Analysis

  • max time kernel
    207s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 03:40

General

  • Target

    07eff1726003e00b7557efed2fdf38c057234ce42761d06c7a066e2183dc7fb6.exe

  • Size

    68KB

  • MD5

    03039af402b17dea32b9ff0477f167fe

  • SHA1

    09f75a3189e64bc91c5df9780c0486b80776b616

  • SHA256

    07eff1726003e00b7557efed2fdf38c057234ce42761d06c7a066e2183dc7fb6

  • SHA512

    dd3f8c19c555e8cbcfe88233d809ec5176ba2fb1daa8c1fd9fec0aab56a7e7067015e7688f421575748f9aa3f7f3329345fb29a45cf70fc2f83933f71fcc2908

  • SSDEEP

    1536:VYNiejDbYn+vrCpvRcrJNUSz33MagCXQbgH1cntQJYBBnouy8+:OxbYn+vrWW3UE33dXQbgHynuJ2hout+

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\07eff1726003e00b7557efed2fdf38c057234ce42761d06c7a066e2183dc7fb6.exe
        "C:\Users\Admin\AppData\Local\Temp\07eff1726003e00b7557efed2fdf38c057234ce42761d06c7a066e2183dc7fb6.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\apocalyps32.exe
          -bs
          3⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1692

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\apocalyps32.exe

      Filesize

      68KB

      MD5

      03039af402b17dea32b9ff0477f167fe

      SHA1

      09f75a3189e64bc91c5df9780c0486b80776b616

      SHA256

      07eff1726003e00b7557efed2fdf38c057234ce42761d06c7a066e2183dc7fb6

      SHA512

      dd3f8c19c555e8cbcfe88233d809ec5176ba2fb1daa8c1fd9fec0aab56a7e7067015e7688f421575748f9aa3f7f3329345fb29a45cf70fc2f83933f71fcc2908

    • C:\Windows\apocalyps32.exe

      Filesize

      68KB

      MD5

      03039af402b17dea32b9ff0477f167fe

      SHA1

      09f75a3189e64bc91c5df9780c0486b80776b616

      SHA256

      07eff1726003e00b7557efed2fdf38c057234ce42761d06c7a066e2183dc7fb6

      SHA512

      dd3f8c19c555e8cbcfe88233d809ec5176ba2fb1daa8c1fd9fec0aab56a7e7067015e7688f421575748f9aa3f7f3329345fb29a45cf70fc2f83933f71fcc2908

    • memory/1692-57-0x0000000000000000-mapping.dmp

    • memory/1692-61-0x0000000030000000-0x0000000030036000-memory.dmp

      Filesize

      216KB

    • memory/1692-63-0x0000000030000000-0x0000000030036000-memory.dmp

      Filesize

      216KB

    • memory/1948-54-0x0000000030000000-0x0000000030036000-memory.dmp

      Filesize

      216KB

    • memory/1948-55-0x0000000075D51000-0x0000000075D53000-memory.dmp

      Filesize

      8KB

    • memory/1948-56-0x0000000000310000-0x0000000000346000-memory.dmp

      Filesize

      216KB

    • memory/1948-59-0x0000000030000000-0x0000000030036000-memory.dmp

      Filesize

      216KB