Analysis
-
max time kernel
167s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 09:39
Behavioral task
behavioral1
Sample
20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe
Resource
win10v2004-20220812-en
General
-
Target
20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe
-
Size
110KB
-
MD5
e166fb94ed630e8c28b9d8d7c075ac5e
-
SHA1
787f78ecf6ff5464bf0caf50ab9d66853ca194d4
-
SHA256
20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f
-
SHA512
31bf35af5be5b7d1436cc4689574be0187c7448844caa67e54c124ad621db6141573510f4d7387dc4e2ead9eb62501895883026828ce928e055b560a4370460a
-
SSDEEP
1536:GVuNAXTj4Fj/91/NnLZqeWEPVpa8DzePjkgcwYS7S5+Vfk09+2v/oozy1tnouy8:koy8j7VnNdrPHaSekwi+mW+2Yo+bout
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe -
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1404-55-0x0000000000400000-0x000000000044F000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral1/memory/1404-55-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1404 20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe 1404 20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe" 20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1404 20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe Token: SeBackupPrivilege 1540 vssvc.exe Token: SeRestorePrivilege 1540 vssvc.exe Token: SeAuditPrivilege 1540 vssvc.exe Token: SeDebugPrivilege 1404 20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1404 20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe 1404 20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe"C:\Users\Admin\AppData\Local\Temp\20dbc1faf66da02f01d32ac9833e5a028f7d388afebc0c04f38f29e06e32bc6f.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1404
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5a68584e105a94be86cf823bee1eac759
SHA10c83edd6e22c756a6c3ba91d6dc7b32e3db7fbfa
SHA2562b500b4be7ee4021f0553f68223f183dbc230be2e1ba6bd8bc36a7887d18cf2b
SHA5121c106f9a4e7eb5571f3123d6bafa49cc938749bbfced5a3d1baf8b60497cf7bcd9820e77101b168fae4e37d612bcc40a294c62141af1c0099843aaeb241a524f
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350