Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 19:13
Static task
static1
Behavioral task
behavioral1
Sample
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe
Resource
win10v2004-20220901-en
General
-
Target
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe
-
Size
208KB
-
MD5
4927a3a1df5389d37c1a95739ccb5387
-
SHA1
965ba705589d2c31c0601251d9058f76ae29c4ab
-
SHA256
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904
-
SHA512
80d830ff61615ba51290ff223cfc48fd2f01e5ff90bd650786803cce412c9cd7511e238d0bd2646b823aefac1a37160491d55d4f356a37e7ccd0b2ce16ca0d1e
-
SSDEEP
1536:CQ3aRYR88QlK06jm8msj42bt75Zt+olKnUCy/2ufG8p6Q:0Kraw/+oUnUCOThwQ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 10 IoCs
Processes:
resource yara_rule behavioral2/memory/4868-134-0x000000006EB00000-0x000000006EB18000-memory.dmp modiloader_stage2 behavioral2/memory/4868-135-0x000000006EB00000-0x000000006EB18000-memory.dmp modiloader_stage2 behavioral2/memory/3088-137-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/3088-138-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4868-139-0x000000006EB00000-0x000000006EB18000-memory.dmp modiloader_stage2 behavioral2/memory/3088-140-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/3088-141-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/3088-145-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/528-154-0x000000006EB00000-0x000000006EB18000-memory.dmp modiloader_stage2 behavioral2/memory/504-156-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
AdobeART.exeAdobeART.exepid process 528 AdobeART.exe 504 AdobeART.exe -
Processes:
resource yara_rule behavioral2/memory/4868-132-0x000000006EB00000-0x000000006EB18000-memory.dmp upx behavioral2/memory/4868-134-0x000000006EB00000-0x000000006EB18000-memory.dmp upx behavioral2/memory/4868-135-0x000000006EB00000-0x000000006EB18000-memory.dmp upx behavioral2/memory/4868-139-0x000000006EB00000-0x000000006EB18000-memory.dmp upx behavioral2/memory/528-154-0x000000006EB00000-0x000000006EB18000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
AdobeART.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeART = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeART.exe" AdobeART.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exeAdobeART.exedescription pid process target process PID 4868 set thread context of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 528 set thread context of 504 528 AdobeART.exe AdobeART.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exeAdobeART.exedescription pid process target process PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 4868 wrote to memory of 3088 4868 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe PID 3088 wrote to memory of 528 3088 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe AdobeART.exe PID 3088 wrote to memory of 528 3088 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe AdobeART.exe PID 3088 wrote to memory of 528 3088 7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe PID 528 wrote to memory of 504 528 AdobeART.exe AdobeART.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe"C:\Users\Admin\AppData\Local\Temp\7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exeC:\Users\Admin\AppData\Local\Temp\7f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Roaming\AdobeART.exeC:\Users\Admin\AppData\Roaming\AdobeART.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:504
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD54927a3a1df5389d37c1a95739ccb5387
SHA1965ba705589d2c31c0601251d9058f76ae29c4ab
SHA2567f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904
SHA51280d830ff61615ba51290ff223cfc48fd2f01e5ff90bd650786803cce412c9cd7511e238d0bd2646b823aefac1a37160491d55d4f356a37e7ccd0b2ce16ca0d1e
-
Filesize
208KB
MD54927a3a1df5389d37c1a95739ccb5387
SHA1965ba705589d2c31c0601251d9058f76ae29c4ab
SHA2567f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904
SHA51280d830ff61615ba51290ff223cfc48fd2f01e5ff90bd650786803cce412c9cd7511e238d0bd2646b823aefac1a37160491d55d4f356a37e7ccd0b2ce16ca0d1e
-
Filesize
208KB
MD54927a3a1df5389d37c1a95739ccb5387
SHA1965ba705589d2c31c0601251d9058f76ae29c4ab
SHA2567f323ffd1201c904072af39cd2d0f99a62eee2c87d434f2e5aff45075745c904
SHA51280d830ff61615ba51290ff223cfc48fd2f01e5ff90bd650786803cce412c9cd7511e238d0bd2646b823aefac1a37160491d55d4f356a37e7ccd0b2ce16ca0d1e