Analysis

  • max time kernel
    81s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2022, 22:12

General

  • Target

    cec8960741377aa0ee61eb66ef8bfdd16a8f1160ef44e0b372957b613fb5d479.exe

  • Size

    466KB

  • MD5

    6af17e74bc05e1780e7e21c96f508c3f

  • SHA1

    ad691618c705867c8d77da814d94e748cbf83220

  • SHA256

    cec8960741377aa0ee61eb66ef8bfdd16a8f1160ef44e0b372957b613fb5d479

  • SHA512

    2771d1c64a1997a8de8cf5f4aed9cf3812a9020df589b856b0106a5e0608642594d86b97c01929afbe4d2626d948c86f856894d79b868f714b38164c93ee5d3d

  • SSDEEP

    12288:bZsOp1DhDL4JrSLL4vSuRKJolUM9pw+Vw1z4RJFlfrhY:bZPnDhVLcvSuMIUMzV0cflfrS

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ModiLoader Second Stage 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cec8960741377aa0ee61eb66ef8bfdd16a8f1160ef44e0b372957b613fb5d479.exe
    "C:\Users\Admin\AppData\Local\Temp\cec8960741377aa0ee61eb66ef8bfdd16a8f1160ef44e0b372957b613fb5d479.exe"
    1⤵
      PID:1348
    • C:\Windows\system32\mshta.exe
      "C:\Windows\system32\mshta.exe" javascript:ZlP17RZip="jo";Ev9=new%20ActiveXObject("WScript.Shell");vTaDN7w="V";kW3TY=Ev9.RegRead("HKLM\\software\\Wow6432Node\\NLy9rvp\\9qgZreA");ygYXH80tF="DrAnY";eval(kW3TY);GXQOYcbb2="6";
      1⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:788
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:gpfkeaa
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 464
          3⤵
            PID:996

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1348-54-0x0000000074F41000-0x0000000074F43000-memory.dmp

        Filesize

        8KB

      • memory/1348-55-0x0000000002480000-0x000000000249F000-memory.dmp

        Filesize

        124KB

      • memory/1348-56-0x0000000000400000-0x000000000047A000-memory.dmp

        Filesize

        488KB

      • memory/1348-57-0x0000000000050000-0x0000000000110000-memory.dmp

        Filesize

        768KB

      • memory/1348-58-0x0000000002480000-0x000000000249F000-memory.dmp

        Filesize

        124KB

      • memory/1348-61-0x0000000000050000-0x0000000000110000-memory.dmp

        Filesize

        768KB

      • memory/1532-62-0x0000000073BE0000-0x000000007418B000-memory.dmp

        Filesize

        5.7MB

      • memory/1532-63-0x0000000073BE0000-0x000000007418B000-memory.dmp

        Filesize

        5.7MB