Analysis
-
max time kernel
183s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 00:13
Behavioral task
behavioral1
Sample
983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe
Resource
win7-20220812-en
General
-
Target
983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe
-
Size
942KB
-
MD5
f1a0acd80140c26ee554e3530b026769
-
SHA1
f955a1332d53c869bd6d6dea70846ebccd0b826b
-
SHA256
983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280
-
SHA512
8c228c37b12abdd64dc6a1907ad53776710ec942f30fe2e8adc3d3eb35e261f683d0daa95d25cd83caaec961f69c5d45995cd1beaf9fa80a8a1ca5ef44adf544
-
SSDEEP
24576:DyXehMSvLsJvH2+B72FH438X+fQiEXaZL1TtAXY:i0RwdP1mTX+f0g1Tt
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Processes:
983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe -
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1920-59-0x0000000000400000-0x00000000005D9000-memory.dmp modiloader_stage2 behavioral1/memory/1920-60-0x0000000000400000-0x00000000005D9000-memory.dmp modiloader_stage2 behavioral1/memory/1920-61-0x0000000000400000-0x00000000005D9000-memory.dmp modiloader_stage2 -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Wine 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe -
Loads dropped DLL 2 IoCs
Processes:
983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exepid process 1920 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe 1920 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe -
Processes:
resource yara_rule behavioral1/memory/1920-54-0x0000000000400000-0x00000000005D9000-memory.dmp themida behavioral1/memory/1920-59-0x0000000000400000-0x00000000005D9000-memory.dmp themida behavioral1/memory/1920-60-0x0000000000400000-0x00000000005D9000-memory.dmp themida behavioral1/memory/1920-61-0x0000000000400000-0x00000000005D9000-memory.dmp themida -
Processes:
983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exepid process 1920 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exepid process 1920 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exedescription pid process Token: SeDebugPrivilege 1920 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe Token: SeDebugPrivilege 1920 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exepid process 1920 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe 1920 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe"C:\Users\Admin\AppData\Local\Temp\983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe"1⤵
- UAC bypass
- Identifies Wine through registry keys
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\cmsetac.dllFilesize
33KB
MD54b83c634c2bca1739998207254893cb6
SHA1803ef8aacc48c1a232e363037f86b8ebc7d5282f
SHA256cc0cbfd14d0d160d2b4e8d102c7ca24fdb882304ae283260823e6f6df2cedf23
SHA512df8b9bb882e0072c39e69cb12526cb14cbd4a32b71b3ef9f2f2ccfdb246820a6f69a979d7ffd19697188e93dfb69317095ca542126d26dc66bacb29da36970dc
-
\Users\Admin\AppData\Local\Temp\ntdtcstp.dllFilesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350
-
memory/1920-54-0x0000000000400000-0x00000000005D9000-memory.dmpFilesize
1.8MB
-
memory/1920-55-0x0000000076181000-0x0000000076183000-memory.dmpFilesize
8KB
-
memory/1920-59-0x0000000000400000-0x00000000005D9000-memory.dmpFilesize
1.8MB
-
memory/1920-60-0x0000000000400000-0x00000000005D9000-memory.dmpFilesize
1.8MB
-
memory/1920-61-0x0000000000400000-0x00000000005D9000-memory.dmpFilesize
1.8MB