Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 08:48
Static task
static1
Behavioral task
behavioral1
Sample
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe
Resource
win10v2004-20220812-en
General
-
Target
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe
-
Size
110KB
-
MD5
7a582409e283366413c50430e7904f4b
-
SHA1
bbe73b1346732596ddf93cde4863d356c2b7b776
-
SHA256
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418
-
SHA512
223c83445e77f27f93f12f3ac98c64e05b59f9a7c5cad68c3d06c36486e7ad8aafa95591bac254ca064f3e319df407e865b69e6688f445843c08ae4425f19ec2
-
SSDEEP
1536:+YKd0/JcdrcNHI7bu/83HjaQWTCCS64L5vijrNw2XFfphlwG7z9/bSZvzsiQwSd+:JKP9/ZqT/2qJphlHf9/bS9zsrwS8
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 12 IoCs
Processes:
resource yara_rule behavioral1/memory/1904-59-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1904-61-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1904-64-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1904-67-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1904-69-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1904-71-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1904-73-0x00000000004082E8-mapping.dmp modiloader_stage2 behavioral1/memory/1904-75-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1904-80-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1996-109-0x00000000004082E8-mapping.dmp modiloader_stage2 behavioral1/memory/1996-113-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1996-114-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
Windows.exeWindows.exepid process 1780 Windows.exe 1996 Windows.exe -
Loads dropped DLL 1 IoCs
Processes:
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exepid process 1904 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe ART = "C:\\Users\\Admin\\AppData\\Roaming\\Windows.exe" Windows.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exeWindows.exedescription pid process target process PID 960 set thread context of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 1780 set thread context of 1996 1780 Windows.exe Windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D23209AD23D314232174E40D7F9D62139786633A\Blob = 190000000100000010000000245da98c555bf83ff1fe3fd14bd1794c030000000100000014000000d23209ad23d314232174e40d7f9d62139786633a1d000000010000001000000075174f59ab5494f27554ba970a52ae6f0b0000000100000012000000470065006f0054007200750073007400000014000000010000001400000048e668f92bd2b295d747d82320104f3398909fd4090000000100000020000000301e06082b0601050507030406082b0601050507030106082b060105050703035300000001000000230000003021301f06092b06010401f022010630123010060a2b0601040182373c0101030200c00f0000000100000014000000ffa3ac0084da1673b5a031ebb2156b3e8fbbf6d82000000001000000240300003082032030820289a003020102020435def4cf300d06092a864886f70d0101050500304e310b30090603550406130255533110300e060355040a130745717569666178312d302b060355040b1324457175696661782053656375726520436572746966696361746520417574686f72697479301e170d3938303832323136343135315a170d3138303832323136343135315a304e310b30090603550406130255533110300e060355040a130745717569666178312d302b060355040b1324457175696661782053656375726520436572746966696361746520417574686f7269747930819f300d06092a864886f70d010101050003818d0030818902818100c15db158670862eea09a2d1f086d911468980a1efeda046f13846221c3d17cce9f05e0b801f04e34ece28a950464acf16b535f05b3cb6780bf42028efedd0109ece100144ffcfbf00cdd43ba5b2be11f80709915579316f10f976ab7c268231ccc4d5930ac511e3baf2bd6ee63457bc5d95f50d2e3500f3a88e7bf14fde0c7b90203010001a38201093082010530700603551d1f046930673065a063a061a45f305d310b30090603550406130255533110300e060355040a130745717569666178312d302b060355040b1324457175696661782053656375726520436572746966696361746520417574686f72697479310d300b0603550403130443524c31301a0603551d1004133011810f32303138303832323136343135315a300b0603551d0f040403020106301f0603551d2304183016801448e668f92bd2b295d747d82320104f3398909fd4301d0603551d0e0416041448e668f92bd2b295d747d82320104f3398909fd4300c0603551d13040530030101ff301a06092a864886f67d074100040d300b1b0556332e3063030206c0300d06092a864886f70d01010505000381810058ce29eafcf7deb5ce02b917b585d1b9e3e095cc25310d00a6926e7fb692639e5095d19a6fe411de63856e98eea8ff5ac8d355b2667157dec021eb3d2aa72349010486427bfcee7fa21652b56767d340db3b2658b228773dae147761d6fa2a6627a00dfaa7735cea70f1942165445ffafcef2968a9a28779ef79ef4fac077738 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D23209AD23D314232174E40D7F9D62139786633A\Blob = 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 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D23209AD23D314232174E40D7F9D62139786633A 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D23209AD23D314232174E40D7F9D62139786633A\Blob = 0f0000000100000014000000ffa3ac0084da1673b5a031ebb2156b3e8fbbf6d85300000001000000230000003021301f06092b06010401f022010630123010060a2b0601040182373c0101030200c0090000000100000020000000301e06082b0601050507030406082b0601050507030106082b0601050507030314000000010000001400000048e668f92bd2b295d747d82320104f3398909fd40b0000000100000012000000470065006f005400720075007300740000001d000000010000001000000075174f59ab5494f27554ba970a52ae6f030000000100000014000000d23209ad23d314232174e40d7f9d62139786633a2000000001000000240300003082032030820289a003020102020435def4cf300d06092a864886f70d0101050500304e310b30090603550406130255533110300e060355040a130745717569666178312d302b060355040b1324457175696661782053656375726520436572746966696361746520417574686f72697479301e170d3938303832323136343135315a170d3138303832323136343135315a304e310b30090603550406130255533110300e060355040a130745717569666178312d302b060355040b1324457175696661782053656375726520436572746966696361746520417574686f7269747930819f300d06092a864886f70d010101050003818d0030818902818100c15db158670862eea09a2d1f086d911468980a1efeda046f13846221c3d17cce9f05e0b801f04e34ece28a950464acf16b535f05b3cb6780bf42028efedd0109ece100144ffcfbf00cdd43ba5b2be11f80709915579316f10f976ab7c268231ccc4d5930ac511e3baf2bd6ee63457bc5d95f50d2e3500f3a88e7bf14fde0c7b90203010001a38201093082010530700603551d1f046930673065a063a061a45f305d310b30090603550406130255533110300e060355040a130745717569666178312d302b060355040b1324457175696661782053656375726520436572746966696361746520417574686f72697479310d300b0603550403130443524c31301a0603551d1004133011810f32303138303832323136343135315a300b0603551d0f040403020106301f0603551d2304183016801448e668f92bd2b295d747d82320104f3398909fd4301d0603551d0e0416041448e668f92bd2b295d747d82320104f3398909fd4300c0603551d13040530030101ff301a06092a864886f67d074100040d300b1b0556332e3063030206c0300d06092a864886f70d01010505000381810058ce29eafcf7deb5ce02b917b585d1b9e3e095cc25310d00a6926e7fb692639e5095d19a6fe411de63856e98eea8ff5ac8d355b2667157dec021eb3d2aa72349010486427bfcee7fa21652b56767d340db3b2658b228773dae147761d6fa2a6627a00dfaa7735cea70f1942165445ffafcef2968a9a28779ef79ef4fac077738 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exeWindows.exedescription pid process target process PID 960 wrote to memory of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 960 wrote to memory of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 960 wrote to memory of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 960 wrote to memory of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 960 wrote to memory of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 960 wrote to memory of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 960 wrote to memory of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 960 wrote to memory of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 960 wrote to memory of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 960 wrote to memory of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 960 wrote to memory of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 960 wrote to memory of 1904 960 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 1904 wrote to memory of 1780 1904 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Windows.exe PID 1904 wrote to memory of 1780 1904 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Windows.exe PID 1904 wrote to memory of 1780 1904 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Windows.exe PID 1904 wrote to memory of 1780 1904 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Windows.exe PID 1780 wrote to memory of 1996 1780 Windows.exe Windows.exe PID 1780 wrote to memory of 1996 1780 Windows.exe Windows.exe PID 1780 wrote to memory of 1996 1780 Windows.exe Windows.exe PID 1780 wrote to memory of 1996 1780 Windows.exe Windows.exe PID 1780 wrote to memory of 1996 1780 Windows.exe Windows.exe PID 1780 wrote to memory of 1996 1780 Windows.exe Windows.exe PID 1780 wrote to memory of 1996 1780 Windows.exe Windows.exe PID 1780 wrote to memory of 1996 1780 Windows.exe Windows.exe PID 1780 wrote to memory of 1996 1780 Windows.exe Windows.exe PID 1780 wrote to memory of 1996 1780 Windows.exe Windows.exe PID 1780 wrote to memory of 1996 1780 Windows.exe Windows.exe PID 1780 wrote to memory of 1996 1780 Windows.exe Windows.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe"C:\Users\Admin\AppData\Local\Temp\1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe"C:\Users\Admin\AppData\Local\Temp\1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Roaming\Windows.exe"C:\Users\Admin\AppData\Roaming\Windows.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Roaming\Windows.exe"C:\Users\Admin\AppData\Roaming\Windows.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1996
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282B
MD5a05f2d11accfe2c70fffb3bf42fae2fd
SHA11d6be4dcc9684837372ae13ff6df40b827dfd61e
SHA2566647467e6737e869a92ebaf41d2dfdbee2603b342ab333ad21a732475947fe03
SHA512051318f30e014d23f3f583cb056f55c87c28ae8331346ed58892b0997560db111e0f087f1d35786505662461a9aad13c7dddec54b95134ba3fb1b285e55c61df
-
Filesize
482B
MD5205574b2d2dfa9772ce77a7018885997
SHA1224cf3a00318114e949ab842674c2a406b0ff3a2
SHA25672d4d4f7d7b25a6aaeefaa592586020f700367056ca307fdee78939e48141707
SHA51245810da5a11fc7dd2c9019021e18d76235f3f0e5c6be584bc6f1d8dfc06e528d605ef17602b9a675c87bb5dc27160186ce8b1067503e580e7ab92cd926df70ef
-
Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
Filesize
1KB
MD5dd26119303e3c4ea05f40462696639b9
SHA1f9fd9460ddd338e198eb055d622f3be9027619ce
SHA2564819742053c1172af18fe9427a8a5620060f9a098113ebc6aa4ef31672b4bcd1
SHA512971b05595b37077b1dcca734e284a13b4a8585f71a367767a1032d59f619aa5e97e3285cdb3899df6b49f80cbf0111ac69c488567492ff9105bef7d3be283586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\23B523C9E7746F715D33C6527C18EB9D
Filesize200B
MD57af7f35f3160dc667a2ab228057e0183
SHA17664382ca18a7c370f49865ae89595ef0b5c76a8
SHA256da6df93785875c29afb530083f84baafd8f87fc69e92ea058ea7b359991a5693
SHA5126f94fe234dd190b597912fb8e86ab24fc721c432ccd5fd12a98b1de77762befd9a2490d83b2b69ae61c97408f95e3b4dc87c9cbeb898fa37d558dbaf978d5760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B7AED56F69397028F35E77E6DD681FC
Filesize344B
MD5cd69d627abcbf4208cdac8dca7b38614
SHA1f540f550281cc06af9dc9055ff98e9fa77846e2b
SHA2563d900fc03e432a2c3fa3f3c8b3d6273a454f93cd5aef110353e36062b6ee146d
SHA512e2dfbf8d894d2c888e42bd51d49ddcdecf0d8a26a90acd5d6659fb792b17c50c4e0a47f38235d9a5362c830c503af9959b06cccf6288ca689f3f6e945a7ea455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e46cc77007869e6e21c176242eba4b41
SHA19fbb83379c0b05141783f3da795f3adf93ed3581
SHA256fedf38987136879d7f58aee82aeff0cd636ff069a000497c153f92be58225801
SHA5128a5800ed7d42bbd50e905669f6bf84cffe0f6370f028b621ee9be80c67aeeb97de0de36abb5e11a52763556aaab771cba1730bc32de41a4f529ef7591fe9f9a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F72943F1E01540BBACB5396C76DD6AAA
Filesize362B
MD5d15d984d342c93689e4f5c28fd573d9a
SHA1c1740f80772d23fbe58a931094102d109d9d269f
SHA256c6100c3bd1c11ae64241ae203b8e5edf8fcdfbb5a75439d3f0719463ae981448
SHA512c3c59ed2d1f5fb48ad88f602b5e2282b45201f0a2351b8adc62cfa2444a5aaafb23ebc28c742d50260b0b11213e3c134abbb3cf7c294be8088ef957096ea2c01
-
Filesize
110KB
MD57a582409e283366413c50430e7904f4b
SHA1bbe73b1346732596ddf93cde4863d356c2b7b776
SHA2561044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418
SHA512223c83445e77f27f93f12f3ac98c64e05b59f9a7c5cad68c3d06c36486e7ad8aafa95591bac254ca064f3e319df407e865b69e6688f445843c08ae4425f19ec2
-
Filesize
110KB
MD57a582409e283366413c50430e7904f4b
SHA1bbe73b1346732596ddf93cde4863d356c2b7b776
SHA2561044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418
SHA512223c83445e77f27f93f12f3ac98c64e05b59f9a7c5cad68c3d06c36486e7ad8aafa95591bac254ca064f3e319df407e865b69e6688f445843c08ae4425f19ec2
-
Filesize
110KB
MD57a582409e283366413c50430e7904f4b
SHA1bbe73b1346732596ddf93cde4863d356c2b7b776
SHA2561044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418
SHA512223c83445e77f27f93f12f3ac98c64e05b59f9a7c5cad68c3d06c36486e7ad8aafa95591bac254ca064f3e319df407e865b69e6688f445843c08ae4425f19ec2
-
Filesize
110KB
MD57a582409e283366413c50430e7904f4b
SHA1bbe73b1346732596ddf93cde4863d356c2b7b776
SHA2561044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418
SHA512223c83445e77f27f93f12f3ac98c64e05b59f9a7c5cad68c3d06c36486e7ad8aafa95591bac254ca064f3e319df407e865b69e6688f445843c08ae4425f19ec2