Analysis
-
max time kernel
22s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 20:48
Static task
static1
Behavioral task
behavioral1
Sample
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe
Resource
win10v2004-20220812-en
General
-
Target
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe
-
Size
584KB
-
MD5
6b3ba129aea011182f92f249c3fcd453
-
SHA1
fffddd1ceee89595bc45b313c874acfa73bb417f
-
SHA256
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d
-
SHA512
644d5ac5d1b95c884efbb8ff38835f1f1cb7adc6e7b5620e8c4566f0d97ad999ce82208e5412ef0e748e4c4181264adeb29d34fbae2c740f621619c121300ac7
-
SSDEEP
12288:N9I2iW1DZZ/KvaNU5pyJzZrNNwRr0boVtsZGp4Lq0Az:N2NW1DZkdyJzZZyRrketsUF
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1376-66-0x0000000000400000-0x00000000004EB000-memory.dmp modiloader_stage2 -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1928 1376 WerFault.exe efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe -
Modifies registry class 6 IoCs
Processes:
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\ThreadingModel = "Both" efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\Programmable efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA} efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ = "MsasrUI Class" efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32 efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\ = "%SystemRoot%\\SysWow64\\Speech\\Engines\\SR\\spsrx.dll" efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exedescription pid process Token: 33 1376 efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Token: SeIncBasePriorityPrivilege 1376 efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exedescription pid process target process PID 1376 wrote to memory of 1928 1376 efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe WerFault.exe PID 1376 wrote to memory of 1928 1376 efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe WerFault.exe PID 1376 wrote to memory of 1928 1376 efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe WerFault.exe PID 1376 wrote to memory of 1928 1376 efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe"C:\Users\Admin\AppData\Local\Temp\efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 4682⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1376-54-0x0000000075921000-0x0000000075923000-memory.dmpFilesize
8KB
-
memory/1376-55-0x00000000003A0000-0x00000000003F1000-memory.dmpFilesize
324KB
-
memory/1376-61-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/1376-62-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/1376-60-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/1376-63-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/1376-64-0x00000000003A1000-0x00000000003D4000-memory.dmpFilesize
204KB
-
memory/1376-65-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/1376-66-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/1928-67-0x0000000000000000-mapping.dmp