Analysis

  • max time kernel
    97s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2022 00:46

General

  • Target

    5166c071608a077ab1fa6d6c7c69f150072603fe33a7dca4558b8945842f0e34.exe

  • Size

    614KB

  • MD5

    64c4b060401081eb18598792c6cab6b9

  • SHA1

    ff1ee61e848a5ae6ae3e7c34bd5c7ae7ed965dab

  • SHA256

    5166c071608a077ab1fa6d6c7c69f150072603fe33a7dca4558b8945842f0e34

  • SHA512

    11730fd2df071641c1554a3e0f48e5784bec89f2d00216565fe3c966d40c562429563921bae38d422c9be63ba3c045fc17492dd2f908cdfd0fd82a0849fe9c0a

  • SSDEEP

    12288:iutrzh9xOXkyPaZf7eClizFGi4bOM/aKjhSVaiknpeOzR/0Oqvr0FJUL+LNinxg:iutr5OUyP0zeAAFG9H/aiSVaTpeYhzqW

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5166c071608a077ab1fa6d6c7c69f150072603fe33a7dca4558b8945842f0e34.exe
    "C:\Users\Admin\AppData\Local\Temp\5166c071608a077ab1fa6d6c7c69f150072603fe33a7dca4558b8945842f0e34.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe
      "C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3384
      • C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe
        "C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Drops startup file
        • Suspicious use of WriteProcessMemory
        PID:4220
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C echo>"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe:Zone.Identifier"
          4⤵
          • Drops startup file
          PID:1744
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1464
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe"
            5⤵
            • Executes dropped EXE
            PID:1608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\info300.xda

    Filesize

    39B

    MD5

    457fec66679f39ce2c1397241514cd92

    SHA1

    ca450296c8c9936837cf8b144dd463d9bfc51fe9

    SHA256

    01c7e8936ab6b5aae31b84977eb0498623ee0fc70b80a3e3baceb3164d364219

    SHA512

    6f26234577589095c81e2bc0cded79e22924c32f6710bef344b0183d10cc5953d323bf03d63c1075500d7235148125519b1d9eb0f8ac41ee478ff1c33446d386

  • C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • C:\Users\Admin\AppData\Local\Temp\ptpmcc.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nvvdir.exe

    Filesize

    553KB

    MD5

    13c63a639b4b22511c558c45333eed2e

    SHA1

    8474c43ab16b51e77b105f6afeae3db7a0a42edf

    SHA256

    fdd395382e2c4f50329fdde8b686cb40992f5e5c5abbfc23c0d107bc1dfcae22

    SHA512

    696449f323eaa15e008a00fa98f1f17723c32e38e2ae3c6186b2366b95b926039389eb28fff6973f5711c402e5094b6d82e76b190dc993da04116c540cb5494b

  • C:\Users\Admin\AppData\Roaming\info300.xda

    Filesize

    39B

    MD5

    457fec66679f39ce2c1397241514cd92

    SHA1

    ca450296c8c9936837cf8b144dd463d9bfc51fe9

    SHA256

    01c7e8936ab6b5aae31b84977eb0498623ee0fc70b80a3e3baceb3164d364219

    SHA512

    6f26234577589095c81e2bc0cded79e22924c32f6710bef344b0183d10cc5953d323bf03d63c1075500d7235148125519b1d9eb0f8ac41ee478ff1c33446d386

  • memory/1608-152-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/1608-155-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4220-143-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4220-140-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4220-139-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4220-138-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4220-136-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4220-154-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB