Analysis
-
max time kernel
146s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:34
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Malware-gen.5701.3804.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.Malware-gen.5701.3804.exe
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.Win32.Malware-gen.5701.3804.exe
-
Size
767KB
-
MD5
ceadb6ba9affc991bf727f0ea211a6bc
-
SHA1
6b01562026b36b93ea1fe13a13baa70114795da2
-
SHA256
23473106e8e2e1add3756ee0e4101095710b9663791f57e026e08f99218077ff
-
SHA512
c6ac1817afa04ae1d36516037525333f5cbab879f8f2cd460a05a96e3211346a164c195bf2d674ea940c1038655241a3e73b6847fbb17c6d4dec0f24e8d247eb
-
SSDEEP
12288:iOrAkZrlpZxc3NKqgw9ONuRJoo5YqTdTB2O4rwSMpxwhx2g:is3hp4c6/aq5oOqLM2xJ
Malware Config
Extracted
https://onedrive.live.com/download?cid=E0CF7F9E6AAF27EF&resid=E0CF7F9E6AAF27EF%21821&authkey=AM_sm-3HDCFDLks
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5020-132-0x00000000029A0000-0x00000000029CC000-memory.dmp modiloader_stage2 -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 24 1712 powershell.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1040 5020 WerFault.exe SecuriteInfo.com.Win32.Malware-gen.5701.3804.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1712 powershell.exe 1712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1712 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
SecuriteInfo.com.Win32.Malware-gen.5701.3804.execmd.exedescription pid process target process PID 5020 wrote to memory of 176 5020 SecuriteInfo.com.Win32.Malware-gen.5701.3804.exe cmd.exe PID 5020 wrote to memory of 176 5020 SecuriteInfo.com.Win32.Malware-gen.5701.3804.exe cmd.exe PID 5020 wrote to memory of 176 5020 SecuriteInfo.com.Win32.Malware-gen.5701.3804.exe cmd.exe PID 176 wrote to memory of 1712 176 cmd.exe powershell.exe PID 176 wrote to memory of 1712 176 cmd.exe powershell.exe PID 176 wrote to memory of 1712 176 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Malware-gen.5701.3804.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Malware-gen.5701.3804.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\png.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -FILE C:\Users\Public\Libraries\png.ps13⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 12402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5020 -ip 50201⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\Libraries\png.batFilesize
100B
MD5c385a71887d828b1df961942e68ecfe8
SHA13f539a56267af3db91be9ac9ea2fd5d803a53279
SHA256bcd9e416bc017b7f079e7daee3b628ccdcf34cfb93d1d131f0d11ee2ba3498f3
SHA51283d48fa5c8d06918fe63404500f35231f461dd7ce57540d9f9c36b0fcc81a15e02f28e5aa66acdf2183ce95acd2f301e3d5963c10e2bc298c93dab87e9d90848
-
C:\Users\Public\Libraries\png.ps1Filesize
241B
MD583552af8bb844fb94f5a060812a60916
SHA1bc4531b44bf18bcb350dbb77d0d336f76003b857
SHA256b026b30bab4811744016b5ff6741e7e93a69b20732f43ef1d5dcf9a78a0722f9
SHA512f0ef2c3553b5ffa1de203905527197408ca1c764772ae405895ff8b28efbd06f0bea1e42d61a9924016fe4a3044494c4e5521a6b90693a98562a5cbb2d3ead68
-
memory/176-134-0x0000000000000000-mapping.dmp
-
memory/1712-139-0x00000000051A0000-0x00000000051C2000-memory.dmpFilesize
136KB
-
memory/1712-137-0x0000000004B90000-0x0000000004BC6000-memory.dmpFilesize
216KB
-
memory/1712-138-0x0000000005260000-0x0000000005888000-memory.dmpFilesize
6.2MB
-
memory/1712-140-0x0000000005A80000-0x0000000005AE6000-memory.dmpFilesize
408KB
-
memory/1712-141-0x0000000005AF0000-0x0000000005B56000-memory.dmpFilesize
408KB
-
memory/1712-142-0x00000000060B0000-0x00000000060CE000-memory.dmpFilesize
120KB
-
memory/1712-136-0x0000000000000000-mapping.dmp
-
memory/1712-144-0x00000000079A0000-0x000000000801A000-memory.dmpFilesize
6.5MB
-
memory/1712-145-0x00000000066E0000-0x00000000066FA000-memory.dmpFilesize
104KB
-
memory/5020-132-0x00000000029A0000-0x00000000029CC000-memory.dmpFilesize
176KB