Analysis
-
max time kernel
91s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-it -
resource tags
arch:x64arch:x86image:win10v2004-20220812-itlocale:it-itos:windows10-2004-x64systemwindows -
submitted
05-11-2022 18:28
Static task
static1
Behavioral task
behavioral1
Sample
BC9wa9Zo.exe
Resource
win7-20220901-it
Behavioral task
behavioral2
Sample
BC9wa9Zo.exe
Resource
win10v2004-20220812-it
General
-
Target
BC9wa9Zo.exe
-
Size
1.1MB
-
MD5
3b960e79f96867d21257f2c2e6b68a3a
-
SHA1
dd39eb43b60a5ce586e22173f5419cdaebc70b62
-
SHA256
d1f97e10d8b6443fd92d1673143f9d9f672f71caca3ad3f492532681095b4511
-
SHA512
80ed4f6fbe25dca33a1263490b2d96db1c63313222555050d91a4de91f5b13e0b86704ab45c81c965703b7081a2496d3294f8535ee6a53bdeafe888db85d2b90
-
SSDEEP
24576:wIk11alpxKYvIOWdB6yCgb8SDxOTeCYSfI5b2sJxHJHtuSCg/c3kCv/oMw2n+OkX:wfQnyC1dA
Malware Config
Extracted
bitrat
1.38
davidmanne.casacam.net:2223
-
communication_password
b6c6e855edf908ec7c12ce8c8e628a5c
-
tor_process
tor
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 63 IoCs
Processes:
resource yara_rule behavioral2/memory/4836-132-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-134-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-135-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-136-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-137-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-138-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-139-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-140-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-141-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-142-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-143-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-144-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-145-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-146-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-147-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-148-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-150-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-149-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-151-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-152-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-153-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-154-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-155-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-156-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-157-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-158-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-159-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-160-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-161-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-162-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-163-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-164-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-165-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-166-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-167-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-168-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-169-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-170-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-171-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-172-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-173-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-174-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-175-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-176-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-177-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-178-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-179-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-180-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-181-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-182-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-183-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-184-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-185-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-186-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-187-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-188-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-189-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-190-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-191-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-192-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-193-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-194-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 behavioral2/memory/4836-195-0x0000000002470000-0x000000000249B000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral2/memory/2524-336-0x0000000010410000-0x00000000107F4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
BC9wa9Zo.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Kyjdhqpm = "C:\\Users\\Public\\Libraries\\mpqhdjyK.url" BC9wa9Zo.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
BC9wa9Zo.exepid process 4836 BC9wa9Zo.exe 4836 BC9wa9Zo.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
BC9wa9Zo.exedescription pid process target process PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe PID 4836 wrote to memory of 2524 4836 BC9wa9Zo.exe wscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BC9wa9Zo.exe"C:\Users\Admin\AppData\Local\Temp\BC9wa9Zo.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe2⤵PID:2524