Analysis
-
max time kernel
150s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 20:35
Static task
static1
Behavioral task
behavioral1
Sample
32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe
Resource
win10v2004-20221111-en
General
-
Target
32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe
-
Size
685KB
-
MD5
ac4959f40f22a11ee528ef90e22db442
-
SHA1
e20043be99033f6d47b18393f67ac8753427ed5d
-
SHA256
32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e
-
SHA512
12c824f695f01d6fd227d1c087ca5494ea190f7c30c3e668b8c2705e39c4ce123dc7c12a5e0bd672f85a6e1edc4fd775ee41379d7f0416a3d708e64188794848
-
SSDEEP
12288:+F6kN+Db1SIsf8rG8fv+epDbyk0nLi1fxIBxixny:+F6kcnUIA8rvv+cPyk0nG5OYy
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 11 IoCs
Processes:
resource yara_rule behavioral1/memory/1380-70-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1380-72-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1380-73-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1380-71-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1380-69-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1380-74-0x00000000004082E8-mapping.dmp modiloader_stage2 behavioral1/memory/1380-68-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1380-76-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1380-79-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1380-85-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1380-89-0x0000000000401000-0x0000000000409000-memory.dmp modiloader_stage2 -
Executes dropped EXE 4 IoCs
Processes:
svchost.exesvchost.exeWindowsUpdate.exeWindowsUpdate.exepid process 848 svchost.exe 1380 svchost.exe 684 WindowsUpdate.exe 1544 WindowsUpdate.exe -
Loads dropped DLL 10 IoCs
Processes:
32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exesvchost.exeWindowsUpdate.exepid process 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe 848 svchost.exe 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe 684 WindowsUpdate.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exeWindowsUpdate.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdater = "\"C:\\Users\\Admin\\AppData\\Roaming\\Hamex\\Hamex\\1.0.0.0\\WindowsUpdater.exe\"" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\Hamex\\Hamex\\1.0.0.0\\WindowsUpdate.exe\"" WindowsUpdate.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
svchost.exeWindowsUpdate.exedescription pid process target process PID 848 set thread context of 1380 848 svchost.exe svchost.exe PID 684 set thread context of 1544 684 WindowsUpdate.exe WindowsUpdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WindowsUpdate.exepid process 1544 WindowsUpdate.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WindowsUpdate.exedescription pid process Token: SeDebugPrivilege 1544 WindowsUpdate.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WindowsUpdate.exepid process 1544 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exesvchost.exeWindowsUpdate.exedescription pid process target process PID 1808 wrote to memory of 848 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe svchost.exe PID 1808 wrote to memory of 848 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe svchost.exe PID 1808 wrote to memory of 848 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe svchost.exe PID 1808 wrote to memory of 848 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe svchost.exe PID 1808 wrote to memory of 848 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe svchost.exe PID 1808 wrote to memory of 848 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe svchost.exe PID 1808 wrote to memory of 848 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 848 wrote to memory of 1380 848 svchost.exe svchost.exe PID 1808 wrote to memory of 684 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe WindowsUpdate.exe PID 1808 wrote to memory of 684 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe WindowsUpdate.exe PID 1808 wrote to memory of 684 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe WindowsUpdate.exe PID 1808 wrote to memory of 684 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe WindowsUpdate.exe PID 1808 wrote to memory of 684 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe WindowsUpdate.exe PID 1808 wrote to memory of 684 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe WindowsUpdate.exe PID 1808 wrote to memory of 684 1808 32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe WindowsUpdate.exe PID 684 wrote to memory of 1544 684 WindowsUpdate.exe WindowsUpdate.exe PID 684 wrote to memory of 1544 684 WindowsUpdate.exe WindowsUpdate.exe PID 684 wrote to memory of 1544 684 WindowsUpdate.exe WindowsUpdate.exe PID 684 wrote to memory of 1544 684 WindowsUpdate.exe WindowsUpdate.exe PID 684 wrote to memory of 1544 684 WindowsUpdate.exe WindowsUpdate.exe PID 684 wrote to memory of 1544 684 WindowsUpdate.exe WindowsUpdate.exe PID 684 wrote to memory of 1544 684 WindowsUpdate.exe WindowsUpdate.exe PID 684 wrote to memory of 1544 684 WindowsUpdate.exe WindowsUpdate.exe PID 684 wrote to memory of 1544 684 WindowsUpdate.exe WindowsUpdate.exe PID 684 wrote to memory of 1544 684 WindowsUpdate.exe WindowsUpdate.exe PID 684 wrote to memory of 1544 684 WindowsUpdate.exe WindowsUpdate.exe PID 684 wrote to memory of 1544 684 WindowsUpdate.exe WindowsUpdate.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe"C:\Users\Admin\AppData\Local\Temp\32d2b33067419d6dab4410e787f3f886de2b7571017879fe7280e11cf3455c7e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\svchost.exeC:\Users\Admin\AppData\Local\Temp\RarSFX0\svchost.exe3⤵
- Executes dropped EXE
PID:1380
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\WindowsUpdate.exeC:\Users\Admin\AppData\Local\Temp\RarSFX0\WindowsUpdate.exe3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD5f075a14d46a1faf9e7a520e083e62281
SHA1f287846c5da6771d8f81e540e2c3265130ec4437
SHA2560f90eda8458508b2a054636e8dfb97a852f527e0020f5f83ffc974441c8261b0
SHA51269238a7628d97c6e131ff298cc91c14b0e1159786c7ff857008c1f9b6818fd9a0098a26f5e77cfd1bd165f3358b9e6f1e47b1f6c44332650515fcc45b459f012
-
Filesize
423KB
MD5f075a14d46a1faf9e7a520e083e62281
SHA1f287846c5da6771d8f81e540e2c3265130ec4437
SHA2560f90eda8458508b2a054636e8dfb97a852f527e0020f5f83ffc974441c8261b0
SHA51269238a7628d97c6e131ff298cc91c14b0e1159786c7ff857008c1f9b6818fd9a0098a26f5e77cfd1bd165f3358b9e6f1e47b1f6c44332650515fcc45b459f012
-
Filesize
423KB
MD5f075a14d46a1faf9e7a520e083e62281
SHA1f287846c5da6771d8f81e540e2c3265130ec4437
SHA2560f90eda8458508b2a054636e8dfb97a852f527e0020f5f83ffc974441c8261b0
SHA51269238a7628d97c6e131ff298cc91c14b0e1159786c7ff857008c1f9b6818fd9a0098a26f5e77cfd1bd165f3358b9e6f1e47b1f6c44332650515fcc45b459f012
-
Filesize
108KB
MD58720989d03e41d8d412ba8c51c28ceab
SHA190f59979598b5b0f693fa94e86bfd50c2a5cc280
SHA256e7efc92fc188aa58b90a1a37cb7c121a4cdba591b20cb33566eecde77ce0ec1b
SHA512fea81ea5c2bb17d7ac720d469626fcfb7947bae7c24728937828cdca5d6e3b3deab2e144f77cc039e4d68ef2783f1abfe5475c9555a0cf82a8b080e62d6cbea0
-
Filesize
108KB
MD58720989d03e41d8d412ba8c51c28ceab
SHA190f59979598b5b0f693fa94e86bfd50c2a5cc280
SHA256e7efc92fc188aa58b90a1a37cb7c121a4cdba591b20cb33566eecde77ce0ec1b
SHA512fea81ea5c2bb17d7ac720d469626fcfb7947bae7c24728937828cdca5d6e3b3deab2e144f77cc039e4d68ef2783f1abfe5475c9555a0cf82a8b080e62d6cbea0
-
Filesize
108KB
MD58720989d03e41d8d412ba8c51c28ceab
SHA190f59979598b5b0f693fa94e86bfd50c2a5cc280
SHA256e7efc92fc188aa58b90a1a37cb7c121a4cdba591b20cb33566eecde77ce0ec1b
SHA512fea81ea5c2bb17d7ac720d469626fcfb7947bae7c24728937828cdca5d6e3b3deab2e144f77cc039e4d68ef2783f1abfe5475c9555a0cf82a8b080e62d6cbea0
-
Filesize
423KB
MD5f075a14d46a1faf9e7a520e083e62281
SHA1f287846c5da6771d8f81e540e2c3265130ec4437
SHA2560f90eda8458508b2a054636e8dfb97a852f527e0020f5f83ffc974441c8261b0
SHA51269238a7628d97c6e131ff298cc91c14b0e1159786c7ff857008c1f9b6818fd9a0098a26f5e77cfd1bd165f3358b9e6f1e47b1f6c44332650515fcc45b459f012
-
Filesize
423KB
MD5f075a14d46a1faf9e7a520e083e62281
SHA1f287846c5da6771d8f81e540e2c3265130ec4437
SHA2560f90eda8458508b2a054636e8dfb97a852f527e0020f5f83ffc974441c8261b0
SHA51269238a7628d97c6e131ff298cc91c14b0e1159786c7ff857008c1f9b6818fd9a0098a26f5e77cfd1bd165f3358b9e6f1e47b1f6c44332650515fcc45b459f012
-
Filesize
423KB
MD5f075a14d46a1faf9e7a520e083e62281
SHA1f287846c5da6771d8f81e540e2c3265130ec4437
SHA2560f90eda8458508b2a054636e8dfb97a852f527e0020f5f83ffc974441c8261b0
SHA51269238a7628d97c6e131ff298cc91c14b0e1159786c7ff857008c1f9b6818fd9a0098a26f5e77cfd1bd165f3358b9e6f1e47b1f6c44332650515fcc45b459f012
-
Filesize
423KB
MD5f075a14d46a1faf9e7a520e083e62281
SHA1f287846c5da6771d8f81e540e2c3265130ec4437
SHA2560f90eda8458508b2a054636e8dfb97a852f527e0020f5f83ffc974441c8261b0
SHA51269238a7628d97c6e131ff298cc91c14b0e1159786c7ff857008c1f9b6818fd9a0098a26f5e77cfd1bd165f3358b9e6f1e47b1f6c44332650515fcc45b459f012
-
Filesize
423KB
MD5f075a14d46a1faf9e7a520e083e62281
SHA1f287846c5da6771d8f81e540e2c3265130ec4437
SHA2560f90eda8458508b2a054636e8dfb97a852f527e0020f5f83ffc974441c8261b0
SHA51269238a7628d97c6e131ff298cc91c14b0e1159786c7ff857008c1f9b6818fd9a0098a26f5e77cfd1bd165f3358b9e6f1e47b1f6c44332650515fcc45b459f012
-
Filesize
108KB
MD58720989d03e41d8d412ba8c51c28ceab
SHA190f59979598b5b0f693fa94e86bfd50c2a5cc280
SHA256e7efc92fc188aa58b90a1a37cb7c121a4cdba591b20cb33566eecde77ce0ec1b
SHA512fea81ea5c2bb17d7ac720d469626fcfb7947bae7c24728937828cdca5d6e3b3deab2e144f77cc039e4d68ef2783f1abfe5475c9555a0cf82a8b080e62d6cbea0
-
Filesize
108KB
MD58720989d03e41d8d412ba8c51c28ceab
SHA190f59979598b5b0f693fa94e86bfd50c2a5cc280
SHA256e7efc92fc188aa58b90a1a37cb7c121a4cdba591b20cb33566eecde77ce0ec1b
SHA512fea81ea5c2bb17d7ac720d469626fcfb7947bae7c24728937828cdca5d6e3b3deab2e144f77cc039e4d68ef2783f1abfe5475c9555a0cf82a8b080e62d6cbea0
-
Filesize
108KB
MD58720989d03e41d8d412ba8c51c28ceab
SHA190f59979598b5b0f693fa94e86bfd50c2a5cc280
SHA256e7efc92fc188aa58b90a1a37cb7c121a4cdba591b20cb33566eecde77ce0ec1b
SHA512fea81ea5c2bb17d7ac720d469626fcfb7947bae7c24728937828cdca5d6e3b3deab2e144f77cc039e4d68ef2783f1abfe5475c9555a0cf82a8b080e62d6cbea0
-
Filesize
108KB
MD58720989d03e41d8d412ba8c51c28ceab
SHA190f59979598b5b0f693fa94e86bfd50c2a5cc280
SHA256e7efc92fc188aa58b90a1a37cb7c121a4cdba591b20cb33566eecde77ce0ec1b
SHA512fea81ea5c2bb17d7ac720d469626fcfb7947bae7c24728937828cdca5d6e3b3deab2e144f77cc039e4d68ef2783f1abfe5475c9555a0cf82a8b080e62d6cbea0
-
Filesize
108KB
MD58720989d03e41d8d412ba8c51c28ceab
SHA190f59979598b5b0f693fa94e86bfd50c2a5cc280
SHA256e7efc92fc188aa58b90a1a37cb7c121a4cdba591b20cb33566eecde77ce0ec1b
SHA512fea81ea5c2bb17d7ac720d469626fcfb7947bae7c24728937828cdca5d6e3b3deab2e144f77cc039e4d68ef2783f1abfe5475c9555a0cf82a8b080e62d6cbea0