000026000-memory.dmp

    Filesize

    24KB

  • memory/428-62-0x0000000000510000-0x0000000000518000-memory.dmp

    Filesize

    32KB

  • memory/428-58-0x0000000000510000-0x0000000000518000-memory.dmp

    Filesize

    32KB

  • memory/428-57-0x0000000000510000-0x0000000000518000-memory.dmp

    Filesize

    32KB

  • memory/1144-69-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1144-68-0x0000000000571000-0x0000000000585000-memory.dmp

    Filesize

    80KB

  • memory/1528-54-0x0000000076121000-0x0000000076123000-memory.dmp

    Filesize

    8KB

  • memory/1528-55-0x00000000003E1000-0x00000000003F5000-memory.dmp

    Filesize

    80KB

  • memory/1528-56-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/1604-89-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1604-88-0x00000000004F1000-0x0000000000505000-memory.dmp

    Filesize

    80KB