Analysis
-
max time kernel
152s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 07:46
Static task
static1
Behavioral task
behavioral1
Sample
64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe
Resource
win10v2004-20221111-en
General
-
Target
64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe
-
Size
83KB
-
MD5
acfe82d7deeb79b64312f541fa3359d8
-
SHA1
3583e413fcb7801efdfddac9636725296d0b2190
-
SHA256
64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f
-
SHA512
2a4dd63f31c55de73067f00f2d0d226110a805237d5cd7c3fc8510e02495395517e590ccef13d89b12a5602ec5374207db249a0a4f66fcfd943d1e64ee6e8775
-
SSDEEP
768:3kGG+pe9oIQtg9vWJ5OLxQ6umuo6oFDilY+vPqR4XHPEjCFkXOvVdrFqV:3que2tM+qjDmC+vSR4X76evVlgV
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1736-57-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/692-65-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
cissv.execissv.exepid process 1264 cissv.exe 692 cissv.exe -
Processes:
resource yara_rule behavioral1/memory/1736-57-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/692-65-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exepid process 1736 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cissv.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cissv = "C:\\Users\\Admin\\AppData\\Roaming\\cissv.exe" cissv.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.execissv.exedescription pid process target process PID 1640 set thread context of 1736 1640 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe PID 1264 set thread context of 692 1264 cissv.exe cissv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.execissv.exepid process 1640 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe 1640 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe 1264 cissv.exe 1264 cissv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.execissv.exedescription pid process target process PID 1640 wrote to memory of 1736 1640 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe PID 1640 wrote to memory of 1736 1640 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe PID 1640 wrote to memory of 1736 1640 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe PID 1640 wrote to memory of 1736 1640 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe PID 1736 wrote to memory of 1264 1736 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe cissv.exe PID 1736 wrote to memory of 1264 1736 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe cissv.exe PID 1736 wrote to memory of 1264 1736 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe cissv.exe PID 1736 wrote to memory of 1264 1736 64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe cissv.exe PID 1264 wrote to memory of 692 1264 cissv.exe cissv.exe PID 1264 wrote to memory of 692 1264 cissv.exe cissv.exe PID 1264 wrote to memory of 692 1264 cissv.exe cissv.exe PID 1264 wrote to memory of 692 1264 cissv.exe cissv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe"C:\Users\Admin\AppData\Local\Temp\64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe"C:\Users\Admin\AppData\Local\Temp\64daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\cissv.exe"C:\Users\Admin\AppData\Roaming\cissv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Roaming\cissv.exe"C:\Users\Admin\AppData\Roaming\cissv.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5acfe82d7deeb79b64312f541fa3359d8
SHA13583e413fcb7801efdfddac9636725296d0b2190
SHA25664daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f
SHA5122a4dd63f31c55de73067f00f2d0d226110a805237d5cd7c3fc8510e02495395517e590ccef13d89b12a5602ec5374207db249a0a4f66fcfd943d1e64ee6e8775
-
Filesize
83KB
MD5acfe82d7deeb79b64312f541fa3359d8
SHA13583e413fcb7801efdfddac9636725296d0b2190
SHA25664daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f
SHA5122a4dd63f31c55de73067f00f2d0d226110a805237d5cd7c3fc8510e02495395517e590ccef13d89b12a5602ec5374207db249a0a4f66fcfd943d1e64ee6e8775
-
Filesize
83KB
MD5acfe82d7deeb79b64312f541fa3359d8
SHA13583e413fcb7801efdfddac9636725296d0b2190
SHA25664daf3a20bd0c6e055cfbd533f32a1e4e461c799b5692cea56020edd066cac1f
SHA5122a4dd63f31c55de73067f00f2d0d226110a805237d5cd7c3fc8510e02495395517e590ccef13d89b12a5602ec5374207db249a0a4f66fcfd943d1e64ee6e8775