Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 12:47

General

  • Target

    71d0cc107714d609f9899c6b3f5042fa30b8e98631c2a953b63b0f2d5c31d047.exe

  • Size

    320KB

  • MD5

    4033b6956050bcc1d1b025dfb5ed1150

  • SHA1

    16e94167fc2c5fb4bd94890bfdcebbf09fc7ed71

  • SHA256

    71d0cc107714d609f9899c6b3f5042fa30b8e98631c2a953b63b0f2d5c31d047

  • SHA512

    e7ac6f1170ba5110d653aaba0f0773da5db4c071142f6c199449ae97ede5643e647fbd93c3502548c8f21e3b409d426c3a4ae3858aa5267c3de57915794bd2f9

  • SSDEEP

    6144:zxowmzBVd3QDnxDZ2mKRDQ7oL7M5IjZb8CArDTCAR4RzJM:zxlmzjWDuvDQQ7MIVb8jfCw

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • ModiLoader Second Stage 9 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71d0cc107714d609f9899c6b3f5042fa30b8e98631c2a953b63b0f2d5c31d047.exe
    "C:\Users\Admin\AppData\Local\Temp\71d0cc107714d609f9899c6b3f5042fa30b8e98631c2a953b63b0f2d5c31d047.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Users\Admin\AppData\Local\Temp\71d0cc107714d609f9899c6b3f5042fa30b8e98631c2a953b63b0f2d5c31d047.exe
      C:\Users\Admin\AppData\Local\Temp\71d0cc107714d609f9899c6b3f5042fa30b8e98631c2a953b63b0f2d5c31d047.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Windows\SysWOW64\svchost.exe
        "svchost.exe"
        3⤵
        • Looks for VirtualBox Guest Additions in registry
        • Adds policy Run key to start application
        • Looks for VMWare Tools registry key
        • Checks BIOS information in registry
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4136
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\SysWOW64\svchost.exe"
          4⤵
            PID:2420
          • C:\Windows\SysWOW64\explorer.exe
            "explorer.exe"
            4⤵
              PID:4492

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2420-149-0x0000000001200000-0x00000000012B2000-memory.dmp

        Filesize

        712KB

      • memory/2420-143-0x0000000001200000-0x00000000012B2000-memory.dmp

        Filesize

        712KB

      • memory/2420-142-0x00000000001B0000-0x00000000001BE000-memory.dmp

        Filesize

        56KB

      • memory/4136-147-0x0000000000A30000-0x0000000000AE2000-memory.dmp

        Filesize

        712KB

      • memory/4136-139-0x0000000000A30000-0x0000000000AE2000-memory.dmp

        Filesize

        712KB

      • memory/4136-140-0x00000000001B0000-0x00000000001BE000-memory.dmp

        Filesize

        56KB

      • memory/4492-145-0x0000000000240000-0x0000000000673000-memory.dmp

        Filesize

        4.2MB

      • memory/4492-146-0x0000000001200000-0x00000000012B2000-memory.dmp

        Filesize

        712KB

      • memory/4492-148-0x0000000001200000-0x00000000012B2000-memory.dmp

        Filesize

        712KB

      • memory/4800-137-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4800-136-0x0000000000400000-0x0000000001400000-memory.dmp

        Filesize

        16.0MB

      • memory/4800-133-0x0000000000400000-0x0000000001400000-memory.dmp

        Filesize

        16.0MB

      • memory/4932-135-0x0000000001510000-0x0000000001514000-memory.dmp

        Filesize

        16KB