Analysis
-
max time kernel
154s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-04-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe
Resource
win10v2004-20220414-en
General
-
Target
926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe
-
Size
1.0MB
-
MD5
accf119512ef395778488003900d8226
-
SHA1
ba0eff961e9e43ac35a837dd43fcbab2a554d04b
-
SHA256
926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c
-
SHA512
f9fca6f256884a2544fe1f580c6656296c424bf6947acf8c91235d33571e749f8857683917d2196728b9a5bff7817c39926368c26bdc2aaa40cdaab167bb7005
Malware Config
Extracted
modiloader
https://cdn.discordapp.com/attachments/734633826718056471/771632517647695902/Rebxeee
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 2 IoCs
resource yara_rule behavioral2/memory/2868-132-0x0000000004680000-0x0000000004690000-memory.dmp modiloader_stage1 behavioral2/memory/2868-139-0x0000000004B40000-0x0000000004B50000-memory.dmp modiloader_stage1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rebx = "C:\\Users\\Admin\\AppData\\Local\\xbeR.url" 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Modifies registry key 1 TTPs 3 IoCs
pid Process 4428 reg.exe 3320 reg.exe 3508 reg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81 PID 2868 wrote to memory of 4464 2868 926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe"C:\Users\Admin\AppData\Local\Temp\926a1d29e97f80aa65deb0186c1174d85db2236997e4eba91aac0592ff2c077c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\Notepad.exe"C:\Windows\System32\Notepad.exe"2⤵PID:4464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Natso.bat3⤵PID:1996
-
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f4⤵
- Modifies registry key
PID:4428
-
-
C:\Windows\SysWOW64\reg.exereg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\x.bat reg delete hkcu\Environment /v windir /f && REM "4⤵
- Modifies registry key
PID:3320
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I4⤵PID:3896
-
-
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f4⤵
- Modifies registry key
PID:3508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Natso.bat3⤵PID:1356
-
-
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵PID:3840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283B
MD55cc1682955fd9f5800a8f1530c9a4334
SHA1e09b6a4d729f2f4760ee42520ec30c3192c85548
SHA2565562cc607d2f698327efacc4a21bd079bb14a99b03e7a01b3c67f8440e341cb3
SHA51280767263aad44c739236161d4338d5dd8b0b58613f22cd173c3e88ebf143220ee56bbf93ace69a07d3c2f00daff0adbaa8461a1d53d12699725395c931c43cb6