Analysis

  • max time kernel
    90s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 13:07

General

  • Target

    50aea7a8957e046f9939af578fe00f6821e55c7cc1f280bd715feec4717541e3.exe

  • Size

    268KB

  • MD5

    081fcbf7d29549a5b6d3326de51c91d0

  • SHA1

    2b3a8fbc643cfdc1ebb9a4f923eabb6cccda949a

  • SHA256

    50aea7a8957e046f9939af578fe00f6821e55c7cc1f280bd715feec4717541e3

  • SHA512

    2ded4979a8e956720e78b9d9daab1204f5129ff3e8344dd3934549f888ff5fd70153a81dba5b506df3cbdc15895516d2aa6962aec64082fc496770ecf82c3fcb

  • SSDEEP

    6144:zvQctIgBDrxn0TXxnPJa/dWzb8D4OgL0jTZ6HS9nSu4:x/F0TXxxaVWzb8DAL0J2S9SZ

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ModiLoader Second Stage 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50aea7a8957e046f9939af578fe00f6821e55c7cc1f280bd715feec4717541e3.exe
    "C:\Users\Admin\AppData\Local\Temp\50aea7a8957e046f9939af578fe00f6821e55c7cc1f280bd715feec4717541e3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\50aea7a8957e046f9939af578fe00f6821e55c7cc1f280bd715feec4717541e3.exe
      "C:\Users\Admin\AppData\Local\Temp\50aea7a8957e046f9939af578fe00f6821e55c7cc1f280bd715feec4717541e3.exe"
      2⤵
        PID:5072
    • C:\Windows\system32\mshta.exe
      "C:\Windows\system32\mshta.exe" javascript:elFymj6Cg5="4";Fj2=new%20ActiveXObject("WScript.Shell");fOYSmIf1="Asa";blv7W0=Fj2.RegRead("HKLM\\software\\Wow6432Node\\z6lGuxkud0\\Mv3J7Ehohg");TuQRf3Yr="wZ1bYM";eval(blv7W0);QpOT5NOnZ="CEAg7brhwW";
      1⤵
      • Process spawned unexpected child process
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4360
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:ggtpyhtd
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1044

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1044-146-0x0000000005F80000-0x0000000005F9E000-memory.dmp

            Filesize

            120KB

          • memory/1044-144-0x0000000005200000-0x0000000005266000-memory.dmp

            Filesize

            408KB

          • memory/1044-148-0x0000000007040000-0x000000000705A000-memory.dmp

            Filesize

            104KB

          • memory/1044-147-0x0000000007720000-0x0000000007D9A000-memory.dmp

            Filesize

            6.5MB

          • memory/1044-145-0x0000000005A00000-0x0000000005A66000-memory.dmp

            Filesize

            408KB

          • memory/1044-141-0x00000000027D0000-0x0000000002806000-memory.dmp

            Filesize

            216KB

          • memory/1044-143-0x0000000005160000-0x0000000005182000-memory.dmp

            Filesize

            136KB

          • memory/1044-142-0x00000000053D0000-0x00000000059F8000-memory.dmp

            Filesize

            6.2MB

          • memory/4804-134-0x0000000002240000-0x0000000002244000-memory.dmp

            Filesize

            16KB

          • memory/5072-133-0x0000000000400000-0x0000000001400000-memory.dmp

            Filesize

            16.0MB

          • memory/5072-138-0x000000000D570000-0x000000000D630000-memory.dmp

            Filesize

            768KB

          • memory/5072-137-0x0000000000400000-0x0000000000435000-memory.dmp

            Filesize

            212KB

          • memory/5072-136-0x0000000000400000-0x0000000001400000-memory.dmp

            Filesize

            16.0MB

          • memory/5072-149-0x000000000D570000-0x000000000D630000-memory.dmp

            Filesize

            768KB