Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe
Resource
win10v2004-20220901-en
General
-
Target
672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe
-
Size
100KB
-
MD5
9afd51a83db933c59a7e162d2761171c
-
SHA1
bab898b312a7cf2ddbf221733721442d2a472f16
-
SHA256
672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f
-
SHA512
bdfa32876acb46f8e6a8d992044522f549b1fee2f9880c75b15cc451631597cbace6b69efcccb76711b7f2590a3581c44e61079d8535e7a41e35e1d43f3d9a13
-
SSDEEP
3072:l4URpNUUX6z/DBXJfKzNWE8S1Kq0IN8xX58Zt9m+KuO:l4SUjhtbmgqUX58Zt9m+Kh
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/440-139-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/440-143-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/1432-153-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/1432-154-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2352 cissv.exe 1432 cissv.exe -
resource yara_rule behavioral2/memory/440-136-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/440-138-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/440-139-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/440-143-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1432-152-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1432-153-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1432-154-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe -
Loads dropped DLL 4 IoCs
pid Process 476 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 476 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 2352 cissv.exe 2352 cissv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cissv = "C:\\Users\\Admin\\AppData\\Roaming\\cissv.exe" cissv.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 476 set thread context of 440 476 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 78 PID 2352 set thread context of 1432 2352 cissv.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
resource yara_rule behavioral2/files/0x000400000001e41e-142.dat nsis_installer_1 behavioral2/files/0x000400000001e41e-142.dat nsis_installer_2 behavioral2/files/0x000400000001e41e-141.dat nsis_installer_1 behavioral2/files/0x000400000001e41e-141.dat nsis_installer_2 behavioral2/files/0x000400000001e41e-150.dat nsis_installer_1 behavioral2/files/0x000400000001e41e-150.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 476 wrote to memory of 440 476 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 78 PID 476 wrote to memory of 440 476 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 78 PID 476 wrote to memory of 440 476 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 78 PID 476 wrote to memory of 440 476 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 78 PID 476 wrote to memory of 440 476 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 78 PID 476 wrote to memory of 440 476 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 78 PID 476 wrote to memory of 440 476 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 78 PID 476 wrote to memory of 440 476 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 78 PID 440 wrote to memory of 2352 440 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 81 PID 440 wrote to memory of 2352 440 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 81 PID 440 wrote to memory of 2352 440 672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe 81 PID 2352 wrote to memory of 1432 2352 cissv.exe 87 PID 2352 wrote to memory of 1432 2352 cissv.exe 87 PID 2352 wrote to memory of 1432 2352 cissv.exe 87 PID 2352 wrote to memory of 1432 2352 cissv.exe 87 PID 2352 wrote to memory of 1432 2352 cissv.exe 87 PID 2352 wrote to memory of 1432 2352 cissv.exe 87 PID 2352 wrote to memory of 1432 2352 cissv.exe 87 PID 2352 wrote to memory of 1432 2352 cissv.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe"C:\Users\Admin\AppData\Local\Temp\672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Users\Admin\AppData\Local\Temp\672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe"C:\Users\Admin\AppData\Local\Temp\672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Roaming\cissv.exe"C:\Users\Admin\AppData\Roaming\cissv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Roaming\cissv.exe"C:\Users\Admin\AppData\Roaming\cissv.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1432
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5f9f8ff26cab1d311364f8687c6984d7f
SHA1927458c8e46c349d546794ce5f734a632ea7765c
SHA256cfdbda8d9de870b6a9bea77c4970c2df50f40c0897f3451d802ca7a01ad856bc
SHA5128b52a5c142c13a333441d439d9eafd40441c76bcf6384d385fed2ff41d6ac86764ff3d9affa917e70917bccbf77c3d2c764ca3f1ae737bfcf6dd0e42877b208e
-
Filesize
67KB
MD5493cf0f265ea7e90bc3aab5daebed560
SHA11ae2744ea9f4698a14c7a3704b80e74ca3a0a198
SHA256814d634c09c0cac0b4d77395591ea1143028ce39b9f4fff3c38e1ac9f5518817
SHA512856e42602e5ecadfb89cf41390ad6615979c1aae8bb43a96587c8e8380c838f831820d364748448b6516d695f4005ec139b8571777ac472ba6c8ef4b44224e5e
-
Filesize
67KB
MD5493cf0f265ea7e90bc3aab5daebed560
SHA11ae2744ea9f4698a14c7a3704b80e74ca3a0a198
SHA256814d634c09c0cac0b4d77395591ea1143028ce39b9f4fff3c38e1ac9f5518817
SHA512856e42602e5ecadfb89cf41390ad6615979c1aae8bb43a96587c8e8380c838f831820d364748448b6516d695f4005ec139b8571777ac472ba6c8ef4b44224e5e
-
Filesize
67KB
MD5493cf0f265ea7e90bc3aab5daebed560
SHA11ae2744ea9f4698a14c7a3704b80e74ca3a0a198
SHA256814d634c09c0cac0b4d77395591ea1143028ce39b9f4fff3c38e1ac9f5518817
SHA512856e42602e5ecadfb89cf41390ad6615979c1aae8bb43a96587c8e8380c838f831820d364748448b6516d695f4005ec139b8571777ac472ba6c8ef4b44224e5e
-
Filesize
67KB
MD5493cf0f265ea7e90bc3aab5daebed560
SHA11ae2744ea9f4698a14c7a3704b80e74ca3a0a198
SHA256814d634c09c0cac0b4d77395591ea1143028ce39b9f4fff3c38e1ac9f5518817
SHA512856e42602e5ecadfb89cf41390ad6615979c1aae8bb43a96587c8e8380c838f831820d364748448b6516d695f4005ec139b8571777ac472ba6c8ef4b44224e5e
-
Filesize
100KB
MD59afd51a83db933c59a7e162d2761171c
SHA1bab898b312a7cf2ddbf221733721442d2a472f16
SHA256672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f
SHA512bdfa32876acb46f8e6a8d992044522f549b1fee2f9880c75b15cc451631597cbace6b69efcccb76711b7f2590a3581c44e61079d8535e7a41e35e1d43f3d9a13
-
Filesize
100KB
MD59afd51a83db933c59a7e162d2761171c
SHA1bab898b312a7cf2ddbf221733721442d2a472f16
SHA256672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f
SHA512bdfa32876acb46f8e6a8d992044522f549b1fee2f9880c75b15cc451631597cbace6b69efcccb76711b7f2590a3581c44e61079d8535e7a41e35e1d43f3d9a13
-
Filesize
100KB
MD59afd51a83db933c59a7e162d2761171c
SHA1bab898b312a7cf2ddbf221733721442d2a472f16
SHA256672a21757114fbce100943171c6814795144a9ffd7a9f0ad8b799bdf79ccb50f
SHA512bdfa32876acb46f8e6a8d992044522f549b1fee2f9880c75b15cc451631597cbace6b69efcccb76711b7f2590a3581c44e61079d8535e7a41e35e1d43f3d9a13