Analysis
-
max time kernel
178s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 10:07
Static task
static1
Behavioral task
behavioral1
Sample
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe
Resource
win10v2004-20220812-en
General
-
Target
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe
-
Size
1.1MB
-
MD5
e9e1f725998346169d40e0640bf80aa7
-
SHA1
786afac99acce903c82d37e5c2e8fc8f41064f0a
-
SHA256
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768
-
SHA512
2ec4ccff7ad314fec41ef99c8dba28d9f58b9c19e14d9c5f09b35c40ddd6887ec13a46d16ae7d0ba5d3073608cc6312ac624eec185cebe237093c8aa48a295f1
-
SSDEEP
24576:vbSz8inwLYcOSRvlHoLZS5Nhi1/tFNL1skeaznRWRSJlAI5:DSz83ROS1lHow5NhMF353lWRS3AI5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 19 IoCs
Processes:
resource yara_rule behavioral2/memory/5084-135-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-137-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-138-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-139-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-141-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-142-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-143-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-145-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-149-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-155-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-157-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-158-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-159-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-161-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-162-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-163-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-166-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-171-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-173-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
Processes:
gmou137A.exepid process 428 gmou137A.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\windows\CurrentVersion\Run fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gmou137A = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\MSINFO\\gmou137A.exe\"" fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe -
Drops file in Program Files directory 2 IoCs
Processes:
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exe fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exe fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
gmou137A.exedescription pid process Token: SeIncBasePriorityPrivilege 428 gmou137A.exe Token: SeIncBasePriorityPrivilege 428 gmou137A.exe Token: SeIncBasePriorityPrivilege 428 gmou137A.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exedescription pid process target process PID 5084 wrote to memory of 428 5084 fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe gmou137A.exe PID 5084 wrote to memory of 428 5084 fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe gmou137A.exe PID 5084 wrote to memory of 428 5084 fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe gmou137A.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe"C:\Users\Admin\AppData\Local\Temp\fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:428
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5e9e1f725998346169d40e0640bf80aa7
SHA1786afac99acce903c82d37e5c2e8fc8f41064f0a
SHA256fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768
SHA5122ec4ccff7ad314fec41ef99c8dba28d9f58b9c19e14d9c5f09b35c40ddd6887ec13a46d16ae7d0ba5d3073608cc6312ac624eec185cebe237093c8aa48a295f1
-
Filesize
1.1MB
MD5e9e1f725998346169d40e0640bf80aa7
SHA1786afac99acce903c82d37e5c2e8fc8f41064f0a
SHA256fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768
SHA5122ec4ccff7ad314fec41ef99c8dba28d9f58b9c19e14d9c5f09b35c40ddd6887ec13a46d16ae7d0ba5d3073608cc6312ac624eec185cebe237093c8aa48a295f1