Analysis

  • max time kernel
    151s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 04:43

General

  • Target

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6.exe

  • Size

    203KB

  • MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

  • SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

  • SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

  • SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • SSDEEP

    6144:k3nkFBFh2HhmbpKJfptLtKo7P3CEGP7ALD0X:k3kFBFecKhptAQoP74D0

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 17 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6.exe
    "C:\Users\Admin\AppData\Local\Temp\8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6.exe
      C:\Users\Admin\AppData\Local\Temp\8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6.exe
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Windows\SysWOW64\msnnmaneger.exe
        C:\Windows\system32\msnnmaneger.exe -bai C:\Users\Admin\AppData\Local\Temp\8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:684
        • C:\Windows\SysWOW64\msnnmaneger.exe
          C:\Windows\SysWOW64\msnnmaneger.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1084
          • C:\Windows\SysWOW64\msnnmaneger.exe
            C:\Windows\system32\msnnmaneger.exe -bai C:\Windows\SysWOW64\msnnmaneger.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1300
            • C:\Windows\SysWOW64\msnnmaneger.exe
              C:\Windows\SysWOW64\msnnmaneger.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1636
              • C:\Windows\SysWOW64\msnnmaneger.exe
                C:\Windows\system32\msnnmaneger.exe -bai C:\Windows\SysWOW64\msnnmaneger.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1912
                • C:\Windows\SysWOW64\msnnmaneger.exe
                  C:\Windows\SysWOW64\msnnmaneger.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1100
                  • C:\Windows\SysWOW64\msnnmaneger.exe
                    C:\Windows\system32\msnnmaneger.exe -bai C:\Windows\SysWOW64\msnnmaneger.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:1380
                    • C:\Windows\SysWOW64\msnnmaneger.exe
                      C:\Windows\SysWOW64\msnnmaneger.exe
                      10⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1812

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • C:\Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • C:\Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • C:\Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • C:\Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • C:\Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • C:\Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • C:\Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • C:\Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • \Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • \Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • \Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • \Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • \Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • \Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • \Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • \Windows\SysWOW64\msnnmaneger.exe

    Filesize

    203KB

    MD5

    d406f8e4f555b2ffe68f66aa2162c6a7

    SHA1

    c7e96ae10742d849fa2c3d79cce3f8f3bf4a30d1

    SHA256

    8ac8a90abd6e9ecec360a5051ea2de42dfe2d7c0ae95638c16a5dd9dab7e7fe6

    SHA512

    4233b71a60237c699ae2d1a6c53ceb9267878c2594853933f10dcdc316dc95e22d44ee5fcd4c0577298ab68cfb3047a00fc8d246e116900cd4e554db272f7c50

  • memory/684-65-0x0000000000000000-mapping.dmp

  • memory/1084-76-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1084-77-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1084-78-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1084-72-0x0000000000436A8E-mapping.dmp

  • memory/1084-83-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1100-108-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1100-107-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1100-113-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1100-102-0x0000000000436A8E-mapping.dmp

  • memory/1300-81-0x0000000000000000-mapping.dmp

  • memory/1380-111-0x0000000000000000-mapping.dmp

  • memory/1636-92-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1636-93-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1636-87-0x0000000000436A8E-mapping.dmp

  • memory/1636-98-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1716-59-0x00000000757E1000-0x00000000757E3000-memory.dmp

    Filesize

    8KB

  • memory/1716-61-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1716-54-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1716-60-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1716-63-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1716-67-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1716-56-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1716-57-0x0000000000436A8E-mapping.dmp

  • memory/1812-117-0x0000000000436A8E-mapping.dmp

  • memory/1812-122-0x0000000000400000-0x000000000103B000-memory.dmp

    Filesize

    12.2MB

  • memory/1912-96-0x0000000000000000-mapping.dmp