Analysis
-
max time kernel
195s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:34
Static task
static1
Behavioral task
behavioral1
Sample
03231262773662516627.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
03231262773662516627.exe
Resource
win10v2004-20221111-en
General
-
Target
03231262773662516627.exe
-
Size
767KB
-
MD5
36bfbbc95d2597b3961e49d25449a5b6
-
SHA1
39bfe69a283e1a9a3120af9bd9df8851bc12c61b
-
SHA256
83935adb12e30326b0a1e7c5e835032e0d6814704f199ba2cc486b21d64d21d2
-
SHA512
1e02abbdec65db90572972dc674df67e726d2b3fe38c045e6da53ea80dcc5bf5205a4062f756f7de5a2929394d88f1e36c706026574b3707f2a502fb6fb03e35
-
SSDEEP
12288:iOrAkZrlpZxc3NKqgw9ONuRJoo5YqTdTB2O4rwSMpxwhx+g:is3hp4c6/aq5oOqLM2xh
Malware Config
Extracted
https://onedrive.live.com/download?cid=E0CF7F9E6AAF27EF&resid=E0CF7F9E6AAF27EF%21818&authkey=AAhEuBv3snM3JmY
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4232-132-0x0000000002980000-0x00000000029AC000-memory.dmp modiloader_stage2 -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 64 2328 powershell.exe 68 2328 powershell.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4484 4232 WerFault.exe 03231262773662516627.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 2328 powershell.exe 2328 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2328 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
03231262773662516627.execmd.exedescription pid process target process PID 4232 wrote to memory of 3368 4232 03231262773662516627.exe cmd.exe PID 4232 wrote to memory of 3368 4232 03231262773662516627.exe cmd.exe PID 4232 wrote to memory of 3368 4232 03231262773662516627.exe cmd.exe PID 3368 wrote to memory of 2328 3368 cmd.exe powershell.exe PID 3368 wrote to memory of 2328 3368 cmd.exe powershell.exe PID 3368 wrote to memory of 2328 3368 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03231262773662516627.exe"C:\Users\Admin\AppData\Local\Temp\03231262773662516627.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\png.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -FILE C:\Users\Public\Libraries\png.ps13⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 12122⤵
- Program crash
PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4232 -ip 42321⤵PID:3672
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100B
MD5c385a71887d828b1df961942e68ecfe8
SHA13f539a56267af3db91be9ac9ea2fd5d803a53279
SHA256bcd9e416bc017b7f079e7daee3b628ccdcf34cfb93d1d131f0d11ee2ba3498f3
SHA51283d48fa5c8d06918fe63404500f35231f461dd7ce57540d9f9c36b0fcc81a15e02f28e5aa66acdf2183ce95acd2f301e3d5963c10e2bc298c93dab87e9d90848
-
Filesize
241B
MD5a5d6c745056fe98da24aab33f21dca2f
SHA10e600d52140aeaa13934a565b07220e6ddbf7193
SHA25689c4b58d71d35705315a0d51aa8e28e0d8711b528f7401f1e88c4f0b4b908b62
SHA512e7a1d5f3471fe245629488fb15e05279d83f116cead9005ade1ae1884c676b0bac766b8ced97377745a7b09f85a2f9484cde745fd82995a43a940baa21896347