Analysis
-
max time kernel
147s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:18
Behavioral task
behavioral1
Sample
e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe
Resource
win10v2004-20220812-en
General
-
Target
e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe
-
Size
1.2MB
-
MD5
350a028daf8612cefa400032126afeea
-
SHA1
b3b0eaabbd19df7bb0e167bcb77889655dfb291a
-
SHA256
e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4
-
SHA512
68422ccca073c3012a844135ff6a517b54ef769d2ee95da6e1ae6a6a2a35a914091e66009fd80724c5544f69812c0c131d0e6502c1a1250cd2d8aa5df302d2ff
-
SSDEEP
24576:5GSvXcYr88kMQoNazpGWUk1dJkZlkB6tXYvDu0BbeK9j27jnjN/QR5+C7rFB1:5G2Xc+9kVVzjB5vyug9c5Z3Fj
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Processes:
e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe -
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2036-61-0x0000000000400000-0x0000000000697000-memory.dmp modiloader_stage2 behavioral1/memory/2036-62-0x0000000000400000-0x0000000000697000-memory.dmp modiloader_stage2 behavioral1/memory/2036-63-0x0000000000400000-0x0000000000697000-memory.dmp modiloader_stage2 -
Loads dropped DLL 2 IoCs
Processes:
e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exepid process 2036 e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe 2036 e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe -
Processes:
resource yara_rule behavioral1/memory/2036-55-0x0000000000400000-0x0000000000697000-memory.dmp themida behavioral1/memory/2036-57-0x0000000000400000-0x0000000000697000-memory.dmp themida behavioral1/memory/2036-61-0x0000000000400000-0x0000000000697000-memory.dmp themida behavioral1/memory/2036-62-0x0000000000400000-0x0000000000697000-memory.dmp themida behavioral1/memory/2036-63-0x0000000000400000-0x0000000000697000-memory.dmp themida -
Processes:
e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exepid process 2036 e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exedescription pid process Token: SeDebugPrivilege 2036 e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe Token: SeDebugPrivilege 2036 e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exepid process 2036 e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe 2036 e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe"C:\Users\Admin\AppData\Local\Temp\e235404841fc85ad1d490f2ae5f5e33e74cea395ece0ddd1683ba78d463b5aa4.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD50a11d49f4d6eb8b7cdb32af26bca8c4e
SHA11224969e7d01c2cfda2f83b6a79adc7d3f83fd71
SHA2560920f08c85e629f22b48a8a9503275fa4b67ad4ffb04e5d22e6a6495116e746c
SHA512c6291289980bd370b4cd61763c3a085a50d700e823017e32ca618147a265f17c53d56ae05ef875d44ee87665de08b23371f796854b44206a1ce699c7361e76ec
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350