Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    10-12-2021 14:32

General

  • Target

    0f559c7ea254285bab84e60d2a5e8037.exe

  • Size

    922KB

  • MD5

    0f559c7ea254285bab84e60d2a5e8037

  • SHA1

    388cfbde34fcc37f5f334ef39d29b5f3e655fed0

  • SHA256

    2cbccb76adf567a82d9d6fcbf7a6c02bce157e1870df149af7391b20b9fdc672

  • SHA512

    9184568937a92cd99d4dc2981dae9bdad139781a1bce87c553b9dad6052654531f2f9ebfc72977e00d2bd4b24a11671317e5cd778150c5a915ec87b739b77ef0

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader First Stage 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f559c7ea254285bab84e60d2a5e8037.exe
    "C:\Users\Admin\AppData\Local\Temp\0f559c7ea254285bab84e60d2a5e8037.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Local\Temp\0f559c7ea254285bab84e60d2a5e8037.exe
      C:\Users\Admin\AppData\Local\Temp\0f559c7ea254285bab84e60d2a5e8037.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:428
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
        3⤵
        • Creates scheduled task(s)
        PID:1628
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {8BD94ECD-7AA2-4D4D-82B6-621CF6439D44} S-1-5-21-3846991908-3261386348-1409841751-1000:VQVVOAJK\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
          4⤵
          • Creates scheduled task(s)
          PID:1612
    • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
        3⤵
        • Executes dropped EXE
        PID:964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

    MD5

    7f997e364440385cf76045b4b6258bc2

    SHA1

    133867043c8bfc9809a9394f072f8599c2831720

    SHA256

    f30e2708743a73666cca5ec8bef719bfed63a994112e8675d6a84f5d3c47b8f3

    SHA512

    d1c913297a566c475c6cc20cd2e1d340c90afc789b46794fd38715dabb96bdd3584efdb97e6273f547083e066859f1683d50136dd916f7abd3c7e5f6448150ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_E0700C7313F9B9A61F642FCBB2500663

    MD5

    1097d8b950738c3ca1d53645565ab093

    SHA1

    986fcdfad1be23e0e7c160d5513c8a957f28e045

    SHA256

    ad7e8f7ff625381a69fd508d5072fa075467a00d2dbcae9c7e11e6a00b80baa0

    SHA512

    e09ce31a218807433866c83d4d68f07ab869938ae7d465db6635e449c1be8198c7fccd9692dcca000d072c226b32c42c592a94077dd5dbcfd7227db10f000c08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    MD5

    61e098653a5cd0c15c9b77da2ebbddf2

    SHA1

    6f15f1f9238a082c5290d9e524c9508e25cfe2e9

    SHA256

    523b0d5fba1bd75a12a05644bb7c2e0fe1cf9ddf33f4ab2e13678b449d437ad0

    SHA512

    1b47fb4e0455a27ffb2610b1d14b9c891105c94cd8a8535f571fce0698fdd4e721d23a0230a9ef0b6838b641ffae7aa1e67f92ec5f4fc7abad4a509e389b74c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

    MD5

    5f66934e496c463b2684d642fc306f10

    SHA1

    b52bcca8ee1a053148c0e3dd316c91dfaf8cde92

    SHA256

    678bcb467a8db39b9e1877d6e2c6dfc683970dfd50184fb07b9e8fda5ae13522

    SHA512

    98f3954e72a181f6b2351ded88ce338226d170cb2f7a9ef5501bacf58b4f8b368c900c3ffefa5b8e071dd2916904123c0eabf05760e89739cb829572d9873fa7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_E0700C7313F9B9A61F642FCBB2500663

    MD5

    77e8d173d996fcb6c5f9cab0c13e49ef

    SHA1

    561ebf10e0b5ed91fdc8f0303c60bc20b3e49c9a

    SHA256

    2bf226a58aa3457a6fd0e14ca7a8078453d65f18d56fd1e332c0818c314880ca

    SHA512

    ade1bd96841c9bcaccedcca5a142d3656dc8bc5dc3e6adad8dc186d186827ec176f1fdec230da1462e9f21fd7a04e18d27478a3fe6d2ce83a2656d96de35d5a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    MD5

    1565c52d5fa073db4c10e225b4dd47c5

    SHA1

    cacb69cb3f66ca9b0a6c0eecac3efeba78c786de

    SHA256

    5ebca8f4c171ca015b073d010960ed6a69be6bcf785fd3cb7590dfa587fff824

    SHA512

    3b5198ef72c5044a42ea2ee089ea152de7d657cb66e16c2536bd934fb7f7b1ac0eaddf4a62e05a4c85418b1be486da19e9bc5c2aac64a02b51f7a21c31b62af4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    MD5

    c44dc604798053b074423c3869191c1c

    SHA1

    09997bbabe60311815195ccdebdd9da2e86dd18e

    SHA256

    6cadf5c2e9a8f5c7ba5f2cffe9d4b81a71a3551af8c1425d506e5aad57c007a9

    SHA512

    03a9b49116d6f5b6bcd328b3b00ce6df3b388e091efc049bfd77fb00f742126677c5447505f4517f64103f60dbced9c350ebdb498d6ccc78530bcbe3a0d7a10a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1VSJJWE3\Cdlfyqnjpnryjffmuvkpoubkyuajrzq[1].bmp

    MD5

    97b17a754ea11f763c0a8e7b77bee4f5

    SHA1

    c219ddd3dd96c70b129628de74f9bd7bccfa7033

    SHA256

    9b03641e0476593d970073c3b3e84510c5c2a4ea85a7909dee78aa8eecb65f9e

    SHA512

    cc418eb70a70a90d34ec5cd4d3aced98931cb2392bb3c950e86b5941a6381d88a8d9980d4ef83f53132dc691f48a57038b0d9e2e774fe312d2b3aaf78c7daf99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\34ZL0Q4Z\Cdlfyqnjpnryjffmuvkpoubkyuajrzq[1].bmp

    MD5

    97b17a754ea11f763c0a8e7b77bee4f5

    SHA1

    c219ddd3dd96c70b129628de74f9bd7bccfa7033

    SHA256

    9b03641e0476593d970073c3b3e84510c5c2a4ea85a7909dee78aa8eecb65f9e

    SHA512

    cc418eb70a70a90d34ec5cd4d3aced98931cb2392bb3c950e86b5941a6381d88a8d9980d4ef83f53132dc691f48a57038b0d9e2e774fe312d2b3aaf78c7daf99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3UFND3CH\Cdlfyqnjpnryjffmuvkpoubkyuajrzq[1].htm

    MD5

    1f1d28875f2782638dd9ee072ebecb7e

    SHA1

    2dc58874eb002d0a9ec5ecded19d1e1523577421

    SHA256

    849add4aa76d040ca6fc9fb886c61101a11f8ca472029921b6dd4829890b448b

    SHA512

    0a17e30a8875875287bb1f1789084b0e38a500a10e354f3eae707a9aac5fc840bd5dc58e73315d48e75f93cb00bd8f781f88b8c86b7b936524f08881cfeef46d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3UFND3CH\Cdlfyqnjpnryjffmuvkpoubkyuajrzq[1].htm

    MD5

    1f1d28875f2782638dd9ee072ebecb7e

    SHA1

    2dc58874eb002d0a9ec5ecded19d1e1523577421

    SHA256

    849add4aa76d040ca6fc9fb886c61101a11f8ca472029921b6dd4829890b448b

    SHA512

    0a17e30a8875875287bb1f1789084b0e38a500a10e354f3eae707a9aac5fc840bd5dc58e73315d48e75f93cb00bd8f781f88b8c86b7b936524f08881cfeef46d

  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe

    MD5

    0f559c7ea254285bab84e60d2a5e8037

    SHA1

    388cfbde34fcc37f5f334ef39d29b5f3e655fed0

    SHA256

    2cbccb76adf567a82d9d6fcbf7a6c02bce157e1870df149af7391b20b9fdc672

    SHA512

    9184568937a92cd99d4dc2981dae9bdad139781a1bce87c553b9dad6052654531f2f9ebfc72977e00d2bd4b24a11671317e5cd778150c5a915ec87b739b77ef0

  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe

    MD5

    0f559c7ea254285bab84e60d2a5e8037

    SHA1

    388cfbde34fcc37f5f334ef39d29b5f3e655fed0

    SHA256

    2cbccb76adf567a82d9d6fcbf7a6c02bce157e1870df149af7391b20b9fdc672

    SHA512

    9184568937a92cd99d4dc2981dae9bdad139781a1bce87c553b9dad6052654531f2f9ebfc72977e00d2bd4b24a11671317e5cd778150c5a915ec87b739b77ef0

  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe

    MD5

    0f559c7ea254285bab84e60d2a5e8037

    SHA1

    388cfbde34fcc37f5f334ef39d29b5f3e655fed0

    SHA256

    2cbccb76adf567a82d9d6fcbf7a6c02bce157e1870df149af7391b20b9fdc672

    SHA512

    9184568937a92cd99d4dc2981dae9bdad139781a1bce87c553b9dad6052654531f2f9ebfc72977e00d2bd4b24a11671317e5cd778150c5a915ec87b739b77ef0

  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe

    MD5

    0f559c7ea254285bab84e60d2a5e8037

    SHA1

    388cfbde34fcc37f5f334ef39d29b5f3e655fed0

    SHA256

    2cbccb76adf567a82d9d6fcbf7a6c02bce157e1870df149af7391b20b9fdc672

    SHA512

    9184568937a92cd99d4dc2981dae9bdad139781a1bce87c553b9dad6052654531f2f9ebfc72977e00d2bd4b24a11671317e5cd778150c5a915ec87b739b77ef0

  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe

    MD5

    0f559c7ea254285bab84e60d2a5e8037

    SHA1

    388cfbde34fcc37f5f334ef39d29b5f3e655fed0

    SHA256

    2cbccb76adf567a82d9d6fcbf7a6c02bce157e1870df149af7391b20b9fdc672

    SHA512

    9184568937a92cd99d4dc2981dae9bdad139781a1bce87c553b9dad6052654531f2f9ebfc72977e00d2bd4b24a11671317e5cd778150c5a915ec87b739b77ef0

  • memory/428-59-0x00000000005115AA-mapping.dmp

  • memory/428-63-0x0000000000020000-0x0000000000026000-memory.dmp

    Filesize

    24KB

  • memory/428-62-0x0000000000510000-0x0000000000518000-memory.dmp

    Filesize

    32KB

  • memory/428-58-0x0000000000510000-0x0000000000518000-memory.dmp

    Filesize

    32KB

  • memory/428-57-0x0000000000510000-0x0000000000518000-memory.dmp

    Filesize

    32KB

  • memory/964-94-0x00000000005115AA-mapping.dmp

  • memory/1144-65-0x0000000000000000-mapping.dmp

  • memory/1144-69-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1144-68-0x0000000000571000-0x0000000000585000-memory.dmp

    Filesize

    80KB

  • memory/1528-54-0x0000000076121000-0x0000000076123000-memory.dmp

    Filesize

    8KB

  • memory/1528-55-0x00000000003E1000-0x00000000003F5000-memory.dmp

    Filesize

    80KB

  • memory/1528-56-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/1604-89-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1604-88-0x00000000004F1000-0x0000000000505000-memory.dmp

    Filesize

    80KB

  • memory/1604-85-0x0000000000000000-mapping.dmp

  • memory/1612-84-0x0000000000000000-mapping.dmp

  • memory/1628-61-0x0000000000000000-mapping.dmp

  • memory/1956-81-0x00000000005115AA-mapping.dmp