Analysis

  • max time kernel
    154s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    26-06-2022 06:08

General

  • Target

    usa1.exe

  • Size

    3.2MB

  • MD5

    ab8e9ac36f014b3e59d38f5a41dd5abe

  • SHA1

    b040fed81d9d11384d8f972e51fb946128ddc398

  • SHA256

    6d0a5048b64ef4877f1ea3480f95b899344dd020c05130055260048b91201dc0

  • SHA512

    7004299e4eda607bac1ca3b89a38ff9e23065e0601269f03b699788bd39f858ac24aef0bd84690aafb24b76a52ee945635e56c06742f4f08b7f109c001c6f269

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3

    suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • ModiLoader Second Stage 39 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\usa1.exe
    "C:\Users\Admin\AppData\Local\Temp\usa1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\AppData\Local\Temp\usa1.exe
      C:\Users\Admin\AppData\Local\Temp\usa1.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      PID:4496
      • C:\Users\Admin\Pictures\Adobe Films\fsCXQsekqwLi7zP_crw4UF0n.exe
        "C:\Users\Admin\Pictures\Adobe Films\fsCXQsekqwLi7zP_crw4UF0n.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4440

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Disabling Security Tools

1
T1089

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Pictures\Adobe Films\fsCXQsekqwLi7zP_crw4UF0n.exe
    Filesize

    318KB

    MD5

    3f22bd82ee1b38f439e6354c60126d6d

    SHA1

    63b57d818f86ea64ebc8566faeb0c977839defde

    SHA256

    265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a

    SHA512

    b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f

  • C:\Users\Admin\Pictures\Adobe Films\fsCXQsekqwLi7zP_crw4UF0n.exe
    Filesize

    318KB

    MD5

    3f22bd82ee1b38f439e6354c60126d6d

    SHA1

    63b57d818f86ea64ebc8566faeb0c977839defde

    SHA256

    265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a

    SHA512

    b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f

  • memory/2916-131-0x0000000000400000-0x0000000000738000-memory.dmp
    Filesize

    3.2MB

  • memory/2916-133-0x0000000076E80000-0x0000000077023000-memory.dmp
    Filesize

    1.6MB

  • memory/2916-134-0x0000000000400000-0x0000000000738000-memory.dmp
    Filesize

    3.2MB

  • memory/2916-144-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-145-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-146-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-147-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-148-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-149-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-150-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-151-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-153-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-154-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-155-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-152-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-157-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-159-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-158-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-156-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-160-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-161-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-162-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-164-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-163-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-165-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-166-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-167-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-169-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-168-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-172-0x0000000010410000-0x0000000010448000-memory.dmp
    Filesize

    224KB

  • memory/2916-173-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-174-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-175-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-176-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-177-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-184-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-185-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-186-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-187-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-188-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-189-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-190-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-191-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
    Filesize

    364KB

  • memory/2916-192-0x0000000000400000-0x0000000000738000-memory.dmp
    Filesize

    3.2MB

  • memory/2916-193-0x0000000076E80000-0x0000000077023000-memory.dmp
    Filesize

    1.6MB

  • memory/4440-196-0x0000000000000000-mapping.dmp
  • memory/4496-171-0x0000000000000000-mapping.dmp
  • memory/4496-194-0x0000000010410000-0x0000000010448000-memory.dmp
    Filesize

    224KB

  • memory/4496-195-0x00000000050A0000-0x000000000525E000-memory.dmp
    Filesize

    1.7MB

  • memory/4496-199-0x00000000050A0000-0x000000000525E000-memory.dmp
    Filesize

    1.7MB