Analysis
-
max time kernel
124s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 08:28
Behavioral task
behavioral1
Sample
876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe
Resource
win10v2004-20220901-en
General
-
Target
876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe
-
Size
375KB
-
MD5
7a8b3bdfbe2bb3201f9e149ec7822dd0
-
SHA1
ccdf7abc55f9765212c199e2325d1486c9cde1ec
-
SHA256
876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce
-
SHA512
8458681e344b893c55519dc38c434904e90c34b0cf590e9db102503bdf096dee0438e050d3e5288aa5b4238178951672889de5bdf64bcd4e8b90cb41f5231648
-
SSDEEP
6144:m4amIhuZn1rnw5xyPRV+6PdsjVwuJvUkZ9hboCOaJCoafCWiYXmJlt1kc/ql:Lnw5xy5VOvnfQ2d1kz
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule \??\c:\windows\SysWOW64\sys.dll modiloader_stage2 \Windows\SysWOW64\sys.dll modiloader_stage2 behavioral1/memory/1984-56-0x0000000000210000-0x0000000000268000-memory.dmp modiloader_stage2 -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\netctrl\Parameters\ServiceDll = "C:\\Windows\\system32\\sys.dll" 876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 884 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 1984 svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exedescription ioc process File created C:\Windows\SysWOW64\sys.dll 876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe File opened for modification C:\Windows\SysWOW64\sys.dll 876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exedescription pid process target process PID 1420 wrote to memory of 884 1420 876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe cmd.exe PID 1420 wrote to memory of 884 1420 876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe cmd.exe PID 1420 wrote to memory of 884 1420 876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe cmd.exe PID 1420 wrote to memory of 884 1420 876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe"C:\Users\Admin\AppData\Local\Temp\876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\876dcce6707c545b8ddd4ff040139427dfac919389743eb6fc5a8ceb5436e8ce.exe"2⤵
- Deletes itself
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k remoteservice1⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\c:\windows\SysWOW64\sys.dllFilesize
323KB
MD56a991a6856bf0654759cdb8986c08750
SHA14399e31003d8f4e02eb00fc06cb21827a26e5185
SHA2563c1ad8329856c79162f7dc9ec2f5692593a488e98583c0676797442525275da8
SHA51245f1fe4ceb4cc88740bbba1ecc826cf2e8ad2f8eb2eac60d62d1eaa8025983568dd1cac2640dcd884a219b957a220838c5d60c87c657ed11984a8264dae7860b
-
\Windows\SysWOW64\sys.dllFilesize
323KB
MD56a991a6856bf0654759cdb8986c08750
SHA14399e31003d8f4e02eb00fc06cb21827a26e5185
SHA2563c1ad8329856c79162f7dc9ec2f5692593a488e98583c0676797442525275da8
SHA51245f1fe4ceb4cc88740bbba1ecc826cf2e8ad2f8eb2eac60d62d1eaa8025983568dd1cac2640dcd884a219b957a220838c5d60c87c657ed11984a8264dae7860b
-
memory/884-58-0x0000000000000000-mapping.dmp
-
memory/1984-56-0x0000000000210000-0x0000000000268000-memory.dmpFilesize
352KB
-
memory/1984-57-0x00000000767B1000-0x00000000767B3000-memory.dmpFilesize
8KB