Analysis

  • max time kernel
    183s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 00:13

General

  • Target

    983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe

  • Size

    942KB

  • MD5

    f1a0acd80140c26ee554e3530b026769

  • SHA1

    f955a1332d53c869bd6d6dea70846ebccd0b826b

  • SHA256

    983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280

  • SHA512

    8c228c37b12abdd64dc6a1907ad53776710ec942f30fe2e8adc3d3eb35e261f683d0daa95d25cd83caaec961f69c5d45995cd1beaf9fa80a8a1ca5ef44adf544

  • SSDEEP

    24576:DyXehMSvLsJvH2+B72FH438X+fQiEXaZL1TtAXY:i0RwdP1mTX+f0g1Tt

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe
    "C:\Users\Admin\AppData\Local\Temp\983887ca0ff13c4c8c23656959a783b9292149e4b5c88a2be22cae961564a280.exe"
    1⤵
    • UAC bypass
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:1920

Network

MITRE ATT&CK Matrix ATT&CK v6

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\cmsetac.dll
    Filesize

    33KB

    MD5

    4b83c634c2bca1739998207254893cb6

    SHA1

    803ef8aacc48c1a232e363037f86b8ebc7d5282f

    SHA256

    cc0cbfd14d0d160d2b4e8d102c7ca24fdb882304ae283260823e6f6df2cedf23

    SHA512

    df8b9bb882e0072c39e69cb12526cb14cbd4a32b71b3ef9f2f2ccfdb246820a6f69a979d7ffd19697188e93dfb69317095ca542126d26dc66bacb29da36970dc

  • \Users\Admin\AppData\Local\Temp\ntdtcstp.dll
    Filesize

    7KB

    MD5

    67587e25a971a141628d7f07bd40ffa0

    SHA1

    76fcd014539a3bb247cc0b761225f68bd6055f6b

    SHA256

    e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378

    SHA512

    6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

  • memory/1920-54-0x0000000000400000-0x00000000005D9000-memory.dmp
    Filesize

    1.8MB

  • memory/1920-55-0x0000000076181000-0x0000000076183000-memory.dmp
    Filesize

    8KB

  • memory/1920-59-0x0000000000400000-0x00000000005D9000-memory.dmp
    Filesize

    1.8MB

  • memory/1920-60-0x0000000000400000-0x00000000005D9000-memory.dmp
    Filesize

    1.8MB

  • memory/1920-61-0x0000000000400000-0x00000000005D9000-memory.dmp
    Filesize

    1.8MB