Analysis
-
max time kernel
173s -
max time network
226s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 19:13
Static task
static1
Behavioral task
behavioral1
Sample
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe
Resource
win10v2004-20220901-en
General
-
Target
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe
-
Size
208KB
-
MD5
4927a3a1df5389d37c1a95739ccb5387
-
SHA1
965ba705589d2c31c0601251d9058f76ae29c4ab
-
SHA256
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904
-
SHA512
80d830ff61615ba51290ff223cfc48fd2f01e5ff90bd650786803cce412c9cd7511e238d0bd2646b823aefac1a37160491d55d4f356a37e7ccd0b2ce16ca0d1e
-
SSDEEP
1536:CQ3aRYR88QlK06jm8msj42bt75Zt+olKnUCy/2ufG8p6Q:0Kraw/+oUnUCOThwQ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 17 IoCs
Processes:
resource yara_rule behavioral1/memory/960-57-0x000000006EB00000-0x000000006EB18000-memory.dmp modiloader_stage2 behavioral1/memory/960-56-0x000000006EB00000-0x000000006EB18000-memory.dmp modiloader_stage2 behavioral1/memory/1468-61-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1468-62-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1468-63-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1468-64-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1468-65-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1468-67-0x00000000004082E8-mapping.dmp modiloader_stage2 behavioral1/memory/1468-69-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/960-68-0x000000006EB00000-0x000000006EB18000-memory.dmp modiloader_stage2 behavioral1/memory/1468-66-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1468-71-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1468-76-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1820-96-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/1100-93-0x000000006EB00000-0x000000006EB18000-memory.dmp modiloader_stage2 behavioral1/memory/1820-91-0x00000000004082E8-mapping.dmp modiloader_stage2 behavioral1/memory/1820-97-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
AdobeART.exeAdobeART.exepid process 1100 AdobeART.exe 1820 AdobeART.exe -
Processes:
resource yara_rule behavioral1/memory/960-54-0x000000006EB00000-0x000000006EB18000-memory.dmp upx behavioral1/memory/960-57-0x000000006EB00000-0x000000006EB18000-memory.dmp upx behavioral1/memory/960-56-0x000000006EB00000-0x000000006EB18000-memory.dmp upx behavioral1/memory/960-68-0x000000006EB00000-0x000000006EB18000-memory.dmp upx behavioral1/memory/1100-93-0x000000006EB00000-0x000000006EB18000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exepid process 1468 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 1468 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
AdobeART.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeART = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeART.exe" AdobeART.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exeAdobeART.exedescription pid process target process PID 960 set thread context of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 1100 set thread context of 1820 1100 AdobeART.exe AdobeART.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exeAdobeART.exedescription pid process target process PID 960 wrote to memory of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 960 wrote to memory of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 960 wrote to memory of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 960 wrote to memory of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 960 wrote to memory of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 960 wrote to memory of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 960 wrote to memory of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 960 wrote to memory of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 960 wrote to memory of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 960 wrote to memory of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 960 wrote to memory of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 960 wrote to memory of 1468 960 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 1468 wrote to memory of 1100 1468 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe AdobeART.exe PID 1468 wrote to memory of 1100 1468 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe AdobeART.exe PID 1468 wrote to memory of 1100 1468 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe AdobeART.exe PID 1468 wrote to memory of 1100 1468 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe AdobeART.exe PID 1100 wrote to memory of 1820 1100 AdobeART.exe AdobeART.exe PID 1100 wrote to memory of 1820 1100 AdobeART.exe AdobeART.exe PID 1100 wrote to memory of 1820 1100 AdobeART.exe AdobeART.exe PID 1100 wrote to memory of 1820 1100 AdobeART.exe AdobeART.exe PID 1100 wrote to memory of 1820 1100 AdobeART.exe AdobeART.exe PID 1100 wrote to memory of 1820 1100 AdobeART.exe AdobeART.exe PID 1100 wrote to memory of 1820 1100 AdobeART.exe AdobeART.exe PID 1100 wrote to memory of 1820 1100 AdobeART.exe AdobeART.exe PID 1100 wrote to memory of 1820 1100 AdobeART.exe AdobeART.exe PID 1100 wrote to memory of 1820 1100 AdobeART.exe AdobeART.exe PID 1100 wrote to memory of 1820 1100 AdobeART.exe AdobeART.exe PID 1100 wrote to memory of 1820 1100 AdobeART.exe AdobeART.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe"C:\Users\Admin\AppData\Local\Temp\7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exeC:\Users\Admin\AppData\Local\Temp\7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Roaming\AdobeART.exeC:\Users\Admin\AppData\Roaming\AdobeART.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1820
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD54927a3a1df5389d37c1a95739ccb5387
SHA1965ba705589d2c31c0601251d9058f76ae29c4ab
SHA2567f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904
SHA51280d830ff61615ba51290ff223cfc48fd2f01e5ff90bd650786803cce412c9cd7511e238d0bd2646b823aefac1a37160491d55d4f356a37e7ccd0b2ce16ca0d1e
-
Filesize
208KB
MD54927a3a1df5389d37c1a95739ccb5387
SHA1965ba705589d2c31c0601251d9058f76ae29c4ab
SHA2567f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904
SHA51280d830ff61615ba51290ff223cfc48fd2f01e5ff90bd650786803cce412c9cd7511e238d0bd2646b823aefac1a37160491d55d4f356a37e7ccd0b2ce16ca0d1e
-
Filesize
208KB
MD54927a3a1df5389d37c1a95739ccb5387
SHA1965ba705589d2c31c0601251d9058f76ae29c4ab
SHA2567f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904
SHA51280d830ff61615ba51290ff223cfc48fd2f01e5ff90bd650786803cce412c9cd7511e238d0bd2646b823aefac1a37160491d55d4f356a37e7ccd0b2ce16ca0d1e
-
Filesize
208KB
MD54927a3a1df5389d37c1a95739ccb5387
SHA1965ba705589d2c31c0601251d9058f76ae29c4ab
SHA2567f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904
SHA51280d830ff61615ba51290ff223cfc48fd2f01e5ff90bd650786803cce412c9cd7511e238d0bd2646b823aefac1a37160491d55d4f356a37e7ccd0b2ce16ca0d1e
-
Filesize
208KB
MD54927a3a1df5389d37c1a95739ccb5387
SHA1965ba705589d2c31c0601251d9058f76ae29c4ab
SHA2567f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904
SHA51280d830ff61615ba51290ff223cfc48fd2f01e5ff90bd650786803cce412c9cd7511e238d0bd2646b823aefac1a37160491d55d4f356a37e7ccd0b2ce16ca0d1e