Analysis
-
max time kernel
132s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 16:48
Static task
static1
Behavioral task
behavioral1
Sample
1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe
Resource
win10v2004-20220812-en
General
-
Target
1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe
-
Size
796KB
-
MD5
cc1f35abf0ac45512c14e9e5e9d89d88
-
SHA1
37f75a3c110580bc12f49b79866bf59215b71682
-
SHA256
1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1
-
SHA512
35b498bc14a0d6fdeccf6efae8cbb6c2ca097ada6108d68b166e1be1148ab33c94db50ccacbc7f52f093f1eba2900cea461385da10d820856703ecb6cbf31e34
-
SSDEEP
12288:khkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4a90+9paqledIne/Ny:8RmJkcoQricOIQxiZY1ia90Nef
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1868-136-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 behavioral2/memory/1868-137-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 behavioral2/memory/1868-141-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 behavioral2/memory/4904-147-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 behavioral2/memory/4904-148-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 behavioral2/memory/4904-149-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 4444 svchost.exe 4904 svchost.exe -
Processes:
resource yara_rule behavioral2/memory/1868-133-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1868-135-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1868-136-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1868-137-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1868-141-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4904-146-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4904-147-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4904-148-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4904-149-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows live = "C:\\Users\\Admin\\Documents\\Windows\\svchost.exe" svchost.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\Documents\Windows\svchost.exe autoit_exe C:\Users\Admin\Documents\Windows\svchost.exe autoit_exe C:\Users\Admin\Documents\Windows\svchost.exe autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exesvchost.exedescription pid process target process PID 4512 set thread context of 1868 4512 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe PID 4444 set thread context of 4904 4444 svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exesvchost.exedescription pid process target process PID 4512 wrote to memory of 1868 4512 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe PID 4512 wrote to memory of 1868 4512 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe PID 4512 wrote to memory of 1868 4512 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe PID 4512 wrote to memory of 1868 4512 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe PID 4512 wrote to memory of 1868 4512 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe PID 1868 wrote to memory of 4444 1868 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe svchost.exe PID 1868 wrote to memory of 4444 1868 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe svchost.exe PID 1868 wrote to memory of 4444 1868 1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe svchost.exe PID 4444 wrote to memory of 4904 4444 svchost.exe svchost.exe PID 4444 wrote to memory of 4904 4444 svchost.exe svchost.exe PID 4444 wrote to memory of 4904 4444 svchost.exe svchost.exe PID 4444 wrote to memory of 4904 4444 svchost.exe svchost.exe PID 4444 wrote to memory of 4904 4444 svchost.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe"C:\Users\Admin\AppData\Local\Temp\1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe"C:\Users\Admin\AppData\Local\Temp\1c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\Documents\Windows\svchost.exe"C:\Users\Admin\Documents\Windows\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\Documents\Windows\svchost.exe"C:\Users\Admin\Documents\Windows\svchost.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4904
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796KB
MD5cc1f35abf0ac45512c14e9e5e9d89d88
SHA137f75a3c110580bc12f49b79866bf59215b71682
SHA2561c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1
SHA51235b498bc14a0d6fdeccf6efae8cbb6c2ca097ada6108d68b166e1be1148ab33c94db50ccacbc7f52f093f1eba2900cea461385da10d820856703ecb6cbf31e34
-
Filesize
796KB
MD5cc1f35abf0ac45512c14e9e5e9d89d88
SHA137f75a3c110580bc12f49b79866bf59215b71682
SHA2561c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1
SHA51235b498bc14a0d6fdeccf6efae8cbb6c2ca097ada6108d68b166e1be1148ab33c94db50ccacbc7f52f093f1eba2900cea461385da10d820856703ecb6cbf31e34
-
Filesize
796KB
MD5cc1f35abf0ac45512c14e9e5e9d89d88
SHA137f75a3c110580bc12f49b79866bf59215b71682
SHA2561c569d8d5c81aa78f132a3f26430c35a166a16c11d8d3347f5d67a7dccdf90b1
SHA51235b498bc14a0d6fdeccf6efae8cbb6c2ca097ada6108d68b166e1be1148ab33c94db50ccacbc7f52f093f1eba2900cea461385da10d820856703ecb6cbf31e34