Analysis

  • max time kernel
    125s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    10-12-2021 14:32

General

  • Target

    0f559c7ea254285bab84e60d2a5e8037.exe

  • Size

    922KB

  • MD5

    0f559c7ea254285bab84e60d2a5e8037

  • SHA1

    388cfbde34fcc37f5f334ef39d29b5f3e655fed0

  • SHA256

    2cbccb76adf567a82d9d6fcbf7a6c02bce157e1870df149af7391b20b9fdc672

  • SHA512

    9184568937a92cd99d4dc2981dae9bdad139781a1bce87c553b9dad6052654531f2f9ebfc72977e00d2bd4b24a11671317e5cd778150c5a915ec87b739b77ef0

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader First Stage 2 IoCs
  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f559c7ea254285bab84e60d2a5e8037.exe
    "C:\Users\Admin\AppData\Local\Temp\0f559c7ea254285bab84e60d2a5e8037.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Users\Admin\AppData\Local\Temp\0f559c7ea254285bab84e60d2a5e8037.exe
      C:\Users\Admin\AppData\Local\Temp\0f559c7ea254285bab84e60d2a5e8037.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3564
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
        3⤵
        • Creates scheduled task(s)
        PID:896
  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3664
  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      2⤵
      • Executes dropped EXE
      PID:1240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1956-139-0x0000000002A91000-0x0000000002AA5000-memory.dmp

    Filesize

    80KB

  • memory/1956-144-0x0000000003A61000-0x0000000003A78000-memory.dmp

    Filesize

    92KB

  • memory/1956-143-0x0000000003A60000-0x0000000003A61000-memory.dmp

    Filesize

    4KB

  • memory/1956-140-0x0000000000540000-0x00000000005EE000-memory.dmp

    Filesize

    696KB

  • memory/3564-117-0x0000000000510000-0x0000000000518000-memory.dmp

    Filesize

    32KB

  • memory/3564-120-0x0000000000020000-0x0000000000026000-memory.dmp

    Filesize

    24KB

  • memory/3564-119-0x0000000000510000-0x0000000000518000-memory.dmp

    Filesize

    32KB

  • memory/3616-115-0x00000000005C0000-0x000000000070A000-memory.dmp

    Filesize

    1.3MB

  • memory/4080-125-0x0000000000580000-0x00000000006CA000-memory.dmp

    Filesize

    1.3MB

  • memory/4080-124-0x00000000021A1000-0x00000000021B5000-memory.dmp

    Filesize

    80KB