Analysis

  • max time kernel
    195s
  • max time network
    202s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 04:53

General

  • Target

    0096069e82fb43715f794e015b90f0b320bdc5093315949539c80c3294cbaba4.exe

  • Size

    18KB

  • MD5

    f2c1a4227d31d1bf2c15208f86193bf5

  • SHA1

    57eb60ddde535d538247ff7d37c0ad0dcdb9d7ac

  • SHA256

    0096069e82fb43715f794e015b90f0b320bdc5093315949539c80c3294cbaba4

  • SHA512

    1b333bcedcd35da773be36eb690ed009b3aa31b736192203c5f459a302ff4ea8d780af0cddc499f944a4402bfbfffb72ea7c620da494f301985c3c062ecf2e0a

  • SSDEEP

    384:xEw7wknHOYXQdhLGPvCaV4pLS7OGQ8xy1CzcZ6Bne:xEw7wkHOYEGPvCaV4pLzb1fZ

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0096069e82fb43715f794e015b90f0b320bdc5093315949539c80c3294cbaba4.exe
    "C:\Users\Admin\AppData\Local\Temp\0096069e82fb43715f794e015b90f0b320bdc5093315949539c80c3294cbaba4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Roaming\AdobeART.exe
      "C:\Users\Admin\AppData\Roaming\AdobeART.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\AdobeART.exe

    Filesize

    18KB

    MD5

    f2c1a4227d31d1bf2c15208f86193bf5

    SHA1

    57eb60ddde535d538247ff7d37c0ad0dcdb9d7ac

    SHA256

    0096069e82fb43715f794e015b90f0b320bdc5093315949539c80c3294cbaba4

    SHA512

    1b333bcedcd35da773be36eb690ed009b3aa31b736192203c5f459a302ff4ea8d780af0cddc499f944a4402bfbfffb72ea7c620da494f301985c3c062ecf2e0a

  • \Users\Admin\AppData\Roaming\AdobeART.exe

    Filesize

    18KB

    MD5

    f2c1a4227d31d1bf2c15208f86193bf5

    SHA1

    57eb60ddde535d538247ff7d37c0ad0dcdb9d7ac

    SHA256

    0096069e82fb43715f794e015b90f0b320bdc5093315949539c80c3294cbaba4

    SHA512

    1b333bcedcd35da773be36eb690ed009b3aa31b736192203c5f459a302ff4ea8d780af0cddc499f944a4402bfbfffb72ea7c620da494f301985c3c062ecf2e0a

  • \Users\Admin\AppData\Roaming\AdobeART.exe

    Filesize

    18KB

    MD5

    f2c1a4227d31d1bf2c15208f86193bf5

    SHA1

    57eb60ddde535d538247ff7d37c0ad0dcdb9d7ac

    SHA256

    0096069e82fb43715f794e015b90f0b320bdc5093315949539c80c3294cbaba4

    SHA512

    1b333bcedcd35da773be36eb690ed009b3aa31b736192203c5f459a302ff4ea8d780af0cddc499f944a4402bfbfffb72ea7c620da494f301985c3c062ecf2e0a

  • memory/576-58-0x0000000000000000-mapping.dmp

  • memory/576-62-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1364-54-0x0000000075E11000-0x0000000075E13000-memory.dmp

    Filesize

    8KB

  • memory/1364-55-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1364-60-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB