Analysis
-
max time kernel
178s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 10:07
Static task
static1
Behavioral task
behavioral1
Sample
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe
Resource
win10v2004-20220812-en
General
-
Target
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe
-
Size
1.1MB
-
MD5
e9e1f725998346169d40e0640bf80aa7
-
SHA1
786afac99acce903c82d37e5c2e8fc8f41064f0a
-
SHA256
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768
-
SHA512
2ec4ccff7ad314fec41ef99c8dba28d9f58b9c19e14d9c5f09b35c40ddd6887ec13a46d16ae7d0ba5d3073608cc6312ac624eec185cebe237093c8aa48a295f1
-
SSDEEP
24576:vbSz8inwLYcOSRvlHoLZS5Nhi1/tFNL1skeaznRWRSJlAI5:DSz83ROS1lHow5NhMF353lWRS3AI5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 19 IoCs
Processes:
resource yara_rule behavioral2/memory/5084-135-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-137-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-138-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-139-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-141-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-142-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-143-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-145-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-149-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-155-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-157-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-158-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-159-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-161-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-162-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-163-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-166-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/5084-171-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 behavioral2/memory/428-173-0x0000000000400000-0x0000000000669000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
Processes:
gmou137A.exepid process 428 gmou137A.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\windows\CurrentVersion\Run fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gmou137A = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\MSINFO\\gmou137A.exe\"" fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe -
Drops file in Program Files directory 2 IoCs
Processes:
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exe fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exe fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
gmou137A.exedescription pid process Token: SeIncBasePriorityPrivilege 428 gmou137A.exe Token: SeIncBasePriorityPrivilege 428 gmou137A.exe Token: SeIncBasePriorityPrivilege 428 gmou137A.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exedescription pid process target process PID 5084 wrote to memory of 428 5084 fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe gmou137A.exe PID 5084 wrote to memory of 428 5084 fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe gmou137A.exe PID 5084 wrote to memory of 428 5084 fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe gmou137A.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe"C:\Users\Admin\AppData\Local\Temp\fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\gmou137A.exeFilesize
1.1MB
MD5e9e1f725998346169d40e0640bf80aa7
SHA1786afac99acce903c82d37e5c2e8fc8f41064f0a
SHA256fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768
SHA5122ec4ccff7ad314fec41ef99c8dba28d9f58b9c19e14d9c5f09b35c40ddd6887ec13a46d16ae7d0ba5d3073608cc6312ac624eec185cebe237093c8aa48a295f1
-
C:\Program Files\Common Files\microsoft shared\MSInfo\gmou137A.exeFilesize
1.1MB
MD5e9e1f725998346169d40e0640bf80aa7
SHA1786afac99acce903c82d37e5c2e8fc8f41064f0a
SHA256fa5d5b921dee00469e951f8aac4f953e2f17a8731ed4aeab66ac7bd39b7b5768
SHA5122ec4ccff7ad314fec41ef99c8dba28d9f58b9c19e14d9c5f09b35c40ddd6887ec13a46d16ae7d0ba5d3073608cc6312ac624eec185cebe237093c8aa48a295f1
-
memory/428-168-0x00000000024D0000-0x00000000024D8000-memory.dmpFilesize
32KB
-
memory/428-162-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/428-154-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/428-166-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/428-167-0x0000000002470000-0x0000000002477000-memory.dmpFilesize
28KB
-
memory/428-165-0x0000000002400000-0x0000000002434000-memory.dmpFilesize
208KB
-
memory/428-163-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/428-169-0x0000000002760000-0x0000000002767000-memory.dmpFilesize
28KB
-
memory/428-161-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/428-170-0x00000000024F0000-0x00000000024F7000-memory.dmpFilesize
28KB
-
memory/428-173-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/428-159-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/428-144-0x0000000000000000-mapping.dmp
-
memory/428-158-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/428-157-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/428-155-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/5084-150-0x0000000002700000-0x0000000002707000-memory.dmpFilesize
28KB
-
memory/5084-164-0x0000000002890000-0x0000000002897000-memory.dmpFilesize
28KB
-
memory/5084-153-0x0000000002740000-0x0000000002743000-memory.dmpFilesize
12KB
-
memory/5084-152-0x0000000002730000-0x0000000002737000-memory.dmpFilesize
28KB
-
memory/5084-151-0x0000000002710000-0x0000000002718000-memory.dmpFilesize
32KB
-
memory/5084-149-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/5084-145-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/5084-146-0x0000000002410000-0x0000000002438000-memory.dmpFilesize
160KB
-
memory/5084-143-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/5084-133-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/5084-142-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/5084-141-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/5084-139-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/5084-138-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/5084-137-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/5084-135-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/5084-171-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB
-
memory/5084-172-0x0000000002410000-0x0000000002414000-memory.dmpFilesize
16KB
-
memory/5084-134-0x0000000000400000-0x0000000000669000-memory.dmpFilesize
2.4MB