Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 06:25

General

  • Target

    0ef3245ce5275be73bdd3e0f103bff30c36b65e25991ee3a502277705a1ac412.exe

  • Size

    432KB

  • MD5

    925d3742d51d76734a7241adfe3ff059

  • SHA1

    6c0eb873024fcfdf0863afa9de6c27c95b276712

  • SHA256

    0ef3245ce5275be73bdd3e0f103bff30c36b65e25991ee3a502277705a1ac412

  • SHA512

    ded3bbf8317677939a8449682e4151e9253efe87b8e2320f57e0dff8ac29c8957b1e4ff3b90d48c11523bb13e9f7585f237d4546c9d008a824aafe5485cf25d4

  • SSDEEP

    6144:DBgh/58KGip9lmh0UwwDdxtPw13OyhFR8uHQaEFmgOds2RshSP1p7a1ZLcPR2GTs:DBMmKGnhDT+JlCraEFmgOFSwYA2G5rQ3

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 3 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ef3245ce5275be73bdd3e0f103bff30c36b65e25991ee3a502277705a1ac412.exe
    "C:\Users\Admin\AppData\Local\Temp\0ef3245ce5275be73bdd3e0f103bff30c36b65e25991ee3a502277705a1ac412.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\0ef3245ce5275be73bdd3e0f103bff30c36b65e25991ee3a502277705a1ac412.exe
      "C:\Users\Admin\AppData\Local\Temp\0ef3245ce5275be73bdd3e0f103bff30c36b65e25991ee3a502277705a1ac412.exe"
      2⤵
      • UAC bypass
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1272
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\cmsetac.dll

    Filesize

    33KB

    MD5

    1281d16fa3141bfe8562bf519d9148da

    SHA1

    8c19b1cf6c979b8960b451d073f83c6557c72d26

    SHA256

    c404b6e3bd67392768fcc1690767edad918bf3c0cc9f474ac93b90ef688be141

    SHA512

    d668a99327ea99519088fb8fcebda538c44819e51e7a79e3c8a20ee02c6715eda7f3636551bad1fcc92dd4a4054605776ee0feaac1b17a7c566b27d0b0100042

  • \Users\Admin\AppData\Local\Temp\ntdtcstp.dll

    Filesize

    7KB

    MD5

    67587e25a971a141628d7f07bd40ffa0

    SHA1

    76fcd014539a3bb247cc0b761225f68bd6055f6b

    SHA256

    e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378

    SHA512

    6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

  • memory/1272-66-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1272-58-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1272-59-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1272-64-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1272-65-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1272-56-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1272-69-0x00000000003E0000-0x00000000003EE000-memory.dmp

    Filesize

    56KB

  • memory/1272-55-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1272-70-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1632-62-0x0000000000400000-0x00000000004C9000-memory.dmp

    Filesize

    804KB

  • memory/1632-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

    Filesize

    8KB