Analysis
-
max time kernel
215s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 03:38
Behavioral task
behavioral1
Sample
1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe
Resource
win10v2004-20220812-en
General
-
Target
1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe
-
Size
108KB
-
MD5
e6c0d25760411df05593fb9d7654b7ab
-
SHA1
add31c30d67506dfc8e8c0d3404195ff73a5f5e0
-
SHA256
1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba
-
SHA512
0b2e427ff0cb4cfabdc6b3726e5b9e1fd8c09386068d4a4f64fa61d956feba6d36371043150bbe6fc05ae1d751b314d5d28fb2bba394107841dce52e8bfd2673
-
SSDEEP
3072:ioy8j7VnNdrPHaSekwi+mW+2uN02Xjout:y8jZ7rvaU3+mWruq2XjoS
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Processes:
1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe -
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1008-58-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1008-59-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral1/memory/1008-58-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1008-59-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exepid process 1008 1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe 1008 1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe -
Processes:
1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe -
Drops file in Windows directory 1 IoCs
Processes:
1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exedescription ioc process File created C:\Windows\VMPipe32.dll 1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exedescription pid process Token: SeDebugPrivilege 1008 1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe Token: SeDebugPrivilege 1008 1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exepid process 1008 1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe 1008 1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe"C:\Users\Admin\AppData\Local\Temp\1a89586cadd2df352898d54e833ab708714558f0b596525bec505e4bd0fc4eba.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5e9292c3ed55524cc47a2a876c7631d05
SHA1ae42d2afb16a8aef9b45c7ed621abcaf78c7cfd8
SHA256aafd736abf9cc18139cea61bddba46c03efc6291a38ef732c4e5e3c1ba4516ac
SHA512ae5a0e06a8bc227a88d0c43bcc2738901dea973eeeab949a5b19f9ae77d3622d82fe52f415add4dc917de2d264de952b6133f48046d64296d68e5507b39447b3
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350