Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 10:07
Static task
static1
Behavioral task
behavioral1
Sample
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe
Resource
win10v2004-20220812-en
General
-
Target
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe
-
Size
1.1MB
-
MD5
e9e1f725998346169d40e0640bf80aa7
-
SHA1
786afac99acce903c82d37e5c2e8fc8f41064f0a
-
SHA256
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768
-
SHA512
2ec4ccff7ad314fec41ef99c8dba28d9f58b9c19e14d9c5f09b35c40ddd6887ec13a46d16ae7d0ba5d3073608cc6312ac624eec185cebe237093c8aa48a295f1
-
SSDEEP
24576:vbSz8inwLYcOSRvlHoLZS5Nhi1/tFNL1skeaznRWRSJlAI5:DSz83ROS1lHow5NhMF353lWRS3AI5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 16 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-56-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1708-58-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1708-60-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1708-62-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1708-65-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1708-66-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1708-67-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1432-73-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1432-75-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1432-76-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1708-78-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1432-82-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1432-84-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1432-86-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1432-77-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral1/memory/1708-88-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
Processes:
gmou137A.exepid process 1432 gmou137A.exe -
Loads dropped DLL 1 IoCs
Processes:
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exepid process 1708 fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\windows\CurrentVersion\Run fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\gmou137A = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\MSINFO\\gmou137A.exe\"" fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe -
Drops file in Program Files directory 2 IoCs
Processes:
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exe fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exe fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
gmou137A.exedescription pid process Token: SeIncBasePriorityPrivilege 1432 gmou137A.exe Token: SeIncBasePriorityPrivilege 1432 gmou137A.exe Token: SeIncBasePriorityPrivilege 1432 gmou137A.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exedescription pid process target process PID 1708 wrote to memory of 1432 1708 fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe gmou137A.exe PID 1708 wrote to memory of 1432 1708 fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe gmou137A.exe PID 1708 wrote to memory of 1432 1708 fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe gmou137A.exe PID 1708 wrote to memory of 1432 1708 fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe gmou137A.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe"C:\Users\Admin\AppData\Local\Temp\fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\gmou137A.exeFilesize
1.1MB
MD5e9e1f725998346169d40e0640bf80aa7
SHA1786afac99acce903c82d37e5c2e8fc8f41064f0a
SHA256fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768
SHA5122ec4ccff7ad314fec41ef99c8dba28d9f58b9c19e14d9c5f09b35c40ddd6887ec13a46d16ae7d0ba5d3073608cc6312ac624eec185cebe237093c8aa48a295f1
-
\Program Files\Common Files\Microsoft Shared\MSInfo\gmou137A.exeFilesize
1.1MB
MD5e9e1f725998346169d40e0640bf80aa7
SHA1786afac99acce903c82d37e5c2e8fc8f41064f0a
SHA256fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768
SHA5122ec4ccff7ad314fec41ef99c8dba28d9f58b9c19e14d9c5f09b35c40ddd6887ec13a46d16ae7d0ba5d3073608cc6312ac624eec185cebe237093c8aa48a295f1
-
memory/1432-86-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1432-69-0x0000000000000000-mapping.dmp
-
memory/1432-73-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1432-75-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1432-77-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1432-76-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1432-84-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1432-82-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1432-72-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1708-89-0x0000000000320000-0x0000000000354000-memory.dmpFilesize
208KB
-
memory/1708-66-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1708-56-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1708-60-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1708-58-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1708-85-0x0000000000690000-0x0000000000697000-memory.dmpFilesize
28KB
-
memory/1708-78-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1708-80-0x0000000002100000-0x0000000002107000-memory.dmpFilesize
28KB
-
memory/1708-67-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1708-55-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1708-54-0x0000000075B11000-0x0000000075B13000-memory.dmpFilesize
8KB
-
memory/1708-87-0x00000000006A0000-0x00000000006A3000-memory.dmpFilesize
12KB
-
memory/1708-65-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1708-83-0x0000000000670000-0x0000000000678000-memory.dmpFilesize
32KB
-
memory/1708-81-0x0000000000390000-0x0000000000397000-memory.dmpFilesize
28KB
-
memory/1708-64-0x0000000000320000-0x0000000000354000-memory.dmpFilesize
208KB
-
memory/1708-88-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/1708-62-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB