Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 12:22

General

  • Target

    ad31048d42c4b63281d73f41d6befd5d782dec5f22ba0bbe649a1e1986694244.exe

  • Size

    2.6MB

  • MD5

    3b7642e3ef34792b3b3fc9ad645cb859

  • SHA1

    bf7071e79b4f88dc64c3c009463138cfd9e08efa

  • SHA256

    ad31048d42c4b63281d73f41d6befd5d782dec5f22ba0bbe649a1e1986694244

  • SHA512

    c070a482f5e52dfb0c3023cbde80ed13a818fc73b886abddeace65027c287843b649961388615c79fdb3078c36e69d882e66f5cdc04a155136106584508ffdee

  • SSDEEP

    49152:fH67ac//////RTZsIFKISs0kI6hvBBirm0zPo2yx9si8D+hRaJC50u3NFwp:fH67ac//////3Ys0ohBl0jIsTDWRx5tg

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad31048d42c4b63281d73f41d6befd5d782dec5f22ba0bbe649a1e1986694244.exe
    "C:\Users\Admin\AppData\Local\Temp\ad31048d42c4b63281d73f41d6befd5d782dec5f22ba0bbe649a1e1986694244.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\±ùÌì¼ÓËÙ1.43.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Users\Admin\AppData\Local\Temp\±ùÌì¼ÓËÙ1.43.exe
        C:\Users\Admin\AppData\Local\Temp\±ùÌì¼ÓËÙ1.43.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1984
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\Sx_server.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\Sx_server.exe
        C:\Users\Admin\AppData\Local\Temp\Sx_server.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2024
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          4⤵
            PID:580

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Sx_server.exe
      Filesize

      678KB

      MD5

      abe51f872846286ab19d98048523c74b

      SHA1

      f32e206a28b07454a898caabba04ad5a90df3674

      SHA256

      3571b5479c6d7eeb4b2ae6e5a41a4bf7f9237029ef1e7a13bcd68f514fa93376

      SHA512

      97e55ed6dd7e859b6eef6a9b48dd4494adabcb9fe64c094cd57de5161ba96c90068d1a5c440ae3ed04cee88de4a94b9900de78d94f21a2fadb62deb078ee8f14

    • C:\Users\Admin\AppData\Local\Temp\Sx_server.exe
      Filesize

      678KB

      MD5

      abe51f872846286ab19d98048523c74b

      SHA1

      f32e206a28b07454a898caabba04ad5a90df3674

      SHA256

      3571b5479c6d7eeb4b2ae6e5a41a4bf7f9237029ef1e7a13bcd68f514fa93376

      SHA512

      97e55ed6dd7e859b6eef6a9b48dd4494adabcb9fe64c094cd57de5161ba96c90068d1a5c440ae3ed04cee88de4a94b9900de78d94f21a2fadb62deb078ee8f14

    • C:\Users\Admin\AppData\Local\Temp\±ùÌì¼ÓËÙ1.43.exe
      Filesize

      1.5MB

      MD5

      a0f0a2390211ce1102eeb46f8e50133f

      SHA1

      5c861caa1b5c7122b0dd01fb952303cdd4c77483

      SHA256

      9ab1ae9797c0e3697fc0effb7ea72d44b5ff45a6833e900dc6c6b30a8aa3a3f4

      SHA512

      0c0b8997db623d59c33cb7f38a9cacaa87b11de3cf92132d843c37382848966095485d6a3d997640ab9c1527d8f22190d3166dd8edfdac770e6a8547cf47a232

    • C:\Users\Admin\AppData\Local\Temp\±ùÌì¼ÓËÙ1.43.exe
      Filesize

      1.5MB

      MD5

      a0f0a2390211ce1102eeb46f8e50133f

      SHA1

      5c861caa1b5c7122b0dd01fb952303cdd4c77483

      SHA256

      9ab1ae9797c0e3697fc0effb7ea72d44b5ff45a6833e900dc6c6b30a8aa3a3f4

      SHA512

      0c0b8997db623d59c33cb7f38a9cacaa87b11de3cf92132d843c37382848966095485d6a3d997640ab9c1527d8f22190d3166dd8edfdac770e6a8547cf47a232

    • \Users\Admin\AppData\Local\Temp\Sx_server.exe
      Filesize

      678KB

      MD5

      abe51f872846286ab19d98048523c74b

      SHA1

      f32e206a28b07454a898caabba04ad5a90df3674

      SHA256

      3571b5479c6d7eeb4b2ae6e5a41a4bf7f9237029ef1e7a13bcd68f514fa93376

      SHA512

      97e55ed6dd7e859b6eef6a9b48dd4494adabcb9fe64c094cd57de5161ba96c90068d1a5c440ae3ed04cee88de4a94b9900de78d94f21a2fadb62deb078ee8f14

    • \Users\Admin\AppData\Local\Temp\±ùÌì¼ÓËÙ1.43.exe
      Filesize

      1.5MB

      MD5

      a0f0a2390211ce1102eeb46f8e50133f

      SHA1

      5c861caa1b5c7122b0dd01fb952303cdd4c77483

      SHA256

      9ab1ae9797c0e3697fc0effb7ea72d44b5ff45a6833e900dc6c6b30a8aa3a3f4

      SHA512

      0c0b8997db623d59c33cb7f38a9cacaa87b11de3cf92132d843c37382848966095485d6a3d997640ab9c1527d8f22190d3166dd8edfdac770e6a8547cf47a232

    • \Users\Admin\AppData\Local\Temp\±ùÌì¼ÓËÙ1.43.exe
      Filesize

      1.5MB

      MD5

      a0f0a2390211ce1102eeb46f8e50133f

      SHA1

      5c861caa1b5c7122b0dd01fb952303cdd4c77483

      SHA256

      9ab1ae9797c0e3697fc0effb7ea72d44b5ff45a6833e900dc6c6b30a8aa3a3f4

      SHA512

      0c0b8997db623d59c33cb7f38a9cacaa87b11de3cf92132d843c37382848966095485d6a3d997640ab9c1527d8f22190d3166dd8edfdac770e6a8547cf47a232

    • memory/1144-67-0x0000000002030000-0x00000000024E4000-memory.dmp
      Filesize

      4.7MB

    • memory/1144-54-0x0000000000000000-mapping.dmp
    • memory/1144-68-0x0000000002030000-0x00000000024E4000-memory.dmp
      Filesize

      4.7MB

    • memory/1984-64-0x0000000000000000-mapping.dmp
    • memory/1984-69-0x0000000000400000-0x00000000008B4000-memory.dmp
      Filesize

      4.7MB

    • memory/1984-70-0x0000000000400000-0x00000000008B4000-memory.dmp
      Filesize

      4.7MB

    • memory/1984-71-0x0000000000400000-0x00000000008B4000-memory.dmp
      Filesize

      4.7MB

    • memory/1984-72-0x0000000000400000-0x00000000008B4000-memory.dmp
      Filesize

      4.7MB

    • memory/1984-73-0x0000000000400000-0x00000000008B4000-memory.dmp
      Filesize

      4.7MB

    • memory/2016-55-0x0000000000000000-mapping.dmp
    • memory/2024-62-0x0000000076DC1000-0x0000000076DC3000-memory.dmp
      Filesize

      8KB

    • memory/2024-58-0x0000000000000000-mapping.dmp