Analysis
-
max time kernel
188s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 13:49
Static task
static1
Behavioral task
behavioral1
Sample
cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe
Resource
win10v2004-20221111-en
General
-
Target
cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe
-
Size
40KB
-
MD5
12e31522e619aedb08fd6ee5d4ec6c89
-
SHA1
e4bcc5f41b36cabac7ac25be812136005c3dbea1
-
SHA256
cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f
-
SHA512
eb5986b5e2982a904bd16cd80a5c5c85a08b22a21a940568def68f21cfabd9d7ddfe8ec9fba99fc5268b02108bd18bb3a34ea77ea75b333385d6a7b9735aa0cf
-
SSDEEP
768:B4B2JGYVNfV6vrFDPwp2Gt7YHN0m5vcdXwPXDzHvzExAPOE/3MwVrJ7H8oWXRrKk:BC2oAfIrJwp2Gium5vcxwPzzvzEx6L/q
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1276-135-0x0000000000550000-0x0000000000574000-memory.dmp modiloader_stage2 behavioral2/memory/1276-137-0x0000000000550000-0x0000000000574000-memory.dmp modiloader_stage2 -
Loads dropped DLL 2 IoCs
Processes:
cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exepid process 1276 cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe 1276 cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe -
Drops file in Program Files directory 1 IoCs
Processes:
cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exepid process 1276 cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe 1276 cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe 1276 cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe 1276 cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe 1276 cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe 1276 cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe 1276 cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe 1276 cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exepid process 1276 cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe"C:\Users\Admin\AppData\Local\Temp\cbb39e6283a85b7c49b607129d2f61e7ca86462cfa8aa58db84f67f7cc76ff9f.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1276
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5bb3f830c1032018214a0ed1b4dfd11fa
SHA153b963a581fb822029c15014df4ce1abea529dc1
SHA256ed1185747f67aa142a8f7bee262ff1c217712fa952d79be80b852d57159e9a50
SHA51277ec175271722f97567bbaca05e80b814bdc1db233a6e96d62c712ae4829cbda7745816ee6bb71ad12df74c2f9b24c50a5cbfdad3d01970fe8795403ba063d40
-
Filesize
21KB
MD5bb3f830c1032018214a0ed1b4dfd11fa
SHA153b963a581fb822029c15014df4ce1abea529dc1
SHA256ed1185747f67aa142a8f7bee262ff1c217712fa952d79be80b852d57159e9a50
SHA51277ec175271722f97567bbaca05e80b814bdc1db233a6e96d62c712ae4829cbda7745816ee6bb71ad12df74c2f9b24c50a5cbfdad3d01970fe8795403ba063d40