Analysis

  • max time kernel
    147s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 05:44

General

  • Target

    d08128d1668185936a409284aacbdfed84d2127e15adbe4b3d1a39de37ac054a.exe

  • Size

    429KB

  • MD5

    0de9d536408cc6b64279fe61647a9a3b

  • SHA1

    63fa4bedbe88536a6d5dcc059e2930733b8806bb

  • SHA256

    d08128d1668185936a409284aacbdfed84d2127e15adbe4b3d1a39de37ac054a

  • SHA512

    0c671cdf13df64692c64d43f30f864870657c5d43906c6497a06bc6035012c8dea7bf43541cb3744c484fe77979cb6bba57f0502a400bbc66bcf3d2a53b359dd

  • SSDEEP

    6144:sWrauokkwa+lHZcQHAB4+6qdrK4gt5MNsXhmwQXwRItnjqXoVYzlEp3e8o:uuox34a24gXM2hmwcwRItjqxzg3e

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d08128d1668185936a409284aacbdfed84d2127e15adbe4b3d1a39de37ac054a.exe
    "C:\Users\Admin\AppData\Local\Temp\d08128d1668185936a409284aacbdfed84d2127e15adbe4b3d1a39de37ac054a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\serve turco.exe
      "C:\Users\Admin\AppData\Local\Temp\serve turco.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Windows\mstwain32.exe
        "C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\serve turco.exe"
        3⤵
        • UAC bypass
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:668
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:112
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\as-mais-gostosas-mulheres.jpg

    Filesize

    31KB

    MD5

    243aecd2164baac920a005520a712172

    SHA1

    a6e7ceed6089f218acf600b238a445d3f623e05d

    SHA256

    8cc18a371e6ed29f91ef55ca924f29c21f91025d97926c0dea238f9c86834483

    SHA512

    a4cad2ce3ec029aa967dac7d05163493d398bf478b804a5dedb6a7f27f735bbf519df014ceda2aa98255604c98d6cd5a7f76c7116c6d013c2903395532ca8080

  • C:\Users\Admin\AppData\Local\Temp\serve turco.exe

    Filesize

    270KB

    MD5

    ea018561e6a70e6fce6329699637f18d

    SHA1

    0fbf42e058a799ac7cab1f9d3a67303476aad86b

    SHA256

    fe03c4b0ce216a0f14550418bbceea2e02efbc130e0da7e64482d7cf13d2359f

    SHA512

    cb2f7949356fd5c3b55943652d10d945ef47503557f27befff93a89351ff7d7bfc0fce54ce1d077bcfbac7e58690ae4ff948c2d8b338ddba5053fb90208fdefa

  • C:\Users\Admin\AppData\Local\Temp\serve turco.exe

    Filesize

    270KB

    MD5

    ea018561e6a70e6fce6329699637f18d

    SHA1

    0fbf42e058a799ac7cab1f9d3a67303476aad86b

    SHA256

    fe03c4b0ce216a0f14550418bbceea2e02efbc130e0da7e64482d7cf13d2359f

    SHA512

    cb2f7949356fd5c3b55943652d10d945ef47503557f27befff93a89351ff7d7bfc0fce54ce1d077bcfbac7e58690ae4ff948c2d8b338ddba5053fb90208fdefa

  • C:\Windows\mstwain32.exe

    Filesize

    270KB

    MD5

    ea018561e6a70e6fce6329699637f18d

    SHA1

    0fbf42e058a799ac7cab1f9d3a67303476aad86b

    SHA256

    fe03c4b0ce216a0f14550418bbceea2e02efbc130e0da7e64482d7cf13d2359f

    SHA512

    cb2f7949356fd5c3b55943652d10d945ef47503557f27befff93a89351ff7d7bfc0fce54ce1d077bcfbac7e58690ae4ff948c2d8b338ddba5053fb90208fdefa

  • \Users\Admin\AppData\Local\Temp\serve turco.exe

    Filesize

    270KB

    MD5

    ea018561e6a70e6fce6329699637f18d

    SHA1

    0fbf42e058a799ac7cab1f9d3a67303476aad86b

    SHA256

    fe03c4b0ce216a0f14550418bbceea2e02efbc130e0da7e64482d7cf13d2359f

    SHA512

    cb2f7949356fd5c3b55943652d10d945ef47503557f27befff93a89351ff7d7bfc0fce54ce1d077bcfbac7e58690ae4ff948c2d8b338ddba5053fb90208fdefa

  • \Users\Admin\AppData\Local\Temp\serve turco.exe

    Filesize

    270KB

    MD5

    ea018561e6a70e6fce6329699637f18d

    SHA1

    0fbf42e058a799ac7cab1f9d3a67303476aad86b

    SHA256

    fe03c4b0ce216a0f14550418bbceea2e02efbc130e0da7e64482d7cf13d2359f

    SHA512

    cb2f7949356fd5c3b55943652d10d945ef47503557f27befff93a89351ff7d7bfc0fce54ce1d077bcfbac7e58690ae4ff948c2d8b338ddba5053fb90208fdefa

  • \Users\Admin\AppData\Local\Temp\serve turco.exe

    Filesize

    270KB

    MD5

    ea018561e6a70e6fce6329699637f18d

    SHA1

    0fbf42e058a799ac7cab1f9d3a67303476aad86b

    SHA256

    fe03c4b0ce216a0f14550418bbceea2e02efbc130e0da7e64482d7cf13d2359f

    SHA512

    cb2f7949356fd5c3b55943652d10d945ef47503557f27befff93a89351ff7d7bfc0fce54ce1d077bcfbac7e58690ae4ff948c2d8b338ddba5053fb90208fdefa

  • memory/668-69-0x00000000005A0000-0x00000000005AE000-memory.dmp

    Filesize

    56KB

  • memory/668-66-0x0000000000000000-mapping.dmp

  • memory/1608-59-0x0000000000000000-mapping.dmp

  • memory/2044-61-0x0000000074D80000-0x000000007532B000-memory.dmp

    Filesize

    5.7MB

  • memory/2044-54-0x0000000075F81000-0x0000000075F83000-memory.dmp

    Filesize

    8KB

  • memory/2044-55-0x0000000074D80000-0x000000007532B000-memory.dmp

    Filesize

    5.7MB