Analysis
-
max time kernel
147s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 11:04
Behavioral task
behavioral1
Sample
e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exe
Resource
win10v2004-20221111-en
General
-
Target
e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exe
-
Size
1.8MB
-
MD5
2ede29b32d18267e6a736be17d4f4664
-
SHA1
43673541f114e5071145932886e69266f0f3f166
-
SHA256
e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80
-
SHA512
6af657c000f19f0ab3b47fcffe2e1e80cb5bf55cb5096a2ad467e4a2eb2f6ac5398b9b57747e098d1331d46bcc6282786cc3804976bce0838ae837ec0fbed63d
-
SSDEEP
49152:AoQU9Z5Y4+YSembcj3jjTcDuNML851cM9whEWby9o1Kx0J7w:AoQU9Z64+YFmb03jju0ML8ncMmGWbyqY
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1780-55-0x0000000000400000-0x000000000054A000-memory.dmp modiloader_stage2 behavioral1/memory/1780-59-0x0000000000400000-0x000000000054A000-memory.dmp modiloader_stage2 behavioral1/memory/932-65-0x0000000000400000-0x00000000005BD000-memory.dmp modiloader_stage2 behavioral1/memory/932-66-0x0000000000400000-0x00000000005BD000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
msnmsgr.exeldapi32.exepid process 932 msnmsgr.exe 1488 ldapi32.exe -
Processes:
resource yara_rule behavioral1/memory/1780-55-0x0000000000400000-0x000000000054A000-memory.dmp upx C:\Windows\msnmsgr.exe upx behavioral1/memory/1780-59-0x0000000000400000-0x000000000054A000-memory.dmp upx behavioral1/memory/932-65-0x0000000000400000-0x00000000005BD000-memory.dmp upx behavioral1/memory/932-66-0x0000000000400000-0x00000000005BD000-memory.dmp upx -
Loads dropped DLL 4 IoCs
Processes:
msnmsgr.exepid process 932 msnmsgr.exe 932 msnmsgr.exe 932 msnmsgr.exe 932 msnmsgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msnmsgr = "C:\\Windows\\msnmsgr.exe" e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exe -
Drops file in System32 directory 3 IoCs
Processes:
msnmsgr.exedescription ioc process File created C:\Windows\SysWOW64\ntcvx32.dll msnmsgr.exe File created C:\Windows\SysWOW64\ldapi32.exe msnmsgr.exe File created C:\Windows\SysWOW64\ntswrl32.dll msnmsgr.exe -
Drops file in Windows directory 2 IoCs
Processes:
e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exedescription ioc process File created C:\Windows\msnmsgr.exe e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exe File opened for modification C:\Windows\msnmsgr.exe e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ldapi32.exedescription pid process Token: SeDebugPrivilege 1488 ldapi32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msnmsgr.exepid process 932 msnmsgr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exemsnmsgr.exedescription pid process target process PID 1780 wrote to memory of 932 1780 e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exe msnmsgr.exe PID 1780 wrote to memory of 932 1780 e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exe msnmsgr.exe PID 1780 wrote to memory of 932 1780 e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exe msnmsgr.exe PID 1780 wrote to memory of 932 1780 e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exe msnmsgr.exe PID 932 wrote to memory of 1488 932 msnmsgr.exe ldapi32.exe PID 932 wrote to memory of 1488 932 msnmsgr.exe ldapi32.exe PID 932 wrote to memory of 1488 932 msnmsgr.exe ldapi32.exe PID 932 wrote to memory of 1488 932 msnmsgr.exe ldapi32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exe"C:\Users\Admin\AppData\Local\Temp\e477a8097003204eb7f070ee081fdf996ad7239e4468b4a6bfc13abd36a4cd80.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\msnmsgr.exe"C:\Windows\msnmsgr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\ldapi32.exeC:\Windows\system32\ldapi32.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD592acb5d55bc589ea424d174b31f76686
SHA11f9f023b1ae0b1be5c397fe103ac520b371fbd6b
SHA2563bea383242a4439634618a86993c8e70c43cb8810e5324f3f9c6b9cbe7b3ead4
SHA512e89ea8bf0b6c2bd11072a5d455e67b2b8470292dfb8382a3bfb5da4a409b86390a62f448e7cdd496f286b1ac4097436efd83e886ae5b45accda6da7dc4d9938e
-
Filesize
315KB
MD56997ab8f74fb80dfec93b6bd6a8dfab5
SHA10ff3955239cf3ca07d51d2a0f9c0a14e8b2106dc
SHA256c9cb053d8080fe35cb334d85e3a3f855910ec1c46331db9077f0980f74e516c6
SHA51271529d83cb5ed57b231512e355115cd766eacfa1331ea041dc4cb85c5c468df57231d6755a88c630c070ad354b7e6825af22aee518910bd05935b3c4a2edc8bc
-
Filesize
20KB
MD592acb5d55bc589ea424d174b31f76686
SHA11f9f023b1ae0b1be5c397fe103ac520b371fbd6b
SHA2563bea383242a4439634618a86993c8e70c43cb8810e5324f3f9c6b9cbe7b3ead4
SHA512e89ea8bf0b6c2bd11072a5d455e67b2b8470292dfb8382a3bfb5da4a409b86390a62f448e7cdd496f286b1ac4097436efd83e886ae5b45accda6da7dc4d9938e
-
Filesize
20KB
MD592acb5d55bc589ea424d174b31f76686
SHA11f9f023b1ae0b1be5c397fe103ac520b371fbd6b
SHA2563bea383242a4439634618a86993c8e70c43cb8810e5324f3f9c6b9cbe7b3ead4
SHA512e89ea8bf0b6c2bd11072a5d455e67b2b8470292dfb8382a3bfb5da4a409b86390a62f448e7cdd496f286b1ac4097436efd83e886ae5b45accda6da7dc4d9938e
-
Filesize
11KB
MD5638f5a55fb714b6039ae0ace0ee70e44
SHA17b47cdf023822722b3b81e936cb16fbecb00babc
SHA2567d671074387a6885c5a4815165242720be442689e276cf64cc376da49080bb1f
SHA51268f8fb741566d9e4cb2a420a3fe179db59b29f9ab5f9aee7fd5312e1e7f0991b4d1491b2e557374ca7c4f3aee8948201721408601f68f9f86d36a4df5947e357
-
Filesize
11KB
MD5638f5a55fb714b6039ae0ace0ee70e44
SHA17b47cdf023822722b3b81e936cb16fbecb00babc
SHA2567d671074387a6885c5a4815165242720be442689e276cf64cc376da49080bb1f
SHA51268f8fb741566d9e4cb2a420a3fe179db59b29f9ab5f9aee7fd5312e1e7f0991b4d1491b2e557374ca7c4f3aee8948201721408601f68f9f86d36a4df5947e357