Analysis
-
max time kernel
57s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2022 19:11
Static task
static1
Behavioral task
behavioral1
Sample
Retefpaddbhtal.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Retefpaddbhtal.exe
Resource
win10v2004-20220812-en
General
-
Target
Retefpaddbhtal.exe
-
Size
733KB
-
MD5
4f7199a3cf8228b7a1ea06157e033f1f
-
SHA1
9c3dc25dc1baf8bea180d0ef6cdc7ecc19de3b5d
-
SHA256
cafb7d353313362efa3d09e9a4345c681bba522185870ceb930216d54ffe00c8
-
SHA512
3be7a80b373c81fc16637ad99ec84d185c3e2bb3e60c540f0dd60fbe1c85407caaf1ec2993a1114856a466fdb3763132e5d501bb5d8f16c179bad91322294d7e
-
SSDEEP
12288:vE8us5hZIRFFRs4nmHQqtZua/3RvWEmhj+wzhd:MJ8ZIRFFRPnmDzuUmYYh
Malware Config
Extracted
bitrat
1.38
winery.nsupdate.info:5877
-
communication_password
e5ff7c52fb3501484ea7ca8641803415
-
tor_process
tor
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 63 IoCs
Processes:
resource yara_rule behavioral2/memory/4044-133-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-135-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-136-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-137-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-138-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-139-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-140-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-141-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-142-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-143-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-144-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-145-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-146-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-147-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-148-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-149-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-151-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-150-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-152-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-153-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-154-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-155-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-156-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-157-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-158-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-160-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-159-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-161-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-162-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-163-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-164-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-167-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-166-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-165-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-168-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-169-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-170-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-171-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-172-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-173-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-174-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-175-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-176-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-177-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-178-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-179-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-180-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-181-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-182-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-183-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-184-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-185-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-186-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-188-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-187-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-189-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-191-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-190-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-193-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-192-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-194-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-195-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 behavioral2/memory/4044-196-0x0000000003EE0000-0x0000000003F0B000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral2/memory/4492-337-0x0000000010410000-0x00000000107F4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Retefpaddbhtal.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Retefpad = "C:\\Users\\Public\\Libraries\\dapfeteR.url" Retefpaddbhtal.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Retefpaddbhtal.exepid process 4044 Retefpaddbhtal.exe 4044 Retefpaddbhtal.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
Retefpaddbhtal.exedescription pid process target process PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe PID 4044 wrote to memory of 4492 4044 Retefpaddbhtal.exe wscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Retefpaddbhtal.exe"C:\Users\Admin\AppData\Local\Temp\Retefpaddbhtal.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe2⤵PID:4492