Analysis
-
max time kernel
157s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 20:31
Behavioral task
behavioral1
Sample
f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe
Resource
win10v2004-20220901-en
General
-
Target
f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe
-
Size
126KB
-
MD5
936fe9b34f4d62c71364e856c0d73932
-
SHA1
3a80904cf58d500dcc9d908468896f81d3dbe40a
-
SHA256
f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8
-
SHA512
cf6ab831ee38cb7ae12d8cb2cba2f3e286c4ab69e50681cf6dfa8a516434e672a7a2ee2e1ffdb6ad1b21b97224dc8a3df3bfb0aeaa6691ec1bd13677f41bb2dc
-
SSDEEP
3072:Fkq53FivSwHKT0Wph5fJINzEprvcaAnB4vM2m3DMUsrfxK:2q0vDHABh1q1OrkJnB4i2Tw
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1644-68-0x0000000000400000-0x000000000044F000-memory.dmp modiloader_stage2 behavioral1/memory/1644-69-0x0000000000400000-0x000000000044F000-memory.dmp modiloader_stage2 behavioral1/memory/1644-70-0x0000000000400000-0x000000000044F000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral1/memory/848-54-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1644-58-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1644-60-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1644-61-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/848-64-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1644-65-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1644-67-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1644-68-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1644-69-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1644-70-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Processes:
f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exedescription pid process target process PID 848 set thread context of 1644 848 f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exevssvc.exedescription pid process Token: SeDebugPrivilege 1644 f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe Token: SeBackupPrivilege 1100 vssvc.exe Token: SeRestorePrivilege 1100 vssvc.exe Token: SeAuditPrivilege 1100 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exepid process 848 f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exedescription pid process target process PID 848 wrote to memory of 1644 848 f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe PID 848 wrote to memory of 1644 848 f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe PID 848 wrote to memory of 1644 848 f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe PID 848 wrote to memory of 1644 848 f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe PID 848 wrote to memory of 1644 848 f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe PID 848 wrote to memory of 1644 848 f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe PID 848 wrote to memory of 1644 848 f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe PID 848 wrote to memory of 1644 848 f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe"C:\Users\Admin\AppData\Local\Temp\f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exeC:\Users\Admin\AppData\Local\Temp\f3686e1ceaedb3817c270fb1427bc864f06b71eb9de1a57e445d3ba162b9b5d8.exe2⤵
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/848-54-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/848-64-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/1644-60-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1644-58-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1644-62-0x000000000044D000-mapping.dmp
-
memory/1644-61-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1644-57-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1644-65-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1644-66-0x0000000075041000-0x0000000075043000-memory.dmpFilesize
8KB
-
memory/1644-67-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1644-68-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1644-69-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1644-70-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB