Analysis

  • max time kernel
    147s
  • max time network
    65s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 21:18

General

  • Target

    e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe

  • Size

    1.2MB

  • MD5

    350a028daf8612cefa400032126afeea

  • SHA1

    b3b0eaabbd19df7bb0e167bcb77889655dfb291a

  • SHA256

    e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4

  • SHA512

    68422ccca073c3012a844135ff6a517b54ef769d2ee95da6e1ae6a6a2a35a914091e66009fd80724c5544f69812c0c131d0e6502c1a1250cd2d8aa5df302d2ff

  • SSDEEP

    24576:5GSvXcYr88kMQoNazpGWUk1dJkZlkB6tXYvDu0BbeK9j27jnjN/QR5+C7rFB1:5G2Xc+9kVVzjB5vyug9c5Z3Fj

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe
    "C:\Users\Admin\AppData\Local\Temp\e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe"
    1⤵
    • UAC bypass
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\cmsetac.dll

    Filesize

    33KB

    MD5

    0a11d49f4d6eb8b7cdb32af26bca8c4e

    SHA1

    1224969e7d01c2cfda2f83b6a79adc7d3f83fd71

    SHA256

    0920f08c85e629f22b48a8a9503275fa4b67ad4ffb04e5d22e6a6495116e746c

    SHA512

    c6291289980bd370b4cd61763c3a085a50d700e823017e32ca618147a265f17c53d56ae05ef875d44ee87665de08b23371f796854b44206a1ce699c7361e76ec

  • \Users\Admin\AppData\Local\Temp\ntdtcstp.dll

    Filesize

    7KB

    MD5

    67587e25a971a141628d7f07bd40ffa0

    SHA1

    76fcd014539a3bb247cc0b761225f68bd6055f6b

    SHA256

    e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378

    SHA512

    6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

  • memory/2036-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmp

    Filesize

    8KB

  • memory/2036-55-0x0000000000400000-0x0000000000697000-memory.dmp

    Filesize

    2.6MB

  • memory/2036-56-0x00000000006A0000-0x0000000000779000-memory.dmp

    Filesize

    868KB

  • memory/2036-57-0x0000000000400000-0x0000000000697000-memory.dmp

    Filesize

    2.6MB

  • memory/2036-61-0x0000000000400000-0x0000000000697000-memory.dmp

    Filesize

    2.6MB

  • memory/2036-60-0x00000000046C0000-0x00000000046CE000-memory.dmp

    Filesize

    56KB

  • memory/2036-62-0x0000000000400000-0x0000000000697000-memory.dmp

    Filesize

    2.6MB

  • memory/2036-63-0x0000000000400000-0x0000000000697000-memory.dmp

    Filesize

    2.6MB