Analysis
-
max time kernel
145s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891.exe
Resource
win10v2004-20220812-en
General
-
Target
883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891.exe
-
Size
124KB
-
MD5
4f1312128ecb876a40f798b014bcdec6
-
SHA1
18a60b4bba15ffbb80a24cd4d94cd07fff033f4a
-
SHA256
883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891
-
SHA512
6a889eb4dcc04bf034b30dfaa24b1eab187c467177b3953f933283a8b271bddb94854114e931ff3e238c14f70178859a78612690b1431d27654303e85382bf28
-
SSDEEP
3072:EPoy8j7VnNdrPHaSekwi+mW+25W1PzoutW:E8jZ7rvaU3+mWr0BzoSW
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/1272-63-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1272-69-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/528-70-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/528-72-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 1272 alper.exe 528 mstwain32.exe -
resource yara_rule behavioral1/files/0x0007000000005c50-61.dat upx behavioral1/files/0x0007000000005c50-59.dat upx behavioral1/files/0x0007000000005c50-58.dat upx behavioral1/memory/1272-63-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/files/0x0007000000005c50-64.dat upx behavioral1/files/0x0007000000005c50-65.dat upx behavioral1/files/0x00060000000055d8-67.dat upx behavioral1/memory/1272-69-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/528-70-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/528-72-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 1348 883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891.exe 1348 883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891.exe 1272 alper.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ mstwain32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA alper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\mstwain32.exe alper.exe File opened for modification C:\Windows\mstwain32.exe alper.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1272 alper.exe Token: SeBackupPrivilege 1780 vssvc.exe Token: SeRestorePrivilege 1780 vssvc.exe Token: SeAuditPrivilege 1780 vssvc.exe Token: SeDebugPrivilege 528 mstwain32.exe Token: SeDebugPrivilege 528 mstwain32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1348 883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891.exe 528 mstwain32.exe 528 mstwain32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1272 1348 883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891.exe 26 PID 1348 wrote to memory of 1272 1348 883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891.exe 26 PID 1348 wrote to memory of 1272 1348 883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891.exe 26 PID 1348 wrote to memory of 1272 1348 883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891.exe 26 PID 1272 wrote to memory of 528 1272 alper.exe 30 PID 1272 wrote to memory of 528 1272 alper.exe 30 PID 1272 wrote to memory of 528 1272 alper.exe 30 PID 1272 wrote to memory of 528 1272 alper.exe 30 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891.exe"C:\Users\Admin\AppData\Local\Temp\883dd0e1d35a2446e2a2e87b44a79acde65947908dc9ecb1f1f6a5a5d15c0891.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\alper.exe"C:\Users\Admin\AppData\Local\Temp\alper.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\alper.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:528
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5220975988aad6880a8c9eeb6681825d0
SHA12d75fa49de28fd03ca5ba7574e65276dc52c3115
SHA256cc17f6c6bc0915d3cea6ca486e25aa781b29de9af0cf33cf2af12872eb1e93ac
SHA512682f988c260443266db2920d2561d0dc38f516bb862a73967e006f6d9cd0b22a4bb03038f38dd9644d55012f97c1da7d93d20987d680902a78119dad9af70771
-
Filesize
108KB
MD5220975988aad6880a8c9eeb6681825d0
SHA12d75fa49de28fd03ca5ba7574e65276dc52c3115
SHA256cc17f6c6bc0915d3cea6ca486e25aa781b29de9af0cf33cf2af12872eb1e93ac
SHA512682f988c260443266db2920d2561d0dc38f516bb862a73967e006f6d9cd0b22a4bb03038f38dd9644d55012f97c1da7d93d20987d680902a78119dad9af70771
-
Filesize
108KB
MD5220975988aad6880a8c9eeb6681825d0
SHA12d75fa49de28fd03ca5ba7574e65276dc52c3115
SHA256cc17f6c6bc0915d3cea6ca486e25aa781b29de9af0cf33cf2af12872eb1e93ac
SHA512682f988c260443266db2920d2561d0dc38f516bb862a73967e006f6d9cd0b22a4bb03038f38dd9644d55012f97c1da7d93d20987d680902a78119dad9af70771
-
Filesize
108KB
MD5220975988aad6880a8c9eeb6681825d0
SHA12d75fa49de28fd03ca5ba7574e65276dc52c3115
SHA256cc17f6c6bc0915d3cea6ca486e25aa781b29de9af0cf33cf2af12872eb1e93ac
SHA512682f988c260443266db2920d2561d0dc38f516bb862a73967e006f6d9cd0b22a4bb03038f38dd9644d55012f97c1da7d93d20987d680902a78119dad9af70771
-
Filesize
108KB
MD5220975988aad6880a8c9eeb6681825d0
SHA12d75fa49de28fd03ca5ba7574e65276dc52c3115
SHA256cc17f6c6bc0915d3cea6ca486e25aa781b29de9af0cf33cf2af12872eb1e93ac
SHA512682f988c260443266db2920d2561d0dc38f516bb862a73967e006f6d9cd0b22a4bb03038f38dd9644d55012f97c1da7d93d20987d680902a78119dad9af70771
-
Filesize
108KB
MD5220975988aad6880a8c9eeb6681825d0
SHA12d75fa49de28fd03ca5ba7574e65276dc52c3115
SHA256cc17f6c6bc0915d3cea6ca486e25aa781b29de9af0cf33cf2af12872eb1e93ac
SHA512682f988c260443266db2920d2561d0dc38f516bb862a73967e006f6d9cd0b22a4bb03038f38dd9644d55012f97c1da7d93d20987d680902a78119dad9af70771