Analysis
-
max time kernel
148s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 15:19
Static task
static1
Behavioral task
behavioral1
Sample
6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe
Resource
win10v2004-20220812-en
General
-
Target
6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe
-
Size
108KB
-
MD5
82cb127950bd78e3d111f3e1a56cd7cd
-
SHA1
6eeafd847d681f7ecd2d2a8b6e97d0a909c96ab1
-
SHA256
6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b
-
SHA512
c1810cd8c6061ecadfefb7c455e7645f80ed848d63ff5be89a2bd311887517f3c71dc3bcd2df88d2981fce5dd7da557f38b70044850f12be08134811c0d41b18
-
SSDEEP
1536:sWbEbt5nLgdnfeKDIy4jwBjZZN33ejz3VcP9EQv+K5NM9je5n:sWbEsn7Iy4ojt36zOOqHR
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/1752-304-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/2024-785-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 272 winvmsrv.exe 2024 winvmsrv.exe -
resource yara_rule behavioral1/memory/1752-304-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2024-785-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1752 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 1752 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winvmsrv = "C:\\Users\\Admin\\AppData\\Roaming\\winvmsrv.exe" winvmsrv.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 860 set thread context of 1752 860 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 27 PID 272 set thread context of 2024 272 winvmsrv.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 860 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 272 winvmsrv.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 860 wrote to memory of 1752 860 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 27 PID 860 wrote to memory of 1752 860 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 27 PID 860 wrote to memory of 1752 860 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 27 PID 860 wrote to memory of 1752 860 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 27 PID 860 wrote to memory of 1752 860 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 27 PID 860 wrote to memory of 1752 860 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 27 PID 860 wrote to memory of 1752 860 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 27 PID 860 wrote to memory of 1752 860 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 27 PID 1752 wrote to memory of 272 1752 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 28 PID 1752 wrote to memory of 272 1752 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 28 PID 1752 wrote to memory of 272 1752 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 28 PID 1752 wrote to memory of 272 1752 6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe 28 PID 272 wrote to memory of 2024 272 winvmsrv.exe 29 PID 272 wrote to memory of 2024 272 winvmsrv.exe 29 PID 272 wrote to memory of 2024 272 winvmsrv.exe 29 PID 272 wrote to memory of 2024 272 winvmsrv.exe 29 PID 272 wrote to memory of 2024 272 winvmsrv.exe 29 PID 272 wrote to memory of 2024 272 winvmsrv.exe 29 PID 272 wrote to memory of 2024 272 winvmsrv.exe 29 PID 272 wrote to memory of 2024 272 winvmsrv.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe"C:\Users\Admin\AppData\Local\Temp\6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe"C:\Users\Admin\AppData\Local\Temp\6dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Roaming\winvmsrv.exe"C:\Users\Admin\AppData\Roaming\winvmsrv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Users\Admin\AppData\Roaming\winvmsrv.exe"C:\Users\Admin\AppData\Roaming\winvmsrv.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2024
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD582cb127950bd78e3d111f3e1a56cd7cd
SHA16eeafd847d681f7ecd2d2a8b6e97d0a909c96ab1
SHA2566dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b
SHA512c1810cd8c6061ecadfefb7c455e7645f80ed848d63ff5be89a2bd311887517f3c71dc3bcd2df88d2981fce5dd7da557f38b70044850f12be08134811c0d41b18
-
Filesize
108KB
MD582cb127950bd78e3d111f3e1a56cd7cd
SHA16eeafd847d681f7ecd2d2a8b6e97d0a909c96ab1
SHA2566dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b
SHA512c1810cd8c6061ecadfefb7c455e7645f80ed848d63ff5be89a2bd311887517f3c71dc3bcd2df88d2981fce5dd7da557f38b70044850f12be08134811c0d41b18
-
Filesize
108KB
MD582cb127950bd78e3d111f3e1a56cd7cd
SHA16eeafd847d681f7ecd2d2a8b6e97d0a909c96ab1
SHA2566dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b
SHA512c1810cd8c6061ecadfefb7c455e7645f80ed848d63ff5be89a2bd311887517f3c71dc3bcd2df88d2981fce5dd7da557f38b70044850f12be08134811c0d41b18
-
Filesize
108KB
MD582cb127950bd78e3d111f3e1a56cd7cd
SHA16eeafd847d681f7ecd2d2a8b6e97d0a909c96ab1
SHA2566dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b
SHA512c1810cd8c6061ecadfefb7c455e7645f80ed848d63ff5be89a2bd311887517f3c71dc3bcd2df88d2981fce5dd7da557f38b70044850f12be08134811c0d41b18
-
Filesize
108KB
MD582cb127950bd78e3d111f3e1a56cd7cd
SHA16eeafd847d681f7ecd2d2a8b6e97d0a909c96ab1
SHA2566dc472ca99051165d6cf2f2b0807380c60ef556f49835941e41f9f9fb183c05b
SHA512c1810cd8c6061ecadfefb7c455e7645f80ed848d63ff5be89a2bd311887517f3c71dc3bcd2df88d2981fce5dd7da557f38b70044850f12be08134811c0d41b18