Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 08:48
Static task
static1
Behavioral task
behavioral1
Sample
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe
Resource
win10v2004-20220812-en
General
-
Target
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe
-
Size
110KB
-
MD5
7a582409e283366413c50430e7904f4b
-
SHA1
bbe73b1346732596ddf93cde4863d356c2b7b776
-
SHA256
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418
-
SHA512
223c83445e77f27f93f12f3ac98c64e05b59f9a7c5cad68c3d06c36486e7ad8aafa95591bac254ca064f3e319df407e865b69e6688f445843c08ae4425f19ec2
-
SSDEEP
1536:+YKd0/JcdrcNHI7bu/83HjaQWTCCS64L5vijrNw2XFfphlwG7z9/bSZvzsiQwSd+:JKP9/ZqT/2qJphlHf9/bS9zsrwS8
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 13 IoCs
Processes:
resource yara_rule behavioral2/memory/4272-133-0x0000000000000000-mapping.dmp modiloader_stage2 behavioral2/memory/4272-134-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4272-135-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4272-137-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4272-139-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4272-140-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4272-141-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4272-143-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4272-145-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/316-151-0x0000000000000000-mapping.dmp modiloader_stage2 behavioral2/memory/316-162-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/316-163-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/316-165-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
Windows.exeWindows.exepid process 1764 Windows.exe 316 Windows.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe ART = "C:\\Users\\Admin\\AppData\\Roaming\\Windows.exe" Windows.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exeWindows.exedescription pid process target process PID 4868 set thread context of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 1764 set thread context of 316 1764 Windows.exe Windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D23209AD23D314232174E40D7F9D62139786633A\Blob = 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 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D23209AD23D314232174E40D7F9D62139786633A\Blob = 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 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D23209AD23D314232174E40D7F9D62139786633A\Blob = 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 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D23209AD23D314232174E40D7F9D62139786633A 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D23209AD23D314232174E40D7F9D62139786633A\Blob = 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 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exeWindows.exedescription pid process target process PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4868 wrote to memory of 4272 4868 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe PID 4272 wrote to memory of 1764 4272 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Windows.exe PID 4272 wrote to memory of 1764 4272 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Windows.exe PID 4272 wrote to memory of 1764 4272 1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe PID 1764 wrote to memory of 316 1764 Windows.exe Windows.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe"C:\Users\Admin\AppData\Local\Temp\1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe"C:\Users\Admin\AppData\Local\Temp\1044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Roaming\Windows.exe"C:\Users\Admin\AppData\Roaming\Windows.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Roaming\Windows.exe"C:\Users\Admin\AppData\Roaming\Windows.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:316
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD57a582409e283366413c50430e7904f4b
SHA1bbe73b1346732596ddf93cde4863d356c2b7b776
SHA2561044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418
SHA512223c83445e77f27f93f12f3ac98c64e05b59f9a7c5cad68c3d06c36486e7ad8aafa95591bac254ca064f3e319df407e865b69e6688f445843c08ae4425f19ec2
-
Filesize
110KB
MD57a582409e283366413c50430e7904f4b
SHA1bbe73b1346732596ddf93cde4863d356c2b7b776
SHA2561044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418
SHA512223c83445e77f27f93f12f3ac98c64e05b59f9a7c5cad68c3d06c36486e7ad8aafa95591bac254ca064f3e319df407e865b69e6688f445843c08ae4425f19ec2
-
Filesize
110KB
MD57a582409e283366413c50430e7904f4b
SHA1bbe73b1346732596ddf93cde4863d356c2b7b776
SHA2561044497578095523c650c847a7fa04358d1454f66188b6fc1893b31a3747a418
SHA512223c83445e77f27f93f12f3ac98c64e05b59f9a7c5cad68c3d06c36486e7ad8aafa95591bac254ca064f3e319df407e865b69e6688f445843c08ae4425f19ec2