Analysis
-
max time kernel
207s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe
Resource
win10v2004-20221111-en
General
-
Target
45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe
-
Size
105KB
-
MD5
bd25ce7ece2c47e45a2d01226468168f
-
SHA1
674bc4ddef288ca92c372e0ecffb5d6a33750ce0
-
SHA256
45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293
-
SHA512
8e8a87123a07637a56af4f3655dea168df1345e19907fc777ef8607616510c90cdedac801ff74459a9374231f48cc8040ad4ba4497f0174d4fa51b416ed9efaf
-
SSDEEP
3072:54sWwNhVHA6b5qu8G/57hUmN91+9QVyCbqur:gMg6b5quN7eQ9Y9QvZ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 11 IoCs
Processes:
resource yara_rule behavioral2/memory/4472-135-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4472-136-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4472-138-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4472-140-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4472-141-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4472-142-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4472-144-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4472-146-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/2068-151-0x0000000000000000-mapping.dmp modiloader_stage2 behavioral2/memory/2068-162-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/2068-163-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
AdobeART.exeAdobeART.exepid process 504 AdobeART.exe 2068 AdobeART.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
AdobeART.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeART = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeART.exe" AdobeART.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exeAdobeART.exedescription pid process target process PID 3876 set thread context of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 504 set thread context of 2068 504 AdobeART.exe AdobeART.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exeAdobeART.exedescription pid process target process PID 3876 wrote to memory of 2260 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 2260 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 2260 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 3876 wrote to memory of 4472 3876 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe PID 4472 wrote to memory of 504 4472 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe AdobeART.exe PID 4472 wrote to memory of 504 4472 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe AdobeART.exe PID 4472 wrote to memory of 504 4472 45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe PID 504 wrote to memory of 2068 504 AdobeART.exe AdobeART.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe"C:\Users\Admin\AppData\Local\Temp\45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe"C:\Users\Admin\AppData\Local\Temp\45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe"2⤵PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe"C:\Users\Admin\AppData\Local\Temp\45f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2068
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5bd25ce7ece2c47e45a2d01226468168f
SHA1674bc4ddef288ca92c372e0ecffb5d6a33750ce0
SHA25645f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293
SHA5128e8a87123a07637a56af4f3655dea168df1345e19907fc777ef8607616510c90cdedac801ff74459a9374231f48cc8040ad4ba4497f0174d4fa51b416ed9efaf
-
Filesize
105KB
MD5bd25ce7ece2c47e45a2d01226468168f
SHA1674bc4ddef288ca92c372e0ecffb5d6a33750ce0
SHA25645f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293
SHA5128e8a87123a07637a56af4f3655dea168df1345e19907fc777ef8607616510c90cdedac801ff74459a9374231f48cc8040ad4ba4497f0174d4fa51b416ed9efaf
-
Filesize
105KB
MD5bd25ce7ece2c47e45a2d01226468168f
SHA1674bc4ddef288ca92c372e0ecffb5d6a33750ce0
SHA25645f574d1e3ad9bcd0eaa65565723fb4ce074374b89ebc01e7b231e1ceaf28293
SHA5128e8a87123a07637a56af4f3655dea168df1345e19907fc777ef8607616510c90cdedac801ff74459a9374231f48cc8040ad4ba4497f0174d4fa51b416ed9efaf